Entries |
Document | Title | Date |
20080198768 | Management Interface and Tool for Benchmarking Optical Network Topologies - A management tool facilitating benchmarking of optical network topologies. In one embodiment, a method includes receiving an identification of an optical network element, including network address information of the optical network element; receiving an identification of one or more optical network traffic generators, including access information of the optical network generators; and automatically accessing the identified optical network element, and one or more traffic generators in connection with execution of one or more tests on the optical network element. | 08-21-2008 |
20080205302 | Preventing data traffic connectivity between endpoints of a network segment - Various systems and method of preventing data traffic connectivity between endpoints of a network segment are disclosed. One method involves receiving a segment protocol message from a first segment port within a network segment, which includes a plurality of network devices. In response to receipt of the segment protocol message, which can indicate whether connectivity is present between the segment endpoints via the network segment, a second segment port can be operated in a blocked state. Operating the second segment port in the blocked state prevents data plane connectivity via the network segment. | 08-28-2008 |
20080212496 | COMMUNICATION NETWORK SYSTEM AND SIGNAL TRANSMISSION METHOD BETWEEN LEAF-NODES OF MULTICAST TREE AND NODE THEREOF - A method of leaf-node of the multicast tree signal transmission and communication network system and node thereof in the communication network. Establishing the connection between the source leaf-node and root node of the transmitting signal in the multicast tree; the source leaf-node of the transmitting signal in the multicast tree transmits signal to the root node through the established connection; the root node in the multicast tree receives the transmitted signal and transmits the signal to the destination leaf-node in the multicast tree. An establishing method of the preparative bi-directional connection from the root-node to the leaf-node in the multicast tree. When the multicast service supported multicasting tree was established in the connection-oriented network, each leaf-node in the multicast tree may act as the signal source node that send signal to other leaf-nodes in the multicast tree, and it is able to share the multicast tree possessive network resource furthest during the signal transmitting between multi leaf-nodes. | 09-04-2008 |
20080225753 | SYSTEMS AND METHODS FOR CONFIGURING HANDLING OF UNDEFINED POLICY EVENTS - Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is described for allowing users to specify object oriented policies. These object oriented policies may allow any data structures to be applied with respect to a payload of a received packet stream, including any portions of HTTP traffic. A configuration interface may also allow the user to control the order in which policies and policy groups are executed, in addition to specifying actions to be taken if one or more policies are undefined. Systems and methods for processing the policies may allow efficient processing of object-oriented policies by applying potentially complex data structures to unstructured data streams. A device may also interpret and process a number of flow control commands and policy group invocation statements to determine an order of execution among a number of policies and policy groups. These policy configurations and processing may allow configuration and processing of complex network behaviors relating to load balancing, VPNs, SSL offloading, content switching, application security, acceleration, and caching. | 09-18-2008 |
20080225754 | Automatically discovering architectural roles of packet switching devices - Network architectural roles of packet switching devices are automatically determined by retrieving and analyzing configuration information of the packet switching devices. The retrieved configuration information typically includes operational details of the packet switching operations performed by the packet switching device, with these retrieved operational details being analyzed in order to identify one or more network architectural roles being performed by a particular packet switching device. Examples of such identified network architectural role include, but are not limited to, a customer edge device, a provider edge device, and a user-facing provider edge device. Knowing the architectural role performed by a packet switching device is useful for operations, administration, maintenance and provisioning of networks of these packet switching devices. | 09-18-2008 |
20080225755 | SYSTEM AND METHOD FOR PROVIDING AND USING A VLAN-AWARE STORAGE DEVICE - The present invention provides secure IP protocol capable storage devices using Virtual Local Area Network (VLAN) techniques. Specific embodiments of the present invention provide techniques for securing VLAN aware storage devices, and the like. In specific embodiments, techniques according to the present invention can provide Internet data centers that are responsible for keeping their customer's computers and storages safe and secure with the capability to strictly separate LAN access for different customers using VLAN (virtual LAN) technology. | 09-18-2008 |
20080232274 | DISTRIBUTED SYNCHRONOUS BATCH RECONFIGURATION OF A NETWORK - A novel alternative concept for handling dynamic provisioning changes and ongoing network reconfiguration and incremental reoptimization in general. A prime motivation is concern about the dependency of existing concepts for dynamic provisioning on the real-time coherence of databases of network state at diverse geographic locations. Not only is the continual updating of such global state everywhere in the network an intensive real-time load, but inevitable incoherencies pose hazards in network operation. The alternative proposal is a framework that makes use precise time synchronization and the computational power of network nodes to solve identical local instances of incremental reoptimization problems in situ. The new scheme removes the database coherency hazard, reduces signaling volumes, and increases resource efficiencies in service provisioning. It also provides a framework in general for continually ongoing incremental or (if desired) total reoptimization of network configuration. The proposal also points directions towards some new research questions such as implementation of optimization models for identical solution on disparate platforms and definition of a variety of incremental batch reoptimization problems. It is thought that this may be one of the first practical application concepts for transport network management that would involve on-line embedded use of operations research methods in communication networks. | 09-25-2008 |
20080247334 | FREQUENCY SCANNING TO FORM A COMMUNICATION NETWORK - A node forms a network by scanning for an existing network. If an existing network is not found, the node operates as a network controller node of the first network and admits at least one client node to the first network. As a network controller node, the node designates one of the client nodes as a scout node. The scout node removes itself from the first network and scans for a second network. If the scout node does not return to the first network after a predetermined time, it is assumed that the scout node has found a second network. The network controller node of the first network then designates the remaining client nodes as scout nodes, and then joins the second network as a client node. Therefore, multiple networks are avoided. | 10-09-2008 |
20080253305 | Undirected Cross Connects Based on Wavelength-Selective Switches - Undirected cross connects are provided based on wavelength-selective switches A demand d={i, j} is routed over a path p | 10-16-2008 |
20080253306 | Distributed routing table architecture and design - A Distributed Routing Table (DRT) mesh can comprise two or more nodes, each of which maintains its own routing table that represents some or all of the overall routing knowledge of the DRT mesh. Each node can be comprised of modular components that can perform various defined functions such that the features and abilities of the node can be customized by an application based on which modular components are instantiated. A routing table management module can maintain individual routing tables at each node, and can ensure that only entries that are close to the node, in a network topology sense, are maintained in the routing table. In addition, a security module can verify received messages based on an agreed-upon root certificate. | 10-16-2008 |
20080259820 | Creating Non-transit Nodes in a Link State Network - In one embodiment, a method includes receiving a first link state initiation (HELLO) message from a first neighboring router. The HELLO message requests that a recipient node send a unique identifier for itself in a link state routing protocol. In response to receiving the first HELLO message, a first response message is sent that includes a first identifier from an identifier pool. The identifier pool contains for a local node a plurality of network identifiers that are unique among all nodes in the network that uses the link state routing protocol. A second HELLO message is received from a different second neighboring router. In response to receiving the second HELLO message, a second response message is sent that includes a different second identifier from the identifier pool. | 10-23-2008 |
20080259821 | DYNAMIC PACKET TRAINING - A packet control mechanism for a computer data system that dynamically adjusts packet training depending on the utilization load on the processor. The dynamic adjustment of packet training can be to enable and disable packet training, or adjust the number of packets in the packet train. In preferred embodiments, the computer data system includes a processor utilization mechanism that indicates a load on a processor. When the packet control mechanism determines the load on the processor is above a threshold limit, the packet control mechanism reduces the processor load by compressing the packets into the packet train. The compressing of the packets is stopped or reduced when the processor load is below a threshold in order to increase the data throughput on the network interface. | 10-23-2008 |
20080259822 | DYNAMIC PACKET TRAINING - A packet control mechanism for a computer data system that dynamically adjusts packet training depending on the utilization load on the processor. The dynamic adjustment of packet training can be to enable and disable packet training, or adjust the number of packets in the packet train. In preferred embodiments, the computer data system includes a processor utilization mechanism that indicates a load on a processor. When the packet control mechanism determines the load on the processor is above a threshold limit, the packet control mechanism reduces the processor load by compressing the packets into the packet train. The compressing of the packets is stopped or reduced when the processor load is below a threshold in order to increase the data throughput on the network interface. | 10-23-2008 |
20080267091 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR SERVICE AND APPLICATION CONFIGURATION IN A NETWORK DEVICE - A method is provided that includes accessing information associated with at least one service or application in a social network. The method also includes detecting at least one event relating to the information associated with the at least one service or application within the social network and modifying the information associated with the at least one service or application in response to the at least one event. | 10-30-2008 |
20080273473 | Method and System for Realizing Network Connection Service - A method and system for implementing a network connection service is provided. In the invention, the port information of the network ingress node and the network egress node is registered with the directory server or configured manually. During the establishment of the network service connection, a request for establishing the network connection service between the source user node and the destination user node is initiated, and the directory server is queried in response to the request to obtain the connection and adaptation mode for establishing the network connection service, which is supported by both the network ingress node and the network egress node, and the network connection is established and the adaptation configuration is performed according to the connection and adaptation mode to establish the network connection service. | 11-06-2008 |
20080285484 | METHOD FOR ANALYZING A NETWORK ENVIRONMENT - A method for analyzing a network environment, in which the method comprises the following steps: Acquiring a plurality of connection data of all network cards of a terminal device; according to connection data, determining whether or not a terminal device uses a PPPoEconnection is used to connect to a network system; determining whether or not an IP address of the terminal device is a public IP address and determining whether or not the terminal device uses DHCP to acquire a target IP address. | 11-20-2008 |
20080291847 | Topology and route discovery and management for relay networks - Various example embodiments are disclosed relating to route discovery and management in relay networks. In an example embodiment, a first message may be received at a first network station in a wireless network. It may be determined whether the received first message includes an identifier of a second network station indicating an attachment of a network node to the second network station. The received first message may be modified to include an identifier of the first network station indicating an attachment of the network node to the first network station if it is determined that the received message does not include the identifier of the second network station. The received first message may be forwarded to a third network station. Various techniques may also be provided for updating and managing a network topology, e.g., for discovering, updating, and selecting communication paths for network traffic. | 11-27-2008 |
20080291848 | Information distribution system, terminal apparatus used in same system and recording medium on which is recorded a program, as well as information processing method - To provide an information distribution system which forms a tree-shaped hierarchical structure and distributes contents information, and in which it is possible for a connection destination of a terminal apparatus newly participating in a hierarchical structure of a distribution channel to be selected by a user of the terminal apparatus. A terminal apparatus, when participating in a hierarchical structure of a certain distribution channel, acquires information on the hierarchical structure, and displays participation statuses in the hierarchical structure of a plurality of terminal apparatus configuring the hierarchical structure in a predetermined topology information display area | 11-27-2008 |
20080298275 | Autonomous Infrastructure Wireless Networks - A method for deploying a cellular wireless communication network is provided. The method consists of: providing one or more micro base stations; autonomously deploying the micro base stations using a network access point linked to a cellular wireless communication network; and enabling configuration of the micro base stations to execute network operation commands from a network controller associated with the wireless communication network. Another aspect consists of enabling cooperation and network connectivity between micro base stations and other base stations, including micro base stations and large network base stations. Network connectivity to one or more cellular communication terminals associated with individuals or businesses subscribing to the cellular wireless communication network is enabled. A wireless network is also provided which is configurable to link a cellular wireless network through a high data transmission connection so as to define at least one access point between the micro base station and the wireless network. The network includes a wireless interface and receives operation commands from a network controller for configuration of micro base stations, to support the linking of cellular wireless terminals to the wireless network via the wireless interface by operation of the micro base station, as an intermediary. A corresponding system and computer readable medium is also provided | 12-04-2008 |
20080298276 | Analytical Framework for Multinode Storage Reliability Analysis - A analytical framework is described for quantitatively analyzing reliability of a multinode storage system, such as a brick storage system. The framework defines a multidimensional state space of the multinode storage system and uses a stochastic process (such as Markov process) to determine a transition time-based metric measuring the reliability of the multinode storage system. The analytical framework is highly scalable and may be used for quantitatively predicting or comparing the reliability of storage systems under various configurations without requiring experimentation and large-scale simulations. | 12-04-2008 |
20080298277 | NEIGHBOR DISCOVERY PROXY WITH DISTRIBUTED PACKET INSPECTION SCHEME - A network device is to receive traffic including neighbor discovery messages from requesting customer devices, and can detect the neighbor discovery messages within the traffic according to a distributed inspection scheme that includes the network device and a remote component. The network device is to then examine the neighbor discovery messages to determine if the neighbor discovery message should be forwarded to other of the customer devices, and respond to the requesting customer devices. | 12-04-2008 |
20080304427 | Node Self-Configuration And Operation In A Wireless Network - A device performs a self-configure process for operations in a managed network to allocate a network address for the device by determining if the device will operate as a gateway of the managed network, obtaining a network address for communication with external devices outside of the managed network in response to determining that the device will operate as a gateway, scanning for neighbor devices operating in the managed network and maintaining a database of neighbor devices located in the scanning, and selecting a managed network to join based on the database of neighbor devices in response to determining that the device will operate as a node. | 12-11-2008 |
20080316943 | Method for Establishing a Wireless, Autonomous Communications Network, Transceiver and Base Station of a Wireless, Autonomous Communications Network and Corresponding Wireless, Autonomous Communications Network - The present disclosure provides optimal network performance and network illumination in a wireless, autonomous communications network with a dynamic network topology achieved by auto-configuration. Functional alogorthemic enhancements of the communications network are used, enabling the communications network to automatically determine the current network configuration and the accessibility of the transceivers that are associated with the communications network by using measurements and to determine the optimal position of a master station at any one time from the data obtained from the measurements. | 12-25-2008 |
20090003242 | DATA ATTACHMENT POINT SELECTION - An algorithm for improving efficiency of data attachment points (DAPs) in a wireless access network (AN) is provided herein. By way of example, the algorithm can identify a serving access point (APs) coupling an access terminal (AT) to the wireless AN. A cost metric for the serving AP can be determined with respect to at least one data network access gateway (AGW) of the wireless AN. The cost metric can be compared with a similar cost metric of a current or default DAP assigned to the AT. If the cost metric of the serving AP is lower than the cost metric of the current/default DAP, the DAP can be re-assigned to the serving AP, minimizing wireless AN resource costs associated with the DAP. | 01-01-2009 |
20090003243 | NETWORK UTILITIES IN WIRELESS MESH COMMUNICATIONS NETWORKS - Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms. | 01-01-2009 |
20090034432 | SYSTEM AND METHOD OF RESOURCE ALLOCATION WITHIN A COMMUNICATION SYSTEM - A system and method of resource allocation within a communication system is provided. A communication system comprises a plurality of nodes operating in a first architecture network mode, wherein at least a portion of the plurality of nodes are reconfigured to operate in a second architecture network mode in response to a change in one or more network performance requirements. When the plurality of nodes are operating in a distributed architecture network mode, at least a portion of the plurality of nodes are reconfigured to operate in a clustered architecture network mode in response to an increase in one or more network performance requirements. When the plurality of nodes are operating in a clustered architecture network mode, at least a portion of the plurality of nodes are reconfigured to operate in a distributed architecture network mode in response to a decrease in one or more network performance requirements. | 02-05-2009 |
20090034433 | Method for Rebuilding an Ad Hoc Network and the Nodes Thereof - The invention relates to a method for rebuilding an ad hoc network, in particular a ZigBee-type network consisting (A) in collecting data of the network nodes in terms of quality of connections and non-optimal network trees, (B) in calculating a current optimised structure, (D) in setting optimisation data and injecting them into the network and (E) in rebuilding the network according to said current optimised structure. | 02-05-2009 |
20090040946 | Executing an Allgather Operation on a Parallel Computer - Methods, apparatus, and products are disclosed for executing an allgather operation on a parallel computer that includes a plurality of compute nodes organized into at least one operational group of compute nodes for collective parallel operations, each compute node in the operational group assigned a unique rank, that includes: determining a contention-free logical ring topology for the compute nodes in the operational group; configuring, for each compute node in the operational group according to the contention-free logical ring topology, a routing table to specify a forwarding path to the next compute node in the logical ring topology; and repeatedly, for each compute node in the operational group until each compute node has received contributions for all of the other compute nodes in the operational group, forwarding a contribution for the allgather operation to the next compute node in the logical ring topology along the forwarding path. | 02-12-2009 |
20090040947 | Push and Clone Configuration Management for Mobile Devices - Embodiments of a method and system for managing configurations on mobile devices are described. A method under an embodiment utilizes one or more advanced commands defined by the OMA DM protocol. One such command is the “Get” command, which can be used recursively to traverse a management tree to access the necessary nodes. A variation of this command is the “Get[Struct Data]” command, which traverses a tree or subtree in a single execution instance. The “Get” command is used to get a snapshot from a management tree starting from a specified URI. For this embodiment, it is presumed that a “golden” copy of device exists. The golden copy can be initially configured either manually or by using a mobile device management platform. The method uses a golden device to make a configuration snapshot to be used later for a distribution to multiple targets. | 02-12-2009 |
20090046601 | TOPOLOGY CONTROLLED DISCOVERY FOR NEXT HOP DETERMINATION - In a particular embodiment of the present invention, a particular node in an ad hoc network is configured with a desirable number of neighbor nodes and equipped with a transmission power level hierarchy. The particular node may adjust a transmission power level to a different level in the transmission power level hierarchy, based on a number of responses received from neighbor nodes after the particular node broadcasts a request at current transmission power level. This adjustment process is repeated until the particular node acquires a desirable number of neighbor nodes. | 02-19-2009 |
20090046602 | RADIO FREQUENCY LOCAL AREA NETWORK - An apparatus and a method for routing data in a radio data communication system having one or more host computers, one or more intermediate base stations, and one or more RF terminals organizes the intermediate base stations into an optimal spanning-tree network to control the routing of data to and from the RF terminals and the host computer efficiently and dynamically. Communication between the host computer and the RF terminals is achieved by using the network of intermediate base stations to transmit the data. | 02-19-2009 |
20090046603 | PATH DISCOVERY AND MESSAGE TRANSFER IN PARTIALLY CONNECTED MOBILE AD HOC NETWORKS - A method and system is presented for path discovery and asynchronous message transfer in a partially connected middleware communication space comprising mobile ad hoc networks. Embodiments of the present invention use mobile devices to bridge separated islands of networks and store and propagate messages. The system and software architecture supports methods for routing, messaging caching, and transferring. More specifically, embodiments provide methods and systems that extend a communication space concept into a distributed environment and combine it with the standard Web Services technologies, i.e., SOAP, and WS series protocols. The communication space provides an extension of Web Services to mobile ad hoc networks and provides asynchronous message caching, transferring and routing. | 02-19-2009 |
20090052350 | Auto-discovery and management of base station neighbors in wireless networks - Systems and methods are disclosed that include determining a local node configuration for a local network node. The local network node configuration can include a local range and a local location. In addition, these systems and methods can include receiving a remote network node configuration for a remote network node via a communications link. The remote network node configuration can include a remote range and a remote location. Also these systems and methods can further include generating a neighbor list that includes the remote network node and the local network node. The neighbor list can be determined using the local network node configuration and the remote network node configuration. | 02-26-2009 |
20090067347 | COMMUNICATION APPARATUS AND COMMUNICATION METHOD - A storage unit stores therein setting information and history information on a communication established by the setting information. When an information receiving unit receives new setting information, a judging unit judges whether the setting information stored in the storage unit reached a predetermined value. A determining unit compares the history information corresponding to the setting information, and determines a priority for each setting information based on a result of comparison. A deleting unit deletes setting information having the lowest priority from the storage unit, and a storing unit stores the new setting information in the storage unit. | 03-12-2009 |
20090073895 | Method and apparatus for dynamic switching and real time security control on virtualized systems - In some embodiments, the invention involves securing network traffic to and from a host processor. A system and method is disclosed which utilizes a second processor on a virtualization technology platform to send/receive and triage messages. The second processor is to forward suspect messages to a virtual appliance for further investigation before routing the suspect messages to one of a plurality of virtual machines running on the host processor. When messages are not suspect, use of the virtual appliance is avoided and messages are routed to one of a plurality of virtual machines via a virtual machine manager running on the host processor. Other embodiments are described and claimed. | 03-19-2009 |
20090073896 | ARRANGEMENTS FOR AUTO-MERGING AND AUTO-PARTITIONING PROCESSING COMPONENTS - In some embodiments, a method for auto-partitioning a scalable processing system is disclosed. The method can include establishing connection data, identifying a primary node and automatically transmitting partitioning commands to other nodes to configure them as secondary nodes. The partitioning commands can adjust the basic input output settings of the secondary nodes such that the system can boot as a single partitioned system. Other embodiments are also disclosed. | 03-19-2009 |
20090080345 | Efficient multipoint distribution tree construction for shortest path bridging - A telecommunications system includes a source node. The system includes a plurality of destination nodes. The system includes a network having links and end stations. The system includes a plurality of switches that create paths along links between the source nodes and the destination nodes where there is 100% efficiency along the paths with the paths traversing any link only once to the corresponding destination node from the source node, and the path being a shortest path between the source node and the destination node, where each switch has a Dijkstra computation complexity of O(N) in regard to forming the shortest paths. A method for telecommunications includes the steps of creating paths with a plurality of switches along links of a network between a source node and a plurality of destination nodes where there is 100% efficiency along the paths with the paths traversing any link only once to the corresponding destination node from the source node, and each path being a shortest path between the source node and the destination node, where each switch has a Dijkstra computation complexity of O(N) in regard to forming the shortest paths. There is the step of delivering with the switches frames from the source node to the destination nodes along the shortest paths. | 03-26-2009 |
20090092063 | METHOD AND APPARATUS FOR PROVIDING LINK-LOCAL IPv4 ADDRESSING ACROSS MULTIPLE INTERFACES OF A NETWORK NODE - Embodiments of the present invention provide link-local IPv4 addressing across multiple interfaces of a network-node. During operation, the network-node broadcasts an address resolution protocol (ARP) request packet on multiple interfaces which asks for the hardware address of a network node whose link-local IPv4 address is Y. In response, the network-node receives an ARP-reply packet on an interface from a target network-node. If Y is present in the ARP cache and is associated with a different interface, the source network-node chooses a winner interface, and updates the ARP cache so that Y is associated with the winner interface. The network-node sends one or more contention-resolution packets on the loser interface to cause a loser network-node to choose another link-local IPv4 address for itself. | 04-09-2009 |
20090092064 | ROUTING SWITCH DETECTING CHANGE IN SESSION IDENTIFIER BEFORE RECONFIGURING ROUTING TABLE - An automatic network topology identification technique is described herein. Each node in the network periodically or constantly transmits its unique address to its neighboring node. Once a node receives a different message from its neighbor, the node identifies a topology change in the network. In one embodiment, a current topology is associated with a session number. When a change in the topology is detected, the detecting node increments the session number and broadcasts the change in topology. The other nodes, detecting the changed session number, now know that there has been a change in the network. In response, the nodes in the network modify routing tables and other information stored at the node related to the topology. In one embodiment, the technique is used to reassign shortened addresses to each device on the network to support a dual-addressing mode of the network. The dual addressing mode substitutes reduced-length addresses (referred to as short addresses) for standard addresses (referred to as long addresses) for traffic whose source or destination is internal to a given virtual network topology. The required length of short addresses used for a given virtual topology is dependent on the number of devices reachable within the topology. | 04-09-2009 |
20090097417 | SYSTEM AND METHOD FOR IMPROVING SPOKE TO SPOKE COMMUNICATION IN A COMPUTER NETWORK - Various embodiments of the disclosed subject matter provide methods and systems for improved efficiency in spoke-to-spoke network communication. Embodiments provide systems and methods for registering a spoke with a hub, updating at least one database with spoke registration information at the hub, and advertising the spoke registration information to other spokes using a single control plane that includes transport security, peer discovery, and unicast routing information. | 04-16-2009 |
20090097418 | System and method for network service path analysis - Systems and methods for network service path analysis analyze and manage the delivery of applications over a network. A program running on a computer utilizes a Layer 3 topology of a computer network to create a directed graph representing deliverability of packets across the network. By analyzing access control lists and firewall rule sets from the network, along with modeling routing protocol behavior and policy as packet filters, the program performs a series of matrix multiplications, using an optimized decomposition of the IP packet space. The resulting matrix contains all of the path information for all deliverable packets. The matrix populates a network path database that captures the set of packets deliverable between any pair of Internet Protocol addresses in the network. | 04-16-2009 |
20090116410 | PROCEDURE OF SETTING UP PEER LINK IN WIRELESS MESH NETWORK AND WIRELESS STATION SUPPORTING THE SAME - Provided are a procedure of setting up a peer link in wireless mesh networks and a wireless station supporting the procedure. In the procedure, a mesh point (MP) transmits first peer link open frame regarding the peer link to a candidate peer MP. The first peer link open frame includes high throughput capabilities information element and high throughput operation information element. And, the mesh point receives first peer link confirmation frame regarding the peer link from the candidate peer MP in response to the first peer link open frame. And, the mesh point transmits second peer link confirmation frame regarding the peer link to the candidate peer MP after receiving second peer link open frame received from the candidate peer MP. In this case, the peer link confirmation frame may also include high throughput capabilities information element and high throughput operation element. | 05-07-2009 |
20090122723 | Dynamic Network Management System, Dynamic Network Management Device, and Dynamic Network Management Method - A technology is disclosed for providing the global connectivity to the mobile node which is connected to the mobile access router forming the mobile network. According to the technology, it is possible for the mobile node | 05-14-2009 |
20090122724 | Peer-to-Peer Network including Routing Protocol Enhancement - Methods, apparatuses and systems that enhance the operation of peer-to-peer networks with routing protocols. In a particular implementation, peer nodes of a peer-to-peer network use an enterprise routing protocol to construct p2p network routing tables that support identification of peer nodes implementing a distributed hash table. This allows each peer node on the p2p network to know about every other node, and to learn, within IP network routing convergence times, of the arrival, departure, and failure of peer nodes in the p2p network. It also allows for single hop queries to other peer nodes. | 05-14-2009 |
20090147702 | Method and Apparatus for Forming and Configuring a Dynamic Network of Mobile Network Nodes - The invention includes methods for forming, configuring, and managing a dynamic wireless network. A dynamic wireless network may be formed from at least one wireless node. The dynamic wireless network uses a Role Assignment Protocol (RAP) adapted for assigning one or more roles to each of the at least one wireless node. The dynamic wireless network uses a Network Configuration Protocol (NCP) adapted for configuring each of the at least one node at least according to the assigned role(s). A dynamic wireless network may be modified in response to one or more conditions, such as a wireless node joining the dynamic wireless network, a wireless node leaving the dynamic wireless network, wireless nodes moving within the dynamic wireless network, and the like. A dynamic wireless network may be split into multiple dynamic wireless networks and, similarly, multiple dynamic wireless networks may merge to form one dynamic wireless network. | 06-11-2009 |
20090147703 | Method for Efficiently Retrieving Topology-Specific Data for Point-to-Point Networks - Network topology codes are computed and used as keys to retrieve topology-specific information for isomorphic networks. | 06-11-2009 |
20090154376 | INFORMATION ANALYSIS APPARATUS AND COMPUTER READABLE MEDIUM - An information analysis apparatus includes: a storage that stores data values while respectively correlating the data values with plural nodes; a first setting unit that, for the nodes, sets a first virtual link that is directed oppositely to a predetermined directed link; a second setting unit that adds a virtual nodes to the nodes, and that sets a second virtual link which is bidirectional between the added virtual node and each of the nodes; and a updating unit that updates data values respectively correlated with the nodes, on the basis of respective weights of predetermined links between the nodes, the first virtual link, and the second virtual link. | 06-18-2009 |
20090180400 | BREAK BEFORE MAKE FORWARDING INFORMATION BASE (FIB) POPULATION FOR MULTICAST - A method of installing forwarding state in a link state protocol controlled network node having a topology database representing a known topology of the network, and at least two ports for communication with corresponding peers of the network node. A unicast path is computed from the node to a second node in the network, using the topology database, and unicast forwarding state associated with the computed unicast path installed in a filtering database (FDB) of the node. Multicast forwarding state is removed for multicast trees originating at the second node if an unsafe condition is detected. Subsequently, a “safe” indication signal is advertised to each of the peers of the network node. The “safe” indication signal comprises a digest of the topology database. A multicast path is then computed from the network node to at least one destination node of a multicast tree originating at the second node. Finally, multicast forwarding state associated with the computed multicast path is installed in the filtering database (FDB) of the network node, when predetermined safe condition is satisfied. | 07-16-2009 |
20090180401 | METHOD AND DEVICE FOR LOOP WITHDRAWAL IN A MPLS NETWORK - A loop withdrawal method in multi-protocol label switching is disclosed. When detecting a rewinding event of colored thread, a node judges whether an upstream interface of the colored thread is in a stalled status, and if yes, prohibits distribution of a colored thread rewinding message via the upstream interface of the colored thread; otherwise, the node continues to distribute the colored thread rewinding message and transmit label mapping via the upstream interface. When detecting a withdrawal event of the colored thread, the node removes colored thread information of the upstream interface of the colored thread, judges whether the node has received another colored thread for a same service, and if yes, extends a new colored thread via a downstream interface of the colored thread; otherwise, the node continues to distribute a colored thread withdrawal message via the downstream interface of the colored thread. | 07-16-2009 |
20090185508 | METHOD AND APPARATUS FOR DIRECTIONAL NETWORKING TOPOLOGY MANAGEMENT - A computer implemented method, apparatus, and computer program product to managing links in a network. A directional link management system comprises a network manager, a router, a situational awareness database, a neighbor discovery module, a topology manager, and a data link manager. The network manager provides performance parameters for a wireless network. The router routes information to neighbor nodes provides information about links between nodes in the wireless network environment. The situational awareness database stores information about the nodes. The neighbor discovery module detects a presence of a new node. The topology manager identifies a set of links for a node using the set of performance parameters, information about the links, and information about the nodes. The data link manager manages the identified links. | 07-23-2009 |
20090190502 | COMMUNICATION APPARATUS, COMMUNICATION METHOD, COMMUNICATION CIRCUIT, MOBILE PHONE, PROGRAM, AND COMPUTER READABLE RECORDING MEDIUM WITH PROGRAM RECORDED THEREIN - A communication apparatus ( | 07-30-2009 |
20090219835 | Optimizing A Physical Data Communications Topology Between A Plurality Of Computing Nodes - Methods, apparatus, and products are disclosed for optimizing a physical data communications topology between a plurality of computing nodes, the physical data communications topology including physical links configured to connect the plurality of nodes for data communications, that include carrying out repeatedly at a predetermined pace: detecting network packets transmitted through the links between each pair of nodes in the physical data communications topology, each network packet characterized by one or more packet attributes; assigning, to each network packet, a packet weight in dependence upon the packet attributes for that network packet; determining, for each pair of nodes in the physical data communications topology, a node pair traffic weight in dependence upon the packet weights assigned to the network packets transferred between that pair of nodes; and reconfiguring the physical links between each pair of nodes in dependence upon the node pair traffic weights. | 09-03-2009 |
20090232028 | CONFIGURATION SYSTEMS AND METHODS FOR UTILIZING LOCATION INFORMATION TO CONFIGURE DEVICES IN APPLICATION SYSTEMS - A method for configuring at least one of a first device, a second device, and an application system is disclosed. The application system may be utilized in a spatial unit. The spatial unit may include a plurality of spatial subunits. The method may include determining a first spatial subunit in the spatial unit. The first spatial subunit may be related to the first device. The method may also include identifying, based on a result of the determining, a second device that is physically disposed in the first spatial subunit. The method may also include configuring the at least one of the first device, the second device, and the application system using at least a first rule, wherein the first rule may involve at least the first device and the second device. | 09-17-2009 |
20090232029 | METHOD AND APPARATUS FOR PROVIDING FULL LOGICAL CONNECTIVITY IN MPLS NETWORKS - The invention includes a method and apparatus for configuring logical connectivity for a network comprising a plurality of nodes. A method includes determining a physical topology of the network, determining a set of LSP paths based on the physical topology of the network, and determining a set of LSPs using the set of LSP paths, where the set of LSPs includes a plurality of LSPs adapted for providing full logical connectivity between the nodes of the network. The physical topology is determined using information indicative of physical connectivity between nodes of the network. The set of LSP paths includes, for each pair of nodes in the network, at least two logical paths between the nodes of the node pair. The set of LSPs includes a plurality of LSPs adapted for providing full logical connectivity between the nodes of the network. The full logical connectivity between the nodes of the network may be maintained in response to physical topology change events, such as addition of nodes to the network removal of nodes from the network, and the like. | 09-17-2009 |
20090245140 | BIONETS ARCHITECTURE FOR BUILDING SERVICES CAPABLE OF SELF-EVOLUTION - Systems and methods are provided for effectuating a basis for implementing services capable of self-creation, self-evolution and/or substantive personalization without direct intervention from, e.g., a service provider. The resulting services are flexible and user-friendly, as a basic set of service primitives can be updated and extended at any point. Additionally, new and/or improved service functionality that is adapted to a user's behavior is done so in a non-intrusive manner. Additionally, implementation of service families, meta-service and readdressing as described above in accordance with various embodiments allows for the maximization of, e.g., a community training effect, when some interesting service finding of one community user can be easily shared and utilized by other users. Moreover, the systems and methods described herein for implementing/providing a basis for a flexible architecture minimizes resource consumption on the client side. | 10-01-2009 |
20090245141 | Ethernet Ring Protection-resource Usage Optimization Methods - Reconfiguring a ring network having N nodes and S spans that prevents a maximum usage parameter to be exceeded. The network is configured by selecting a span as a protection span to remain idle. An effect of the configuration on the network that causes the network to exceed a maximum usage parameter is calculated. The network is reconfigured by selecting a different span as a protection span to remain idle based on a result of the step of calculating that a previous span selected as the protection span to remain idle causes the network to exceed a maximum usage parameter such that the maximum usage parameter of the reconfigured network is not exceeded. | 10-01-2009 |
20090252061 | METHODS AND APPARATUS TO IMPLEMENT A PARTIAL MESH VIRTUAL PRIVATE LOCAL AREA NETWORK SERVICE - Methods and apparatus to implement a partial mesh virtual private local area network service are disclosed. An example method to implement a partial mesh virtual private local area network service (VPLS) network disclosed herein comprises identifying a desired partial mesh topology of connections for interconnecting a plurality of provider edge devices comprising the VPLS network, and decomposing the partial mesh topology into a plurality of cliques, wherein each clique comprises a respective full mesh topology of connections for interconnecting a respective subset of the plurality of provider edge devices, and wherein a union of the plurality of cliques implements the desired partial mesh topology. | 10-08-2009 |
20090252062 | Methods for automatically configuring devices in telecommunication networks and devices for use with such methods - A method for automatically configuring a device by means of an automatic configuration means adapted for automatically configuring the device by means of a remote management protocol (RMP), comprising setting up an RMP session between the device and the automatic configuration means is disclosed, wherein when during the RMP session at least one parameter value of the object model of the device is changed, the device communicates the changed parameter value(s) to the automatic configuration means after the initiation and before the termination of the RMP session. | 10-08-2009 |
20090252063 | Method & system for configuring a network communications device - A method and system for auto-provisioning communications devices, the system includes a network appliance associated with a software and/or hardware module with instructions for managing the automatic configuration of communications devices. | 10-08-2009 |
20090274068 | Network Having Redundancy Properties, Ethernet Switch for Such a Network and Method for Configuring Such a Network - There is described a network having redundancy properties, an Ethernet switch, and a method for configuring the network. At least two network segments which are formed with a plurality of Ethernet switches are connected to one another by means of a redundant connection comprising at least two coupling channels. During configuration, a programming device stores a logic name for the redundant connection in the respective memory of associated coupling devices. In a network startup phase, said coupling devices determine the respective other connection partner associated with the same redundant connection by distributing special messages in which they enter the logic name of the redundant connection. They use an order criterion to determine which coupling channel is active and which coupling channel is deactivated during trouble-free operation. | 11-05-2009 |
20090274069 | INTER-ACCESS NETWORK TOPOLOGY DISCOVERY - The disclosure relates to building a topology map that can be used to provide a requesting wireless terminal with information relevant to its current location. Information on neighboring cells of different access networks is maintained in the topology map. An inter-access network (IAN) topology apparatus builds to topology map based on results of previous IAN session transfers such as handovers from one access network to a different access network. When the requesting wireless terminal currently accessing a current network makes a request for topology information, the IAN topology apparatus provides a list of cells of other than the current access network in the area of the requesting wireless terminal. The requesting wireless terminal uses the information to scan for cells of other access networks to potentially perform the IAN session transfer. The requesting wireless terminal conserves power by scanning only for accessible cells indicated to be in its area. | 11-05-2009 |
20090279454 | METHOD FOR CONFIGURING A DHCP SERVER USING DHCP OPTION 82 - The invention relates to a method for creating a DHCP network device configuration, wherein the parameter allocation by a DHCP server is performed using Option 82, and the assignment for the IP address to be allocated to a network device is determined on the basis of the topological information. The topological information is provided to the DHCP server by the requesting device and a DHCP relay agent, and the relay agent acts on each DHCP message sent by a device in the network by means of an additional DHCP Option 82 and sends the messages via unicast to the DHCP server, whereas the standard DHCP message is forwarded. According to the invention, a network device sends, in addition to the regular DHCP discovers via MAC broadcast, DHCP messages via MAC multicast to a MAC multicast address, and from this MAC multicast sends unique information via unicast to the DHCP server by means of a DHCP relay agent, since the associated network device filters the multicast. The creation of a DHCP server configuration is automated by use of a software component for the network management. | 11-12-2009 |
20090285124 | WIRELESS MESH NETWORK TRANSIT LINK TOPOLOGY OPTIMIZATION METHOD AND SYSTEM - A method and configuration manager generates a routing topology for a wireless mesh network. The wireless mesh network has a plurality of internal nodes, at least one edge node, and at least one originating device. A plurality of potential routing solutions is determined which contain a plurality of paths through the wireless mesh network from the at least one originating device to the at least one edge node such that data communicated from the at least one originating device reaches the at least one edge node in no more than a predetermined number of hops. Each potential routing solution is based on at least one measured wireless communication parameter between internal nodes. Metric calculations for each potential routing solution are computed to determine a preferred routing solution. The wireless mesh network is configured to route traffic using the preferred routing solution. | 11-19-2009 |
20090285125 | Iterative synchronous and Asynchronous Multi-User Detection with Optimum Soft limiter - An iterative method for multi-user detection in Code Division Multiple Access (CDMA) Systems is used to improve the capacity of the network for random codes. A soft limiter function is used in the output of each step of iterations to accelerate the convergence and also to improve the interference cancellation power of this method. | 11-19-2009 |
20090285126 | METHOD FOR ORGANIZING A NETWORK OF COMMUNICATING OBJECTS AND COMMUNICATING OBJECT FOR THE IMPLEMENTATION OF THE METHOD - A system and method organize a network of communicating objects in at least one partition comprising a plurality of communication cells respectively covered by a plurality of leader nodes, the network having a set of allocatable addresses split into a plurality of address pools distributively managed by the leader nodes. Upon a new node arrival, phase (a) and possibly phase (b) are executed. During phase (a), if the new node detects a leader node, it allocates address from its managed address pool and the new node assumes a member node roll in the leader node cell. If the new node does not detect any leader node in its vicinity, it goes on to the phase b). (b), wherein, if the new node detects a first cell member node, it assumes the role of leader covering a second cell, obtains an available pool of managed addresses and is allocated one of the obtained addresses. | 11-19-2009 |
20090285127 | SYSTEM AND METHOD FOR NETWORK TOPOLOGY DISCOVERY - A system and method for discovering network topology by various switch training and probing methods. Segments are discovered by having computers enter a promiscuous mode and determining from packets sent to a selected computer which computers see which other computers in the network. From the segments, various switch interconnections are determined, by having different computers train switches as to a training address and seeing which computers receive probe packets sent to that training address from another computer. Various training and probing methods are described that locate intermediate segments, deep switches, switch interconnections, and edge and singleton cases. In one implementation, a master computer coordinates the other computers (and devices) in the network to send the training and probing packets, and report on received packets, in order to determine the network topology. | 11-19-2009 |
20090290513 | Filtering of map topology based on network discovery characteristics - Embodiments of the present application enable a user to map a network topology and to then dynamically filter the map display by hiding or showing nodes based on discovery characteristics, such as Simple Network Management Protocol (SNMP) status, Active Directory (AD) Domain Controllers (DC) status, group membership status, etc. to allow customization of maps views. In particular, a topology mapping is formed by collecting topology data of a network and storing this topology data. Filtering criteria are received from a user, and the stored topology data is filtered using this received filtering criteria. The filtered topology data is then displayed to the user. | 11-26-2009 |
20090316606 | METHODS, DEVICES AND SYSTEMS WITH IMPROVED ZONE MERGE OPERATION BY CACHING PRIOR MERGE OPERATION RESULTS - Methods, devices and systems for improved zone merge operations are disclosed. Two connected switches are arbitrated as an initiator and a receiver. The merge operation is initiated only by the initiator on an initiator/receiver inter-switch link. The initiator may initiate a merge request and the receiver may perform the computation of the difference between the old and the new zone. Either the whole configuration or only the differences are communicated between the switches. The merges may be done on a connected switch basis, not on a connected port basis. Only the principle ports in the principle inter-switch-link perform the merge operation. All the remaining ports, i.e. the non-principle ports, adopt the merge result of the principle ports. The zone information may also be cached on each switch such that merge calculations need not be performed again when a merge operation with the same configuration occurs in the future. | 12-24-2009 |
20090323556 | SELF-CONFIGURED NETWORK SYSTEM AND SELF-CONFIGURATION METHOD OF SAME - A self-configured network system includes a server including a plurality of columns. Each column records therein correlation of a domain name to a corresponding network addressing information. An internet protocol device is built therein a preset domain name and acquires an updated network addressing information in the internet. The preset domain name is previously recorded in a specified column of the server. The internet protocol device transfers the preset domain name and the updated network addressing information to the server via the internet so as to locate the specified column and replace the corresponding network addressing information with the updated network addressing information. A user's node is capable of linking to the internet and accessible to the server to acquire the updated network addressing information of the internet protocol device via the internet in response to input of the preset domain name. | 12-31-2009 |
20090323557 | Method and Apparatus for Intertechnology IPv6 Address Configuration - Methods and apparatus for resolving incompatible network configurations are described herein. A mobile device having peripheral devices connected thereto receives a request from a peripheral device, determines whether the address configuration protocol associated with the peripheral device is compatible with the network to which the mobile device is connected, and if not compatible, the mobile device translates the address configuration protocol of the peripheral device to one compatible with the network. | 12-31-2009 |
20100014442 | METHOD AND APPARATUS FOR LOOP PREVENTION IN COMMUNICATION NETWORKS - A method and apparatus route data packets in communication network. A current routing topology of the network is analyzed and a digest value representing the current routing topology is determined. The digest value is encapsulated within the data packet. The data packet is forwarded according to the current routing topology. | 01-21-2010 |
20100014443 | Methods and Systems for Location Estimation - A network operating center for a network comprising known-location and unknown-location nodes can be configured to receive from each unknown-location node estimates of the distances from that node to each of its neighbor nodes. The network controller can then choose an initial location estimate for each unknown-location node and compute distances from the initial location estimates to the corresponding neighbor nodes. The network operating center can then choose subsequent location estimates of the unknown-location nodes by minimizing an error criterion based on a comparison of the received neighbor node distance estimates with the computed neighbor node distances. | 01-21-2010 |
20100020725 | METHOD AND MOBILE TERMINAL FOR SEARCHING HOME NETWORK - A mobile terminal and a method for searching for a home network for the mobile terminal are provided. The method includes performing a full scan for searching for the home network at a certain time after roaming to a visited network, initializing a count of a number of times a timer has expired when the home network is not found, initiating the timer, updating the count when the timer expires, scanning frequencies in a frequency list when the count is less than a certain value, and scanning all frequencies around the mobile terminal when the count is equal to the certain value. | 01-28-2010 |
20100034120 | COMMUNICATION APPARATUS AND CONTROL METHOD THEREFOR - A communication parameter providing apparatus capable of providing a plurality of communication parameter sets to a reception apparatus. The communication parameter selects a communication parameter set which is suitable for and provided to the reception apparatus, based on a device type of the reception apparatus included in a message of automatic communication parameter setting protocol processing. | 02-11-2010 |
20100039960 | Wireless Communication Device, Program, Wireless Communication Method, and Wireless Communication System - A wireless communication device includes: a communication portion that periodically transmits management information for forming a wireless network with at least one wireless communication device, a determination portion that determines, based on one of an attribute and a supply speed of information supplied from a given device, whether to add the information to the management information, and a generation portion that adds the information to the management information according to a determination result of the determination portion. | 02-18-2010 |
20100054156 | SYSTEMS AND METHODS FOR SOFTWARE PROVISIONING IN MULTIPLE NETWORK CONFIGURATION ENVIRONMENT - Embodiments relate to systems and methods for provisioning software to machines in a set of diverse networks. A provisioning (or “cobbler”) server can interact with a remote installation client to initiate a software provisioning process to machines installed on two or more diverse networks, such as local area, wide area, virtual private, or other networks. The remote installation clients in different networks can report the network interface types and configurations of their networks to the cobbler server. During provisioning, the administrator can specify one software distribution to the entire set of diverse networks, and the cobbler server can generate different distribution versions tailored to the network configurations of the various different networks. In embodiments, the cobbler server can maintain a set of network configuration templates to automatically set network settings such as static IP addresses, gateway information, hostname information, network mask information, and other settings for the different network types. | 03-04-2010 |
20100061274 | AUTOMATIC TERMINATION PATH CONFIGURATION - There is provided herein a system and method for automatic configuration of data routings for use with electronic data such as phone calls, faxes, etc. In the preferred embodiment, when more than one carrier might potentially terminate the transmission, the carriers are ordered based on some screening criterion (e.g., transmission price). Data transmissions are then assigned to the carriers based on the sorting order, with the second place and lower carriers (e.g., the higher priced carriers) not being selected unless the first carrier cannot complete the transaction. The switch instructions necessary to implement this scheme are generated automatically. | 03-11-2010 |
20100061275 | Algorithm for Network Route Selection - A method for selecting a path in a physical network that selects nodes for the path based on the coordinates of the nodes in a representation of the subject network in space. From a working node M that is included in the selected path, the next node that is selected for the path is a node N such that (a) a link MN exists, and (b) the link MN forms an angle relative to a line that connects working node with the destination node that is smaller than the angle that any other link from node M forms with the line that connects working node with the destination node | 03-11-2010 |
20100085898 | METHODS FOR DETECTING ROUTING LOOPS BETWEEN HOME AGENTS - Certain aspects of the present disclosure provide methods for detecting a routing loop between at least two home agents utilizing the mobile internet protocol (MIPv6) standard. In a first method, the home agent sends a test message to the last care of address associated with a mobile node and receives a reply if there is no loop. In a second method, the home agent parses a packet and checks if the address of any of the inner headers matches the address of the home agent to find a loop between home agents. | 04-08-2010 |
20100110933 | Change Management of Model of Service - A system for managing a computer implemented service, according to given requirements has a template ( | 05-06-2010 |
20100128639 | METHODS AND SYSTEMS FOR SUPPORTING MULTIPLE NAME SERVERS IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can be configured to include a network configuration module that can set-up, configure, and manage network connections served by the provisioning server including name servers, such as Domain Name System (DNS) servers, in the network connections. The provisioning server can be configured to maintain a set of network modules, each network module corresponding to a different type of name server. Each of the network modules can be configured to include logic for generating or altering a configuration file for the corresponding type of name server. | 05-27-2010 |
20100128640 | APPARATUS AND METHOD FOR CALCULATING AN OPTIMUM ROUTE BETWEEN A PAIR OF NODES IN A COMMUNICATION NETWORK - A node apparatus and method for calculating a route between a pair of nodes in a communication network. There is provided a topology table for storing topology information on links being used by an existing path in the communication network, and a virtual topology table is generated. The virtual topology table stores topology information in which links being used by the existing path are virtually released and made unused. An optimum route for a path connecting a pair of nodes in the communication network is computed on the basis of the virtual topology table. | 05-27-2010 |
20100142408 | Designing minimum total cost networks using iterative rounding approximation methods - Minimum cost networks, such as fiber optic networks used in telecommunications, are obtained by defining available network elements having cost, required pairs, connectivity and penalty cost values and selecting from these available elements using an iterative rounding approximation method that constructs an LP relaxation incorporating the element parameters, finds an optimal basic solution, applies a selection criterion to pairs and edges in the optimal basic solution, and constructs a residual LP relaxation with selected pairs and edges. By fixing selected pairs and edges values to 1 in the residual LP, successive iterations of the method provide a design which is a 3-approximation solution to the minimum cost design problem. | 06-10-2010 |
20100142409 | Self-Forming Network Management Topologies - The present invention relates to a network management system, a network element and a method for managing the network management system, the system operating in a computer or telecommunication network. The network comprises at least one network element that is able to communicate in the network through links. A network management software is contained and run on the network element. According to the present invention the network management software comprises controlling means for each management function or functions that the network element is part of, the controlling means being able to form, reform and/or terminate the topology for the management function. It further comprises register means for each management function or functions that the network element is part of, the register means being able to register and share information about the topology for the management function. | 06-10-2010 |
20100142410 | SYSTEM AND METHOD FOR PROVIDING VIRTUAL PRIVATE NETWORKS - A computerized system and method for automatically determining customized configurations for each of a plurality of endpoints of a virtual private network (VPN) and deploying the configurations to the endpoints, comprising: accepting, using an interface, parameters required for building the configurations from a user, the configurations enabling the endpoints to process a mixture of time sensitive and non-time sensitive data, and the parameters comprising: endpoint IP addressing scheme information and network design information; automatically generating, using at least one configuration engine, complete customized endpoint configurations for the parameters, and instantiating the configurations based on endpoint hardware-specific information, with no further input required from the user; and deploying, using a scheduler, the configurations to the endpoints of the at least one VPN, wherein the VPN is an mGRE VPN using NHRP protocol. | 06-10-2010 |
20100150028 | DISTRIBUTING CUSTOMER LOCATION ACCESS LINKS ACROSS NETWORK PROVIDER NODES DURING NETWORK PLANNING - A computing-device implemented network planning process distributes access links associated with customer locations to selected nodes of a provider network. The network planning process distributes the access links associated with the customer locations to the selected nodes of provider network such that overall latency goals for the network are met and such that the density of the connected customer locations to the network nodes in the network satisfy density requirements. The network planning process seeks diversity in customer location assignments by creating additional capacity through the re-assignment of customer locations to alternate network nodes in order to free up space on network nodes needed to off-load customer locations from other over-loaded network nodes. The network planning process permits an expanded ring of network nodes to accommodate dense customer traffic load across a wide area while meeting both individual connection and overall system requirements. | 06-17-2010 |
20100165883 | RING TOPOLOGY DISCOVERY MECHANISM - A method automatically discovers a topology of a communication network ring. The ring includes a plurality of nodes. Each node includes a first port and a second port. A ring topology request or a response to the ring topology request is received from at least one node on the ring. The ring topology request or the response to the ring topology request includes an identification of the at least one node and an indication of a hop count needed to reach the at least one node. The ring topology request or the response to the ring topology request is forwarded to at least one neighboring node on the ring through the first port. The topology is determined based on the identification of the at least one node, the hop count, and an identification of the first port. | 07-01-2010 |
20100172270 | Distributed Storage of Routing Information In a Link State Protocol Controlled Network - A distributed hash table is implemented to store routing information on a network. Node IDs exchanged in connection with implementation of a link state routing protocol are used as keys in the distributed hash table, and routes are stored at one or more nodes on the network. When a route is learned, the route is processed against the set of keys to determine which nodes should store the route. When a route is needed, the route is processed against the set of keys to determine which nodes should have the route information. The manner in which the route is processed against the set of keys is the same in both instances, so that the DHT may be used to store and retrieve route information on the network. The DHT may be implemented to store MAC addresses, IP addresses, MPLS labels, or other information of interest to enable routes to be stored and learned by network elements on the network. | 07-08-2010 |
20100189014 | SYSTEM AND METHOD OF DISTRIBUTING NODE CONFIGURATION INFORMATION - A system of distributing node configuration information to a plurality of nodes in an event is provided. The system includes a first node, a second node operatively connected to the first node, and an event manager operatively connected to the first node and the second node. The event manager transmits the node configuration information to the first node and the second node, and transmits an indication to the first node and the second node to initiate communication between the first node and the second node using the node configuration information. | 07-29-2010 |
20100195537 | Service configuration assurance - Systems, methods, and other embodiments associated with service configuration assurance are described. One example method includes generating an expected device configuration model based at least in part on service information for a network device. The example method may also include comparing this expected device configuration model with an actual device configuration model for the network device. The example method may also include generating a service-impact event notification when a likely service-impacting configuration change is detected. | 08-05-2010 |
20100195538 | METHOD AND APPARATUS FOR NETWORK PACKET CAPTURE DISTRIBUTED STORAGE SYSTEM - This is invention comprises a method and apparatus for Infinite Network Packet Capture System (INPCS). The INPCS is a high performance data capture recorder capable of capturing and archiving all network traffic present on a single network or multiple networks. This device can be attached to Ethernet networks via copper or SX fiber via either a SPAN port ( | 08-05-2010 |
20100195539 | SYSTEM AND METHOD FOR SUPPORTING AUTOMATIC ESTABLISHING AND DISCONNECTING SEVERAL WIRELESS CONNECTIONS - A method for automatically establishing wireless connections between a plurality of grouped wireless devices and a third party wireless device, comprising the steps of: forming a connection group having a first wireless device and at least one additional grouped wireless device; configuring a connection table to record connection group attribute parameters for the connection group, the connection group attribute parameters including connection parameters of said first wireless device and other grouped wireless devices; configuring the first wireless device in the connection group such that it is capable of establishing a wireless connection with a third party wireless device; and establishing an additional wireless connection between the third party wireless device and the wireless devices of the group if the additional wireless connection satisfies a connection parameter specified by the connection table in the connection group. | 08-05-2010 |
20100208621 | Method, System and Nodes for Network Topology Detection in Communication Networks - Method for switching to an appropriate network topology type in a telecommunication network including of a node (b) sending to a further node a message (M | 08-19-2010 |
20100208622 | METHOD FOR ROUTING INFORMATION OVER A NETWORK EMPLOYING CENTRALIZED CONTROL - A method and apparatus for centralized control of a network is described. The network includes a number of nodes. The method includes creating a database and storing the database on a master node of the network. The database contains topology information regarding a topology of the network. Each of the nodes is coupled to at least one other of the nodes, with the master node being one of the nodes. | 08-19-2010 |
20100214956 | Controlling the use of access points in a telecommunications networks - A mobile telecommunications network includes a radio access network comprising base stations and one or more additional access points. An access point is connected to a network core by an IP transport broadband connection. The access point is configured to appear to the mobile terminal as a conventional base station—that is, for example, it communicates with the mobile terminal using GSM or UMTS transport protocols and does not require any modification to a standard GSM or UMTS mobile terminal. Access Points may not be under the direct control of the network provider, and so are more susceptible to security threats. The described system allows the network provider to verify that the access point through which a mobile terminal is about to communicate is a legitimate and trusted base station and/or is at a particular location. Differential charging may be performed in dependence upon a subscriber's location. | 08-26-2010 |
20100214957 | Method for network design to maximize difference of revenue and network cost - A method determines an optimal or near-optimal conveyance network layout in which revenue from serviced customer locations is maximized while the cost of installing and/or maintaining the conveyance is minimized. The conveyance may, for example, be a fiber optic telecommunications cable or a power or utility distribution system. Algorithms in the method generate primal and dual bounds in a Prize-Collecting Steiner Tree Problem in Graphs (PCSPG). Those algorithms originate from a Lagrangian Non-Delayed Relax-and-Cut (NDRC) based approach and incorporate ingredients such as a new PCSPG reduction test, an effective Local Search procedure and a modification in the NDRC framework that allows additional reductions in duality gaps to be attained. | 08-26-2010 |
20100214958 | System and Method for Scanning When Operating in Different Regulatory Domains - A user agent including a bus, a network connectivity device connected to the bus, and a memory connected to the bus. The memory stores contents of an elementary file containing a list of wireless local area network (WLAN) based frequencies, which may be public land mobile network (PLMN) frequencies. The contents of the elementary file further contain at least one entry relating to at least one of regulatory domain information and channel allocation information. The UA also includes a processor connected to the bus. The processor is configured to update the list based on the at least one entry and to promote initial access point scanning of the WLAN based frequencies according to an order specified in the updated list. | 08-26-2010 |
20100214959 | AUTOMATIC NETWORK ADDRESS ASSIGNMENT IN A WIRELESS MESH - A computing environment containing a mesh network that is adapted to provide a reliable transport mechanism over which services may be delivered. Nodes of the mesh can automatically select routable addresses without conflicts, which allows nodes of the mesh to be accessed, even as the mesh changes through the addition or deletion of nodes. Also, nodes communicate with a protocol that supports service advertisements. These advertisements can identify mesh nodes that supply services, such as file or print servers, for which devices that have not yet connected to the network may be searching. Advertisements can also identify services to be used by nodes in the network, allowing, for example, a node to select a gateway providing a reliable connection to an external network. The mesh network can be used as a transport for communication using protocols, such as TCP/IP, that generally exhibit poor performance when using unreliable transports. | 08-26-2010 |
20100214960 | Method for establishing bidirectional data transmission paths in a wireless meshed communication network - The invention relates to a method for establishing a bidirectional data transmission path in a wireless meshed packet-switched communication network, wherein a logical topology in the form of at least one routing tree can be proactively established, wherein a root network node (R) of the routing tree sends first unidirectional data transmission paths regarding routing request messages (RANs) specifying the root network node (R) to the network nodes (M | 08-26-2010 |
20100220632 | Access Point and Node for Controlling Routing in a Hybrid Network - An access point ( | 09-02-2010 |
20100246443 | PROVIDING LOGICAL NETWORKING FUNCTIONALITY FOR MANAGED COMPUTER NETWORKS - Techniques are described for providing logical networking functionality for managed computer networks, such as for virtual computer networks provided on behalf of users or other entities. In some situations, a user may configure or otherwise specify a network topology for a virtual computer network, such as a logical network topology that separates multiple computing nodes of the virtual computer network into multiple logical sub-networks and/or that specifies one or more logical networking devices for the virtual computer network. After a network topology is specified for a virtual computer network, logical networking functionality corresponding to the network topology may be provided in various manners, such as without physically implementing the network topology for the virtual computer network. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users. | 09-30-2010 |
20100246444 | METHOD FOR REGISTERING IN AN IMS DOMAIN A NON-IMS USER DEVICE - A flexible technique for registering in an IMS domain ( | 09-30-2010 |
20100246445 | Method for Maintaining Links in a Mobile Ad Hoc Network - The present disclosure relates to mobile ad hoc networks, and to ad hoc networks using aircraft in particular. A method of maintaining data links to and from a source node in an ad hoc mobile network is provided. The network comprises nodes including neighbour nodes corresponding to nodes within range for direct communication with the source node. The neighbour nodes comprise active neighbour nodes and inactive neighbour nodes, the active neighbour nodes being connected to the source node via respective active data links and the inactive neighbour nodes having respective inactive data links to the source node. One or more lost neighbour nodes are identified and revised configurations of data links are considered that account for the change in neighbour nodes. A new configuration is selected based at least partly on the cost of sending messages from the source node using the revised configurations. | 09-30-2010 |
20100260070 | Localized construction of fault resilient high capacitywireless networks with bounded node degree - Embodiments described include methods of determining neighboring nodes with which to link a subject node in a wireless communication network. Depending on the network preferences, the links between neighbor nodes and the subject node may include high capacity links or fault resilient high capacity links. The number of neighboring nodes may be as high as ten in a fault resilient high capacity network and five or less for a high capacity network. | 10-14-2010 |
20100265848 | SYSTEM FOR AUTOMATIC CONFIGURATION OF A MOBILE COMMUNICATION SYSTEM - A communication system includes a receive antenna for receiving communication signals, processing circuitry for processing the received communication signals and repeating the signals for further transmission and at least one transmit antenna for transmitting the repeated signals. The processing circuitry utilizes configurable settings for controlling the operation of the communication system and the configurable settings are variable for varying the operation of the system. The processing circuitry is further operable for receiving inputs regarding current operating conditions of the communication system and for selectively adapting the configurable settings of the system based upon the operating condition inputs. | 10-21-2010 |
20100271979 | Methods To Facilitate Automatic System Configuration - An Evolved Packet Core/Mobility Management Entity (EPC/MME) and evolved Node B (eNB) automatically provide a list of key capabilities or features they each support as soon as possible via their shared interface. Therefore, the MME and eNB are each aware of the supported features of the other and what corresponding procedures each can trigger during normal operation. By extension, the approach involves a similar mechanism between peer eNBs over their shared interface. Thus, key capabilities or features supported by the MMEs and/or eNBs are shared to enhance interoperation. | 10-28-2010 |
20100278078 | CONFIGURATION MANAGEMENT OF IP/MPLS ROUTER RINGS - The invention is directed to managing changes to a configuration of routers connected in a ring network architecture. Embodiments of the invention alleviate risks to services carried over a ring of IP/MPLS routers when configuration changes are made to the ring, such as inserting a router into, or removing a router from, the ring. To that end, embodiments of the invention automate some steps of such a configuration change operation that were previously performed manually, and coordinate those steps with other steps of the operation using a procedure stored as instructions on a computer readable media and executed by a computer system in order to effect and validate a correct sequencing of the steps. | 11-04-2010 |
20100278079 | APPARATUS AND METHOD FOR DETERMINING A COINCIDENCE OF A POSITION WITH A REFERENCE POSITION - An apparatus for determining a coincidence of a position with a reference position, wherein radio signals from fixedly positioned radio transmitters can be received at the position, having a provider for providing properties of the radio signals of the fixedly positioned radio transmitters at the position, wherein the provided properties of the radio signals include transmitter identifications identifying the radio transmitters, a separator for separating the radio transmitters into a first number of radio transmitters previously recorded transmitter identifications of which at the reference position are identical with transmitter identifications provided at the position, and into a second number of radio transmitters previously recorded transmitter identifications of which at the reference position and transmitter identifications provided at the position are different, and a determiner for determining a measure of matching for the position on the basis of the provided properties of the radio signals, wherein both properties of the first number of radio transmitters and properties of the second number of radio transmitters are taken into account in the determination of a measure of matching, and wherein the properties of the first number of radio transmitters and the properties of the second number of radio transmitters enter the measure of matching differently. | 11-04-2010 |
20100302975 | QUALITY-DRIVEN OPTIMIZATION OF SENSOR STREAM PROCESSING - A system and method to perform data quality driven optimization of data are described. In one embodiment, a method is presented to iteratively test configurations of a data processing path until a configuration that processes data to predefined quality requirements is identified. In one embodiment, a system is presented. The system includes a data quality initialization module, a primary data stream processing module and an optimization module that is incorporated in a memory chip on a computer processor. | 12-02-2010 |
20100309819 | System and method for effectively implementing an enhanced router device - A system and method for enhancing electronic network communications includes an electronic network that is configured to include a plurality of distributed computer devices. A enhanced router device is coupled to the electronic network to support bi-directional communications. At least one electronic device communicates with the electronic network through the router device. A device support module of the router device cooperates with a device manager of the electronic device to automatically perform appropriate device configuration and management procedures for said electronic device. | 12-09-2010 |
20100329154 | Efficient calculation of routing tables for routing based on destination addresses - There is a method and a device allowing the distributed calculation of routing tables for routing in a communication network containing nodes and links. The calculation of routes to be used is carried out in centrally. Data relating to the routes to be used are transmitted to a node which, based on said information, generates a routing table by assigning packet addresses to the routes. The central calculation of the routes results in an increased efficiency of resources while requiring less calculation effort which is particularly advantageous in the context of networks comprising multipath routing where the calculation of routing tables is very complex. A further reduction in effort can be achieved by means of the central calculation of the distribution weightings. | 12-30-2010 |
20110007669 | Method and Apparatus for Controlling Packet Transmissions Within Wireless Networks to Enhance Network Formation - Network formation in wireless networks according to an embodiment of the present invention is enhanced based on control of network formation packet transmissions (e.g., Packet Radio Organizational Packet (PROP) transmissions). A source-initiated approach controls re-transmission of inquiry/reply PROP packets based on the presence of a neighboring node. This reduces the size and amount of PROP packets transmitted during neighbor discovery. In addition, the source-initiated approach controls re-transmission of PROP packets indicating a change in an upstream or control type node (e.g., LNC PROP). In this case, the node determines the presence of steady-state conditions (e.g., maintenance of conditions for the original LNC PROP transmission), and enables a single re-transmission of the LNC PROP packet, thereby reducing the transmission of unnecessary or duplicate LNC PROP packets (e.g., containing substantially the same information as previously transmitted packets since conditions have remained the same). | 01-13-2011 |
20110007670 | Stacking System and a Method for Switching Traffic in the Stacking System - The invention provides a stacking system and a method for traffic switching in the stacking system, comprising: when newly joined devices in the stacking system make the daisy chain topology change to ring topology, block a stack port of one of the newly joined devices; after the devices in the stacking system perform another topology convergence process, the master restores the configuration of the newly joined devices; after the configuration of the newly joined device one of whose stack ports is blocked is restored, it sets its blocked stack port to the forwarding state, calculates the shortest path based on the ring topology, and sends first notification packets for topology change from daisy chain type to ring type through its two stack ports; each device that receives the first notification packets re-calculates its shortest forwarding path respectively and switches the traffic, and then forwards the first notification packets. This invention can prevent traffic interruption that occurs when the topology of a stacking system changes from daisy chain to ring. | 01-13-2011 |
20110007671 | METHOD FOR ACQUIRING INFORMATION, USER EQUIPEMENT, AND NETWORK EQUIPMENT - A method for acquiring information includes: receiving an Internet Protocol (IP) address acquisition request or Packet Data Network (PDN) address allocation information sent by User Equipment (UE); determining a PDN address capability according to the IP address acquisition request or the PDN address allocation information; and sending the determined PDN address capability to the UE. An UE and network equipment are also provided. The PDN address capability is determined by the network and is sent to the UE, so as to indicate to the UE the IP address information that may be acquired in a current PDN connection, such that when the network cannot provide an IP address for the UE any more, the UE is prevented from acquiring other IP addresses in other manners, avoiding service abnormality. | 01-13-2011 |
20110019589 | CONTROL METHOD OF SINGLE-FREQUENCY NETWORK AND A CONTROL ENTITY OF A SINGLE-FREQUENCY NETWORK - This invention discloses a control method of a single-frequency network and a control entity of a single-frequency network. The control method of the single-frequency network provided by this invention comprises: obtaining the service request information sent by a user terminal; changing the single-frequency network according to the service request information. The control entity of the single-frequency network provided by this invention comprises: an obtaining unit, used for obtaining the service request information sent by a user terminal; a controlling unit, used for changing the single-frequency network according to the service request information. This invention realizes the dynamic control of a single-frequency network by changing the single-frequency network according to the service request information sent by a user terminal. Consequently, the service provider can dynamically change a single-frequency network according to the requirement of users and implement the optimization configuration of wireless network resources. | 01-27-2011 |
20110019590 | NEIGHBOR DISCOVERY USING ADDRESS REGISTRATION PROTOCOL OVER ELMI - A system and method for mapping a network to facilitating configuration is disclosed. Address registration information is appended to an enhanced local management interface message sent between devices in a network of routers and switches. A network management system for an outside network can use that information to map out the network and configure the network as needed. The address registration information includes an Internet Protocol address and an interface index. The interface index includes both slot and port number. | 01-27-2011 |
20110032844 | Method and System for Configuring Wireless Routers and Networks - A method and system for configuring a wireless router and a wireless communications network includes establishing connectivity between a wireless router and at least one wireline router. Connectivity between the wireless router and a plurality of neighboring wireless routers is established through the wireline router. The wireless router is configured based on information exchanged with the neighboring wireless routers through the wireline router. | 02-10-2011 |
20110044209 | SYSTEMS AND METHODS FOR PROVIDING A QUIESCING PROTOCOL - The systems and methods of the present invention provide a quiescing protocol. In one embodiment, nodes of a system utilize the protocol to complete processing until they reach a consistent state. In one embodiment, a coordinator initiates the quiescing process and the nodes communicate with each other to determine whether their messages have been processed and communicate with the coordinator to determine when all of the messages have been processed. | 02-24-2011 |
20110051626 | SYSTEM AND METHOD FOR WIRELESS NODE CONNECTION - Systems and methods for wireless node connection are provided. The system includes a first wireless node and a second wireless node connected to a network. The first wireless node transmits a beacon packet with at least one connection parameter corresponding to the first wireless node. The second wireless node receives the beacon packet from the first wireless node, and analyzes the beacon packet to obtain the connection parameter corresponding to the first wireless node. The second wireless node wirelessly connects to the first wireless node according to the connection parameter. At least one wireless terminal connects to the network via the first wireless node and the second wireless node. Wireless network deployment often requires a wireless node to construct wireless link to another wireless node. Such deployment type is commonly used in point-to-point or point-to-multipoint wireless infrastructure. A push-to-connect algorithm is used to support the automatic wireless connection among multiple wireless nodes. A time synchronization key exchange algorithm is used to enhance the security of any wireless link between two wireless nodes. | 03-03-2011 |
20110051627 | NEURAL NETWORK-BASED MOBILITY MANAGEMENT FOR HEALING MOBILE AD HOC RADIO NETWORKS - A self healing ad hoc communications network and method of training for and healing the network. The network includes wireless devices or nodes that include a neural network element and the ad hoc network operates as a neural network. Some of the nodes are designated as healing nodes that are identified during network training and are strategically located in the network coverage area. Whenever one group of nodes loses connection with another a healing node may reposition itself to reconnect the two groups. Thus, the network can maintain connectivity without constraining node movement. | 03-03-2011 |
20110058502 | METHOD AND SYSTEM FOR MANAGING LINE TOPOLOGY - A method and system for managing a line topology is provided by the embodiments of the disclosure. The method for managing a line topology includes obtaining an actual transfer function of the line according to the actual transfer function of the line and a transfer function of the bridge tap model, estimating a diameter and length of the bridge tap of the line and a diameter and length of the trunk line of the line according to the estimated diameter and length of the bridge tap and the diameter and length of the trunk line, obtaining a transfer function of the line model that includes the location parameter of the bridge tap by comparing the error between the actual transfer function and the transfer function of the line model which includes the location parameter of the bridge tap, estimating the position of the bridge tap according to the estimated diameter and length of the trunk line and the diameter and length of the bridge tap and the location of the bridge tap, and generating a topology of the line. By applying the embodiment of the disclosure to maintain and manage the line topology, the location of the bridge tap can be estimated effectively, and the line topology can be obtained. | 03-10-2011 |
20110064000 | DEVICE AND METHOD FOR MEASURING LOCATION OF TERMINAL - A terminal location measuring device includes a database for storing registration information of a plurality of access points (AP's) forming a first infrastructure system for wireless LAN-based indoor location determination. The terminal location measuring device sets a search range of a database by using location information of the terminal acquired through a second infrastructure system that is different from the first infrastructure system, an identifier of at least one of a plurality of AP's, and a signal measurement value. The terminal location measuring device extracts registration information of an AP having the same identifier as at least one AP within the search range of the database, and measures a location of the terminal by using registration information of the AP. | 03-17-2011 |
20110069641 | Estimating User Device Location in a Wireless Network - A method of estimating user location involving collecting data from the access points in the network. The data can then be used to define a relationship, for example the loss of power experienced by a transmitted signal, between the access points. The relationship can be stored within a matrix, database or any other suitable storage method that can be referenced to determine the position of a user device within the network and correlated with corresponding measurements from a user device to determine the location of the user device within the network. | 03-24-2011 |
20110075591 | METHOD AND APPARATUS FOR LOOKING UP CONFIGURATION INFORMATION FOR A NETWORK NODE - One embodiment of the present invention provides a system for looking up location-specific configuration information for a network node or a subnet. During system operation, a network node creates a query message containing a key that comprises an Internet Protocol (IP) prefix and a string, wherein the IP prefix identifies the network node or the subnet, and the string specifies the type of configuration information. The network node then sends the query message to a name server, which is part of a distributed system that provides a global naming service, wherein the name server additionally stores configuration information. Finally, the network node receives a response message from the name server, wherein the response message contains the requested configuration information. | 03-31-2011 |
20110080851 | METHOD AND APPARATUS FOR TOPOLOGY AGGREGATION AND ROUTING CONTROLLER - The present invention provides a method and an apparatus for topology aggregation and a routing controller. The method comprises: obtaining a link-diversity path number c(i,j,λ | 04-07-2011 |
20110080852 | COMMUNICATION APPARATUS HAVING NETWORK INTERFACES, COMMUNICATION METHOD, AND STORAGE MEDIUM - A communication apparatus that enables a device on a searching side to obtain a single search result, thereby reducing user confusion, even when the same search packet is received by network interfaces of the apparatus. The communication apparatus of a device on a searched side receives a search packet via one of a first and second NIC of the apparatus from a device on the searching side, and determines whether information that is same as information indicating the received search packet is stored. If the information is stored, one of the NICs to be used to respond to the search packet is selected, a response message is created, and the created response message is transmitted via the selected NIC to the device on the searching side. And if the information is not stored, the information indicating the search packet is stored. | 04-07-2011 |
20110080853 | DIRECTED ACYCLIC GRAPH DISCOVERY AND NETWORK PREFIX INFORMATION DISTRIBUTION RELATIVE TO A CLUSTERHEAD IN AN AD HOC MOBILE NETWORK - Each mobile router in an ad hoc mobile network is configured for concurrently attaching to multiple parents advertising respective parent depths relative to a clusterhead of the ad hoc mobile network. The mobile router selects an advertised depth relative to the clusterhead based on adding a prescribed increment to a maximum one of the parent depths, enabling the mobile routers to form a directed acyclic graph relative to the clusterhead. Each mobile router sends to each of its parents a neighbor advertisement message specifying at least one reachable prefix, a corresponding cost for reaching the reachable prefix, and a corresponding sequence identifier that enables the parents to validate the neighbor advertisement message relative to stored router entries. Hence, mobile routers automatically can form a directed acylic graph relative to the clusterhead, and can distribute routing information with minimal overhead. | 04-07-2011 |
20110090820 | SELF-OPTIMIZING WIRELESS NETWORK - Optimizing a plurality cell sites or sectors in a wireless network including receiving network data regarding a plurality of cell sites or sectors; determining a critical zone in which communication is degraded; determining best neighbor cell sites or sectors among the neighbor cell sites or sectors associated with the critical cell sites or sectors; determining if the critical cell sites or sectors in the critical zone have available resources for achieving a desired improvement in communications; determining if the best neighbor cell sites or sectors have available resources for achieving the desired improvement in communications; and altering wireless network parameters of the critical cell sites or sectors, or the best neighbor cells sites or sectors for achieving the desired improvement in communications. Altering wireless network parameters of the critical cell sites or sectors, or the best neighbor cell sites or sectors is performed continuously until the desired improvement in communications in the wireless network is achieved. | 04-21-2011 |
20110090821 | DIRECT LINK SETUP METHOD AND CHANNEL ALLOCATION METHOD IN MULTI-CHANNEL WIRELESS COMMUNICATION NETWORK - Provided are a direct link setup procedure and a channel allocation mechanism in a multi-channel wireless communication network. The method includes transmitting a direct link setup request message comprising request information for specifying one or more channels, each of which desires to set up a direct link, among multiple channels, and receiving a direct link setup response message comprising response information for setting up the direct link to one or more channels in response to the direct link setup request message. | 04-21-2011 |
20110103264 | METHOD AND APPARATUS FOR PEER DISCOVERY IN A WIRELESS COMMUNICATION NETWORK - Apparatus and methods of peer discovery in a communications network include generating a discovery request configured to identify a Tunneled Direct Link Setup (TDLS) capable peer device, transmitting the discovery request, and determining if a discovery response is received in response to the discovery request. In an aspect, the apparatus and methods may encapsulate the discovery request in a data frame such that the discovery request is transparent to an access point. In other aspects, the apparatus and methods may form the discovery request by appending TDLS capability information to a probe request. Additionally, the apparatus and methods may include determining if a discovery response is received in response to the discovery request. Thus, the apparatus and methods provide a deterministic method of peer discovery, so that a list of potential peers that are TDLS capable can be available before attempting a TDLS direct link setup. | 05-05-2011 |
20110110271 | IMS-BASED DISCOVERY AND CONTROL OF REMOTE DEVICES - The present invention faces the issues of remotely controlling multiple LAN-attachable devices ( | 05-12-2011 |
20110110272 | DEVICE AND METHOD FOR GENERATING TRAFFIC ENGINEERING TOPOLOGY - A topology generating device of a network for transmitting/receiving a routing packet to/from at least one router receives a routing packet from the at least one router, determines whether the routing packet is a traffic engineering advertisement message, and generates traffic engineering topology by using the traffic engineering advertisement message when the routing packet is the traffic engineering advertisement message. | 05-12-2011 |
20110110273 | WAVEFORM FOR USE IN MOBILE AD HOC NETWORKS - A waveform and related devices and methods are disclosed for dynamic use of an air interface in a mobile ad hoc network. The waveform includes a dual preamble sequence enclosing self-discovery data that characterizes modulation for a subsequent data signal. The preamble is designed so that the circular correlation of the preamble sequence with itself is an impulse, and the first preamble sequence is a complex conjugate of the second preamble sequence. The preamble sequence can be used to bound a data packet on both sides so that detection of the impulse yields a window in which a data packet can be located, while the self discovery data provides information to extract the data signal from the wireless waveform. In one aspect, the preamble may be implemented using a CHIRP sequence that is a perfect square for more efficient implementation in a wireless modem. In addition, CHIRP sequences for different nodes can be generated with low cross-correlation to reduce interference among nodes in the MANET. The preamble may also support channel sounding or equalization to reverse amplitude or phase distortion in a channel. | 05-12-2011 |
20110116416 | System and method for geographically optimized wireless mesh networks - A geographically optimized wireless mesh network comprises: a radio communications device to intelligently route information through a tracking, sensing, or communications network; a sensing device to sense conditions affecting the device or associated items; and, a communication system configured to transmit the output of the sensing device to a system administrator located remotely from the container. The geographically optimized wireless mesh devices may be capable of two-way communication with the system administrator, whereby the administrator may interrogate the devices at selected times. The locking device contains redundant location determination technologies whereby its geographic location is used to optimize the node and network performance. | 05-19-2011 |
20110116417 | METHOD AND APPARATUS FOR DETERMINING PING INTERVAL OF ACTIVESYNC SERVICE IN WIRELESS COMMUNICATION TERMINAL - A method and an apparatus for determining a Packet INternet Groper (PING) interval of an ActiveSync service in a wireless communication terminal are provided. The method includes determining an initial PING interval of a first account among the plurality of accounts, and determining PING intervals of the remaining accounts, with the exception of the first account, as an integer multiple of the initial PING interval. | 05-19-2011 |
20110128889 | Method for Selecting and Configuring Network Supernodes - A method for selecting and configuring network supernodes including the following operational steps: in a first set period T | 06-02-2011 |
20110128890 | METHOD, SYSTEM AND DEVICE FOR CONFIGURING TOPOLOGY OF A WIRELESS NETWORK - Methods, devices and computer program products facilitate self-configuration and self-optimization of radio networks. An internal topology discovery is performed to assess characteristics of a plurality of access points within an internal network. An external cell discovery can also be performed to identify one or more access points operating within an external network. Based on the assessments obtained through the internal and/or external topology discovery processes, operational parameters are assigned to each access point within the internal network. Such operational parameters can include a transmit power associated with each radio node. | 06-02-2011 |
20110128891 | MANAGING AND PROVISIONING VIRTUAL ROUTERS - Methods and systems are provided for provisioning and managing network-based virtual private networks (VPNs). According to one embodiment, a routing configuration for each of multiple network-based customer VPNs is generated for multiple customers based on (i) site reachability information for multiple service processing switches and (ii) a global customer routing profile for a network-based customer VPN of the plurality of network-based customer VPNs. Multiple virtual routers (VRs) distributed among the service processing switches are provisioned to support the network-based customer VPNs based on the routing configurations. A custom routing profile, identifying one or more routing protocols to be used for one or more segments of the network-based customer VPN profile, is received for the network-based customer VPN. The network-based customer VPN is automatically reconfigured by programmatically generating appropriate routing configurations for VRs partitioned to the network-based customer VPN based on the site reachability information and the custom routing profile. | 06-02-2011 |
20110134801 | NETWORK DEVICE, AND CONTROL METHOD AND STORAGE MEDIUM THEREFOR - A network device capable of performing auto-negotiation at a proper communication speed. In the network device, a cable speed setting unit decides, based on LAN cable category information, a maximum communication speed that can be guaranteed by a LAN cable connected to a physical layer circuit of the network device, and a speed decision unit compares the maximum communication speed notified from the cable speed setting unit with each of communication speeds that can be set for the physical layer circuit and decides an upper limit communication speed for use when a communication speed is decided by auto-negotiation. | 06-09-2011 |
20110149805 | NETWORK GROUP DETERMINATION DEVICE AND METHOD, AND STORAGE MEDIUM OF STORING NETWORK GROUP DETERMINATION PROGRAM - A network group determination device includes an acquisition section, a comparison section and a determination section. The acquisition section acquires first communication information representing a state of communication between a first repeater on a network and a specific network group on the network, and second communication information representing a state of communication between a second repeater on the network and the network group. The comparison section makes a comparison of a difference between the first communication information and the second communication information to third communication information between the first repeater and the second repeater. The determination section makes, according to a result of the comparison by the comparison section, a determination of a position of the network group with respect to the first repeater and the second repeater. | 06-23-2011 |
20110149806 | METHOD AND APPARATUS FOR SERVICE DISCOVERY IN WI-FI DIRECT NETWORK - A method and an apparatus for service discovery in a Wi-Fi direct (WFD). The method includes: generating by a first WFD device a service discovery request frame for discovering whether a service is supported by a second WFD device in the WFD network; transmitting the generated service discovery request frame from the first WFD device to the second WFD device; and receiving at the first WFD device a service discovery response frame from the second WFD device in response to the transmitted service discovery request frame, wherein the service discovery request frame and the service discovery response frame are generated by using a Wi-Fi protected setup (WPS) information element (IE). | 06-23-2011 |
20110164533 | Methods and systems using PLD-based network communication protocols - Methods and systems for a PLD-based network update transport (PNUT) protocol that utilizes UDP and other protocols for transmitting update or other commands or information over a packet-based or IP network. PNUT is a hardware-based network communication protocol that does not require the full TCP/IP stack and may be utilized for exchanging commands and information with such PLD-based and other devices. Protocols may include a set of core commands and a set of custom commands. Logic components within the PLD-based devices may consist of a command dispatcher, a transmitter/controller, a MAC receiver, a MAC transmitter, a packet parser, a packet generator, and core receiving and transmitting commands. The present invention may be implemented without requiring CPU cores, special controllers, stringent timings, or operating systems as compared with conventional network protocols. Various methods for exchanging and updating PNUT commands are disclosed. The methods and systems of the present invention may be utilized to provide other functions, such as filtering, logging, polling, testing, debugging, and monitoring, and may be implemented between a server and a PLD-based device or solely between PLD-based devices. | 07-07-2011 |
20110176458 | METHODS AND DEVICES FOR COMPUTING PATHS TO ASSURE THE INTER-DOMAIN TRANSPORT OF QoS SENSITIVE INFORMATION - Information can be transported over domains operated by different service providers at required Quality-of-Service (QoS) levels without disclosing inter- and/or intra-domain information to ensure that the topology of a given service provider's domain (e.g., network) is not disclosed. | 07-21-2011 |
20110205935 | Frequency Scanning to Form a Communication Network - A node forms a network by scanning for an existing network. If an existing network is not found, the node operates as a network controller node of the first network and admits at least one client node to the first network. As a network controller node, the node designates one of the client nodes as a scout node. The scout node removes itself from the first network and scans for a second network. If the scout node does not return to the first network after a predetermined time, it is assumed that the scout node has found a second network. The network controller node of the first network then designates the remaining client nodes as scout nodes, and then joins the second network as a client node. Therefore, multiple networks are avoided. | 08-25-2011 |
20110216670 | METHOD FOR DETERMINING NETWORK TOPOLOGY - Presented is a method of determining network topology. The method includes determining virtual local area networks (VLANs) configured to at least one switch on a computer network, selecting a VLAN from the configured VLANs, determining state of the selected VLAN, determining ports associated with the selected VLAN, based upon the state of the selected VLAN, selecting a port from the associated ports, determining operational status of the selected port, and defining status of the selected VLAN, based upon the operational status of the selected port. | 09-08-2011 |
20110216671 | Environment Configuration by a Device Bases on Auto-Discovery of Local Resources and Generating Preference Information for those Resources - Methods and systems for environment configuration by a device based on auto-discovery of local devices and generating preference information for those resources are disclosed and may include discovering available devices utilizing a wireless mobile communication device (WMCD). Wireless communication may be established with one or more of the available devices utilizing the WMCD, which may then configure the resources according to a user's preferences or a plurality of user preferences. The user preferences may be stored internal or external to the WMCD, and may be modified based on subsequent changes to the configuring of the resources. The WMCD may communicate with the resources utilizing one or more of a plurality of wireless protocols, which may include cellular, WLAN, near-field communication, Bluetooth, and radio frequency identification. The WMCD may auto-discover as well as determine and authenticate access privileges for the resources, which may include devices for adjusting a user's local environment. | 09-08-2011 |
20110222438 | TECHNIQUES FOR SELF-ORGANIZING ACTIVITY-DIFFUSION-BASED WIRELESS SENSOR NETWORK - Methods and wireless sensor nodes for aggregation-driven topology formation in a Wireless Sensor Network (WSN) are provided. A method for aggregation-driven topology formation in a WSN includes aggregating sensor data by one or more first sensor nodes, sending, by each of the one or more first sensor nodes, at least one activity diffusion message to each of at least one neighboring node of one or more second sensor nodes, wherein each activity diffusion message includes an activity diffusion weight, receiving, by each of the one or more second sensor nodes, respective of the at least one activity diffusion message from at least one neighboring node of the one or more first sensor nodes, accumulating, by each of the one or more second sensor nodes, activity diffusion weights included in the at least one activity diffusion message received from the at least one neighboring node of the one or more first sensor nodes, sending, by each of the one or more first sensor nodes, the aggregated data to at least one of the at least one neighboring node of the one or more second sensor nodes, and receiving, by the at least one of the at least one neighboring node of the one or more second sensor nodes, the aggregated data from respective of the one or more first sensor nodes. | 09-15-2011 |
20110222439 | METHOD, APPARATUS, AND SYSTEM FOR ESTABLISHING A VIRTUAL LOCAL AREA NETWORK CONNECTION - A method for establishing a Virtual Local Area Network (VLAN) connection is provided, which includes: receiving a first signaling message, in which the first signaling message includes an unused VLAN ID and explicit routing information; registering the VLAN ID by using the at least one unused VLAN ID; and sending the first signaling message according to the explicit routing information. Several node apparatuses and several systems are also provided in the present invention. Therefore, automatic VLAN configuration is performed in an environment without a spanning tree protocol, and traffic engineering is supported simultaneously. | 09-15-2011 |
20110235549 | SYSTEM AND METHOD FOR SIMPLIFYING SECURE NETWORK SETUP - A method in one example implementation includes discovering a networking device within a wireless connectivity range from a first computing device. The networking device may be configured for wireless connectivity by sending new network configuration settings to the networking device to be stored in a memory element. The method also includes configuring the first computing device to initiate a wireless connection to the networking device, such that the wireless connection is created without requiring the user to provide any configuration settings associated with the wireless connection. In more specific embodiments, if it is determined that the networking device is unconfigured, then the new network configuration settings are automatically generated. In other more specific embodiments, the new network configuration settings include a new network identifier and a new network password. | 09-29-2011 |
20110235550 | NETWORK LAYER TOPOLOGY MANAGEMENT FOR MOBILE AD-HOC NETWORKS AND ASSOCIATED METHODS - The approach for managing the topology in a MANET includes, at the network layer of a wireless mobile node, operating a link state or other routing protocol to discover routes from the at least one wireless node to other wireless nodes within the MANET. The routing protocol includes the use of a global topology database storing global network topology information. The method also includes, at the network layer, providing the global network topology information from the global topology database of the routing protocol to the MAC sublayer. Also, at the data link layer, the MAC sublayer is controlled to perform neighbor connection management based upon the global network topology information from the global topology database. The approach may provide enhanced QoS, latency and resistance to link and node failures within MANETs. | 09-29-2011 |
20110249594 | DETERMINING NODE LOCATION IN A WIRELESS NETWORK - Transmitting nodes broadcast chirped signals on a wireless network. The transmitting nodes are time-synchronized with each other and location of the transmitting nodes is known. A receiver node detects beat frequencies created by pairs of chirped signals from different pairs of transmitting nodes. Time delay differences between chirped signals in respective beat frequency pairs are determined. The receiver node's location is determined in view of the time delay differences. | 10-13-2011 |
20110255444 | POWER SAVINGS THROUGH COOPERATIVE OPERATION OF MULTIRADIO DEVICES - Proxy discovery for mobile networks having cooperative multiradio devices is provided through short range discovery and assistance from the network. In some aspects, a dedicated message is sent in response to a request from the client. The dedicated message includes a proxy list. The client uses the proxy list to discover those proxies on the list. Other aspects provide for the proxy list to be included in broadcast messages from the network. Thus, clients receive the broadcast messages and extract the proxy list for discovery purposes. Other aspects provide for the client to detect all of the wireless devices in the area and send a list to the network. The network responds with a sub-list of those proxies that are available to the client. In each such aspect, when the client discovers the available proxies, it transmits a list of the proxy ID of the discovered proxies to the network. | 10-20-2011 |
20110255445 | Self-forming ad-hoc network system - Disclosed are a self-forming ad-hoc network architecture and triplet-based radio waveform for communicating via the network architecture. The self-forming ad-hoc network preferably has a plurality of network nodes including a point-of-presence node, one or more relay nodes that aggregate data (triplet) traffic, one or more sensor nodes that send and receive data from relay nodes, and one or more handheld nodes that send and receive data to and from relay nodes and communicate data between themselves. The communication waveform is defined by orthogonal triplets having multiple time slots, multiple frequency channels, and multiple hop sequences in a channel, that is used to communicate between the network nodes. | 10-20-2011 |
20110261723 | Network system, controller, method and program - A controller removes a node to be bypassed from topology information that prescribes the network configuration and calculates a new path not passing the bypass node. For the nodes that form the path, the controller creates flow information that prescribes operation on the flow at nodes to set the flow information at the nodes on the path. | 10-27-2011 |
20110267981 | NETWORK ARCHITECTURE - The present invention provides a network architecture. An embodiment includes a plurality of nodes interconnected by links. Each node can maintain knowledge of other nodes in a database. The database contains a list of other nodes in the network, and a ‘next-best-step’ for each of those other nodes, pointing to a neighbouring node that is the next best step to that other node. Where a particular node of the network is not in the list, then the next-best-step is assumed to be the next-best-step most commonly identified in the database. Such a network will form a “core” wherein any node in the network can find any other node in the network by first seeking out that other node at the core. Once the nodes locate each other via the core, a more optimum route forms in the network according to the most desirable path between those nodes. | 11-03-2011 |
20110274009 | MANAGEMENT OF TELECOMMUNICATIONS CONNECTIONS - A network distribution, point ( | 11-10-2011 |
20110280157 | Communicating a Network Event - An Agent Apparatus is described including a Detecting Device for detecting the execution of an automated function within a communication network. The Agent Apparatus further includes a Type Determining Device for determining the type of the automated function and a Writing Device for writing information representing the type of the automated function in a predefined storage area of a record carrier. | 11-17-2011 |
20110280158 | IP-ADDRESS DISTRIBUTION DEVICE AND IP-ADDRESS DISTRIBUTION METHOD - A path-information obtaining unit obtains a piece of path information of a communication network by inquiring a port number of an Ethernet switch that transmits a MAC address of a request source of an IP address. An IP-address specifying unit specifies an IP address that corresponds to the piece of path information of the communication network by referring to an IP-address correspondence table, and distributes the specified IP address to the request source of an IP address. | 11-17-2011 |
20110286361 | Method for Detecting Network Asymmetrical Status and Asymmetrical Communication Channels for Power System - The present invention provides a new synchronization method named Multi-Node Echo Method (MNEM), which settles the problem of clock/data synchronization with asymmetrical channels. In MNEM, the echo messages are relayed among multi-node loop both by clockwise and anti-clockwise. Based on Multi-Node Echo Method, the invention further provides a method to detect symmetrical status of a communication network, a method to detect asymmetrical status of any channel in a communication network, and a method to calculate the sending and receiving delay values of any channel in a communication network, even when the channel is asymmetrical. | 11-24-2011 |
20110292834 | Maintaining Time Series Models for Information Technology System Parameters - A network-centric modeling mechanism is provided for updating network models in order to mitigate network issues. The network-centric modeling mechanism determines for each component in a plurality of components whether a system parameter in a set of parameters particular to the component has deviated from a predicted system parameter value in a set of predicted system parameter values past a predetermined threshold. Responsive to the system parameter deviating from the predicted system parameter value past the predetermined threshold, the network-centric modeling mechanism generates an event stream indicating a sufficient deviation. The network-centric modeling mechanism determines whether the event stream matches a previous pattern. Responsive to identifying the previous pattern that matches the event stream, the network-centric modeling mechanism preemptively mitigates any related issues in the component or in a related component in the plurality of components using topology-aware indices associated with the previous pattern. | 12-01-2011 |
20110292835 | METHOD, AND DEVICE FOR CONFIGURING WIFI PARAMETERS - A computer-implemented method for configuring Wireless Fidelity (WiFi) parameters is provided in an embodiment of the present disclosure, including: obtaining the WiFi parameters sent by a mobile access point (AP) that supports a WiFi function; by using a universal serial bus (USB) connection when the USB connection is established between a computer terminal and the mobile AP and implementing, by the computer terminal, WiFi Internet access configuration by using the WiFi parameters. A computer terminal for configuring WiFi parameters, a mobile AP that supports a WiFi function, and a system for configuring WiFi parameters are provided in other embodiments of the present disclosure. | 12-01-2011 |
20110292836 | EVOLUTION OF ETHERNET NETWORKS - An Ethernet network comprises nodes which support a plurality of different forwarding modes. A range of VLAN Identifiers (VIDs) are allocated to each of the forwarding modes. Connections are configured between a source node and a destination node of the network using different forwarding modes. Packets carrying data traffic are sent to the destination node by selectively setting a VID in a packet to a first value, to transfer a packet via a first connection and a first forwarding mode, and a second value to transfer a packet via the second connection and the second forwarding mode. Packets received from both of the connections and sent on to an end user. VLAN Identifiers can be allocated to different releases of functionality at nodes (e.g. software releases) such that packets are forwarded via a set of nodes supporting a first release, or via a set of nodes supporting a second release. | 12-01-2011 |
20110299425 | Addressing and Routing Scheme for Distributed Systems - The embodiments herein relate to distributed systems and more particularly, to logical address allocation and data routing in a distributed systems. A plurality of methods for logical address allocation are disclosed, which the network adapts based on the configurable parameters and the network working environment. Since the nodes are allocated logical address based on the algorithm, while routing the data packet each node calculates the shortest path next hop towards the destination based on the algorithm used for addressing and forward the data. | 12-08-2011 |
20110305167 | Communication system, and method of collecting port information - The control unit specifies an undetected connection destination port and sends a reply request to a connection destination of the undetected connection destination port. The packet transfer unit determines whether the received reply request is to be transferred to any other packet transfer unit. The packet transfer unit, upon determining the reply request to be transferred to any other packet transfer unit, transfers the reply request to any other packet transfer unit. The packet transfer unit, upon determining the reply request not to be transferred to any other packet transfer unit, returns a reply that includes information on ports of the local packet transfer unit, the reply being sent along a path leading to the control unit. | 12-15-2011 |
20110305168 | Communication system, and method of creating topology information - Provided is a communication system that includes a plurality of packet transfer units and a control unit which controls each packet transfer unit, in the communication system of which, a communications network used for each packet transfer unit to transfer packets, and a communications network used for the control unit to control each packet transfer unit can be integrated into one kind. The control unit transmits a reply request to each packet transfer unit. The packet transfer unit, upon receiving the reply request, transmits the reply request from a port other than that through which the packet transfer unit has received the reply request. Upon receiving the reply request, the packet transfer unit also returns a reply including information on ports of the local packet transfer unit, the reply being transmitted through a path for the control unit. On the basis of the reply transmitted from each packet transfer unit, the control unit creates topology information, the topology information including port interconnection information relative to ports provided at the control unit and each port of the packet transfer units. | 12-15-2011 |
20110310771 | METHOD FOR REALIZING CONVERGENT WAPI NETWORK ARCHITECTURE WITH SPLIT MAC MODE - A method for realizing a convergent Wireless Local Area Networks (WLAN) Authentication and Privacy Infrastructure (WAPI) network architecture with a split Medium Access Control (MAC) mode involves the steps: a split MAC mode for realizing WLAN Privacy Infrastructure (WPI) by a wireless terminal point is constructed through separating the MAC function and the WAPI function of the wireless access point apart to the wireless terminal point and an access controller; integration of a WAPI and a convergent WLAN network system architecture is realized under the split MAC mode that the wireless terminal point realizes WPI; the association connection process is performed among a station point, a wireless terminal point and an access controller; the process for announcing the start of performing the WLAN Authentication Infrastructure (WAI) protocol between the access controller and the wireless terminal point is performed; the process for performing the WAI protocol between the station point and the access controller is performed; the process for announcing the end of performing the WAI protocol between the access controller and the wireless terminal point is performed; the secret communication process is performed between the wireless terminal point and the station by using WPI. | 12-22-2011 |
20110310772 | Concurrency Method for Forecasting Impact of Speed Tiers on Consumption - A forecast model processes performance data from a site, e.g., a cable modem termination system (CMTS), to obtain a set of concurrency equations for existing speed tiers that is based on an observed subscriber bandwidth for the site. A new set of concurrency equations is obtained for new speed tiers so that a new subscriber bandwidth can be predicted for the new speed tiers. Based on the new subscriber bandwidth, expected subscriber growth, and changes in data consumption, the site is reconfigured with additional ports based on the forecast. This process can be repeated for the other sites. Sites may be grouped together based on the observed subscriber bandwidth. A new subscriber bandwidth may be predicted for the group with the new speed tiers so that additional ports can be configured for each of the sites in the group. | 12-22-2011 |
20110317589 | METHOD AND APPARATUS FOR DISTRIBUTION OF TOPOLOGY INFORMATION IN COMMUNICATION NETWORKS - A computer implemented method, computer readable medium and computing apparatus for distribution of network topology information in telecommunication networks comprising of a distribution of an information to a neighboring gateway node (ASN-GW | 12-29-2011 |
20110317590 | System and Method for Dynamic Maintenance of Fabric Subsets in a Network - A networking device includes a hardware port coupled to a first device and a management module. The management module identifies fabric subsets such that devices included in a fabric subset are permitted to communicate with each other, identifies configurations that include subsets that are active when the configuration is active, and detects that a device is uncoupled from the port. In response to detecting, the management module modifies the subsets by creating a new subset that does not include the uncoupled device, and modifies the configurations. | 12-29-2011 |
20120002572 | CONTROL FRAME HANDLING BY A PROVIDER BACKBONE BRIDGE - A method and Bridge in a Provider Backbone Bridge Network (PBBN) for enabling frames from a Higher Layer Entity attached alternatively to a Provider Instance Port (PIP) on an I-Component of a Backbone Edge Bridge or to a Customer Backbone Port on a B-Component of the Backbone Edge Bridge, to reach an intended entity in the PBBN. A Virtual Instance Port Service Access Point (VIP SAP) is configured for every VIP and every Higher Layer Entity configured on the I-Component. An Enhanced VIP Port Connectivity function utilizes the VIP SAP to tunnel customer-initiated Layer 2 Control Protocols (L2CPs). A Special Multiplexed SAP handles the frames of the Higher Layer Entity. A Service Instance Multiplex Entity utilizes the Special Multiplexed SAP to transfer frames between the PIP or the Customer Backbone Port and the entity inside the PBBN. | 01-05-2012 |
20120008528 | Layer Two Over Multiple Sites - An apparatus comprising a service network, and a plurality of Layer 2 sites connected by the service network via a plurality of gateways, wherein the gateways are configured to map a plurality of Internet Protocol (IP) addresses of a plurality of hosts under a plurality of virtual local area networks (VLANs) in a plurality of Layer 2 sites to a plurality of addresses (e.g. MAC or others) of the corresponding gateways inform the other gateways in the other Layer 2 sites of the mapped IP addresses under each of the VLANs in the local Layer 2 sites, and forward data frames originated from the hosts in the local Layer 2 sites to the other gateways in the other Layer 2 sites when the data frames' destinations are residing in the other Layer 2 sites. | 01-12-2012 |
20120008529 | CONFIGURING A SECURE NETWORK - Techniques are presented for configuring a networking device to provide secure wireless connectivity to one or more client devices. In one embodiment, a networking device is discovered that is within a wireless connectivity range from a first client device. The networking device is configured to provide wireless connectivity to the first client device. The first client device is configured to initiate a first wireless connection, without requiring a user to specify any network settings. The networking device is configured to authenticate a user to access a user interface for configuring the networking device, where the user is not authenticated based on any password. | 01-12-2012 |
20120014288 | Method for Configuration of a Wireless Network - The invention relates to method for configuring a first wireless network that includes at least one access point. In order to optimize the configuration of the first wireless network, the method comprises a step of configuring at least one parameter of the at least one access point of the first wireless network on the basis of at least a portion of the linking balance of a second wireless network including at least two nodes, the nodes being positioned in a predetermined physical space. | 01-19-2012 |
20120014289 | Distributed Transforms for Efficient Data Gathering in Sensor Networks - Devices, systems, and techniques for data collecting network such as wireless sensors are disclosed. A described technique includes detecting one or more remote nodes included in the wireless sensor network using a local power level that controls a radio range of the local node. The technique includes transmitting a local outdegree. The local outdegree can be based on a quantity of the one or more remote nodes. The technique includes receiving one or more remote outdegrees from the one or more remote nodes. The technique includes determining a local node type of the local node based on detecting a node type of the one or more remote nodes, using the one or more remote outdegrees, and using the local outdegree. The technique includes adjusting characteristics, including an energy usage characteristic and a data compression characteristic, of the wireless sensor network by selectively modifying the local power level and selectively changing the local node type. | 01-19-2012 |
20120014290 | Computer-Implemented Method For Compensating Ancillary Use Of A Remotely Accessible Network Device - A computer-implemented method for compensating ancillary use of a wireless service device for excess transmission bandwidth is provided. Wireless service devices are discovered. Each wireless service device is interoperable on a wireless service network operated by a service provider. For each wireless service device, a primary function performable by a subscriber through the wireless service network and an ancillary function performable by a third party through the wireless service network based on availability of capacity for excess transmission bandwidth are determined. The wireless service devices include an available capacity to perform the ancillary function over the service network is identified. The ancillary function is performed over the excess transmission bandwidth using the identified wireless service devices through combination, modification and integration of data from the two or more other such identified wireless service devices. Participants of the ancillary function in exchange for the performance of the ancillary function are compensated. | 01-19-2012 |
20120026918 | METHOD AND SYSTEM OF MANAGING NEIGHBOR RELATION TABLE IN WIRELESS COMMUNICATION SYSTEM HAVING SELF-ORGANIZING NETWORK FUNCTION - Provided is a method of managing a neighbor relation table by a base station in a wireless communication system having a self-organizing network function, which includes receiving a neighbor base station report from a terminal; comparing the neighbor base station report with a stored neighbor relation table; calculating a statistic value of a new base station when the new base station is present in the comparison step; and adding the new base station to the stored neighbor relation table when the statistic value is equal to or greater than a first reference value. | 02-02-2012 |
20120039217 | INTERFACE MODULE AND CONTROLLER NETWORK - An interface module is provided for connecting a device to a controller within a controller network. The controller is adapted to supply and/or receive data according to a network protocol, and the device is adapted to supply and/or receive data according to a device protocol. The interface module comprises: a network connector supporting a plurality of network channels for connecting the interface module to the controller via the controller network; a device connector supporting a plurality of device channels for connecting the interface module to the device; a conversion unit arranged to receive the plurality of network channels from the network connector, and adapted to convert data between the network protocol and the device protocol, the conversion unit having one or more signal terminals for supplying and/or receiving signals to or from the device; and a configuration unit between the conversion unit and the device connector, adapted to configure the interface module to the device by routing selected device channels to selected signal terminals of the conversion unit. The configuration unit is separable from and removably coupled to the conversion unit such that the interface module may be configured for use with a different device by replacement of the configuration unit. Also provided is a controller network comprising one or more devices and a controller for control of the devices, each of the devices being connected to the controller via an interface module. | 02-16-2012 |
20120044834 | Mechanism for Automatic Network Formation and Medium Access Coordination - The invention provides a set of mechanisms by which a wireless mobile mesh node equipped with a directional antenna may self form and self adapt its steady-state communications schedule. A link establishment handshake is carried out over an ongoing subtemplate-based discovery scan. During time not reserved for steady-state communications with previously discovered neighbors, nodes continue to search for an establish links with new neighbors. Initial and subsequent bandwidth allocation protocols may be utilized to allow peer nodes to coordinate communication opportunities between the peer nodes without impacting or having knowledge about reservations for communications with other peers. The link establishment and initial bandwidth allocation protocols may be piggy-backed for readily establishing an initial steady-state schedule with a peer upon link establishment without impact on previous steady state reservations by other nodes or on ongoing link establishment attempts elsewhere. | 02-23-2012 |
20120044835 | Method and Apparatus for Implementing K-Shortest Paths Algorithm in the Case of Existing Multiple Edges Between Adjacent Nodes - The present invention discloses a method and apparatus for implementing a K-shortest paths algorithm in a condition of multiple sides between adjacent nodes. The implementing method comprises: recording original topology information into a topology structure; adding one virtual node into each of the original sides other than the one with the shortest weight between the two nodes respectively to divide each of the original sides except for the original side with the shortest weight into two new sides, a weight of the new side being obtained by splitting a weight of the original edge where the new side locates; according to new topology information after adding virtual nodes, calculating K-shortest paths between designated nodes; and checking each path in the calculated K-shortest paths in sequence: reinstituting hops which belong to virtual nodes and new sides in each path into the original topology information recoded in said topology structure. | 02-23-2012 |
20120044836 | MOBILE NETWORK, RADIO ACCESS NODE, SYSTEM INCLUDING A RELAY APPARATUS, AND METHOD THEREOF - A mobile network comprising a relay, a controller in a master-slave arrangement with the relay and one or more user terminals, wherein the controller is operable to control the status of said relay between a standby mode and an active mode dependent upon requests received from said user terminals. | 02-23-2012 |
20120057504 | NETWORK EXPLORATION METHOD AND NETWORK EXPLORATION APPARATUS - A network exploration apparatus is configured to calculate a communication cost of a network to which a plurality of terminals is coupled through a plurality of network devices. The network exploration apparatus includes a transmitter configured to transmit an exploration packet to the plurality of terminals, a receiver configured to receive a response packet for the exploration packet, a detector configured to detect a terminal group to which a terminal that does not receive the exploration packet among the plurality of terminals belongs based on a reception result of the response packet by the receiver, and a calculator configured to calculate a communication cost between terminals based on an inclusion relationship between a plurality of terminal groups detected by the detector when the transmitter repeatedly transmits the exploration packet. | 03-08-2012 |
20120057505 | METHOD, APPARATUS, AND SYSTEM FOR SETTING UP BIDIRECTIONAL POINT-TO-MULTIPOINT LABEL SWITCHED PATH - The present invention provides a method, an apparatus, and a system for setting up a bidirectional point-to-multipoint label switched path. The method includes: distributing a leaf node label of a leaf-to-source data path and a source node label of a source-to-leaf data path through a Path message and a Resource Reservation message by using a Resource Reservation Protocol-Traffic Engineering to set up a bidirectional point-to-multipoint label switched path. The bidirectional point-to-multipoint label switched path that is set up in the present invention ensures consistency of LSPs in both directions, and overcomes a defect that the source node needs to send multiple data packets to the leaf nodes through multiple bidirectional point-to-multipoint label switched paths when a source transmits data to a leaf in the prior art. | 03-08-2012 |
20120057506 | Large network association procedure in power efficient manner - The embodiments herein generally relate to distributed systems and more particularly, to association procedure in a large network. In this invention time is divided into different zones each for specific task such as to wake-up dormant devices, to synchronize unassociated devices, to transmit identity frame and then to associate with network coordinator device. In each time zone plurality of nodes perform the specific task simultaneously. This improves the power efficiency and speeds up the association procedure. This technique also improves neighboring table information, which enables better localization. | 03-08-2012 |
20120063362 | METHOD AND APPARATUS FOR COMPUTING PATHS TO DESTINATIONS IN NETWORKS HAVING LINK CONSTRAINTS - A capability is provided for computing paths to destinations in networks having link constraints. An improved Constrained Shortest Path First (CSPF) algorithm is provided for computing a path from a source node to a destination node through a network. The improved CSPF algorithm uses neighbor node lists, in addition to a tentative node list and a paths list, for computing a path. The improved CSPF algorithm, during path computation, maintains a tentative node list including nodes selected for inclusion within the path. The tentative node list specifies the computed path. The improved CSPF algorithm, for each node selected for inclusion within the tentative node list, uses a neighbor node list for the selected node, and selects a neighbor node from the neighbor node list for inclusion within the tentative node list. The neighbor node list for a selected node includes a plurality of neighbor nodes of the selected node, where the neighbor nodes of the neighbor node list are arranged within the neighbor node list based on link constraints of a plurality of links between the selected node and the respective neighbor nodes of the selected node. | 03-15-2012 |
20120063363 | Method to Pass Virtual Local Area Network Information in Virtual Station Interface Discovery and Configuration Protocol - An apparatus comprising an edge virtual bridging (EVB) bridge, and an EVB station coupled to the EVB bridge, wherein the EVB station is configured to send to the EVB bridge a virtual station interface (VSI) discovery and configuration protocol (VDP) request comprising a filter information (info) field without specifying a virtual local area network (VLAN) identifier (ID), and wherein the EVB bridge is configured to send a VLAN ID (VID) to the EVB station in a second filter info field in a VDP response to the VDP request. | 03-15-2012 |
20120063364 | NETWORK DISCOVERY - The invention relates to a method for network discovery in a wireless communication network comprising communication devices sending announcement signals regularly with a period being equal to or exceeding a predefined minimum announcement interval, wherein a first communication device
| 03-15-2012 |
20120063365 | Multi-Mode Mobile Networking Device - Establishing a mobile ad-hoc network between mobile network devices may include transmitting a signal from a first mobile network device using a plurality of communications formats. One or more other mobile network devices may receive the broadcast signal, select a communications format from the plurality of communications formats and respond to the signal using the selected communications format. | 03-15-2012 |
20120069771 | DISCOVERING RESOURCES - A method for discovering resources includes identifying one or more geographically fixed transceivers with which a mobile device is in communication and through which the mobile device can communicate with other devices. A resource geographically associated with the identified one or more transceivers is identified. Identification occurs without regard to a signal strength or strengths experienced between the mobile device and the one or more transceivers. The mobile device is caused to display data corresponding to the identified resource | 03-22-2012 |
20120069772 | COMMUNICATIONS SYSTEM PROVIDING MOBILE WIRELESS COMMUNICATIONS DEVICE APPLICATION MODULE ASSOCIATIONS FOR RESPECTIVE WIRELESS COMMUNICATIONS FORMATS AND RELATED METHODS - A communications system may include a plurality of electronic devices having respective different device types and each configured to wirelessly communicate via a plurality of different wireless communications formats. The system may also include a mobile wireless communications device including a plurality of application modules associated with respective electronic device types and configured to communicate via a first one of the wireless communications formats. The mobile wireless communications device may further include a control module configured to establish an initial wireless communications link with a given electronic device using a second one of the wireless communications formats, determine a respective device type for the given electronic device based upon the established initial wireless communications link, and cause a respective application module to establish a subsequent wireless communications link with the given electronic device using the second wireless communications format based upon the determined respective device type. | 03-22-2012 |
20120069773 | SELF ORGANIZING CELLULAR NETWORKS - This invention addresses a method of scanning and self organization that is programmed into the base station which then will automatically avoid mutual interference and move the use of radio channels from one base station to another to move network capacity to where it is needed through a process called “abandonment. | 03-22-2012 |
20120076051 | WIRELESS TERMINAL AND COMMUNICATION SYSTEM SWITCHING METHOD - A wireless terminal involving small redundancy that can be reconfigured to a configuration compatible with a plurality of systems using the hardware resources compatible with one system is provided. A wireless terminal | 03-29-2012 |
20120082063 | QUARANTINE DEVICE, QUARANTINE METHOD, AND COMPUTER-READABLE STORAGE MEDIUM - A quarantine device | 04-05-2012 |
20120082064 | CONFIGURATION CONTROL OF INTER-CELL SIGNALING BASED ON POWER STATE - An access point may control reporting configurations based on current power state of a cell in wireless communications network. The first cell may provide reporting configuration instructions to a second cell, instructing selection between at least two defined configurations for reporting system information or load information from the second cell, based on whether the first cell is in a powered up state or a powered down state. The first cell may transmit notifications to the second cell indicating when the first cell is transitioning to a current power state, which may be one of the powered up state or the powered down state. The first cell may select one of the at least two configurations for interpreting reporting data received from the second cell, based its current power state, to obtain the system information or the load information from the second cell. | 04-05-2012 |
20120087280 | IDENTIFICATION OF DUAL PLANE TOPOLOGIES - In one embodiment, two neighboring nodes adjacent to each end-point node of a domain may be associated with a “dual” (a logical structure). A first of the two neighboring nodes may be placed into a first family (and group) of the dual, while a second of the two neighboring nodes may be placed into an opposing second family (and group). Augmentations may then be performed, recursively merging and connecting the duals and/or groups, as well as connecting unplaced nodes to particular duals, families, and groups, according to forced augmentations and/or unforced augmentations where no forced augmentations exist. In the end, it may be determined whether the domain supports dual plane topologies based on whether a solution having one resultant dual with a single group in each opposing family is reached from the recursive augmentations | 04-12-2012 |
20120087281 | ACCESS POINT PROFILE FOR A MESH ACCESS POINT IN A WIRELESS MESH NETWORK - A mesh access point that includes an access point profile storing one ore more parameters in non-volatile memory, and a method of using the mesh access point having the access point profile to select and carry out mutual authentication on a wireless mesh network to establish itself to the mesh network using information in the access point profile, and further to provide services to wireless clients according to information in the access point profile. Access point profiles can be pre-configured/configured/updated suitably in order to adapt the mesh access point in a mesh network according to its capabilities and requirements. | 04-12-2012 |
20120093032 | AIRLINK TECHNIQUES ENABLING DYNAMIC OPTIMIZATION AND CONFIGURATION OF WIRELESS NETWORK BASE STATIONS - An embodiment of the present invention provides a base station (BS), comprising a transceiver adapted for communication with at least one mobile station (MS) in a wireless network and further adapted to reconfigure RF operational parameters on a dynamic basis enabling self optimizing networks (SON), and wherein the BS is capable of maintaining session continuity with the at least one STA through SON restarts. | 04-19-2012 |
20120093033 | Wavelength division multiplexing network path search method and system - The present invention discloses a wavelength division multiplexing (WDM) network path search method and system. The method includes: step A, searching out a network element linked list from a source network element of a service to a destination network element according to a inter-network element connection; step B, performing a port search on the network element linked list, performing a validity check on a found node, and ending the search when an invalid node is found; and step C, sorting out a path linked list of all possible paths according to path topology structure data searched out. The searching efficiency is improved by the present invention. | 04-19-2012 |
20120093034 | VIRTUAL SWITCHING PORTS ON HIGH-BANDWIDTH LINKS - Method and apparatus for managing traffic of a switch include logically partitioning a physical port of the switch into a plurality of virtual ports. One or more virtual output queues are uniquely associated with each virtual port. Switching resources of the switch are assigned to each of the virtual ports. A source virtual port is derived from a frame arriving at the physical port. The frame is placed in a given one of the one or more virtual output queues uniquely associated with the source virtual port derived from the frame. A destination virtual port for the frame is determined. The frame is transferred from the virtual output queue in which the frame is placed to an egress queue associated with the destination virtual port and forwarded from the egress queue to a destination physical port of the switch. | 04-19-2012 |
20120093035 | UNIFIED FABRIC PORT - A method and system for configuring communications over a physical communication link connected between a physical port of a network switch and a physical port of a physical network interface on an end station. The communication link between the physical port of the network switch and the physical port of the physical network interface is logically partitioned into a number of channels of communication. For each channel, a channel profile is generated that defines properties of that channel. The physical network interface is instructed to self-configure such that the physical network interface is able to communicate with the network switch over each channel in accordance with the channel profile defined for that channel. | 04-19-2012 |
20120093036 | METHOD, SYSTEM AND NETWORK DEVICE FOR IMPLEMENTING LOCAL IP ACCESS - A method for implementing local Internet Protocol (IP) access includes: obtaining User Equipment (UE)'s first information that is used for implementing local IP access; and implementing local IP access of the UE according to the first information. A system for implementing local IP access is disclosed by the present invention. The system can communicate with UE and includes: a NodeB, configured to obtain UE's first information that is used for implementing local IP access, and implement local IP access of the UE according to the first information; and a core network node, configured to assist the NodeB in obtaining the UE's first information that is used for implementing local IP access. Besides, relevant network devices are also disclosed. | 04-19-2012 |
20120093037 | PATH SHORTENING IN A WIRELESS MESH NETWORK - In one embodiment, a method includes a mesh point receiving mesh advertisement messages from advertising mesh points of a wireless mesh network having a mesh portal with a wired connection to a wired network. Each mesh advertisement message specifies a corresponding metric for reaching the mesh portal and has a corresponding signal strength indicator. An ordered group of parent access points, ordered based on the respective metrics, is generated from among the advertising mesh points, starting with a first parent access point having a corresponding optimum metric for reaching the mesh portal and independent of the corresponding signal strength indicator. A registration message is sent to each of the parent access points identifying a corresponding specified priority based on a corresponding position in the ordered group, for use by the corresponding parent access point in selecting a minimum interframe spacing for forwarding a wireless packet received from the mesh point. | 04-19-2012 |
20120099479 | TECHNIQUES TO MANAGE WIRELESS CONNECTIONS - A system, apparatus, method and article to manage wireless connections are described. The apparatus may include a connection management module to automatically form a first connection between a first mobile device and a second mobile device, and a second connection between the second mobile device and a fixed device, wherein the first mobile device is to communicate information with the fixed device using the first and second connections. Other embodiments are described and claimed. | 04-26-2012 |
20120099480 | COMMUNICATION MANAGEMENT APPARATUS, COMMUNICATION NODE, AND COMMUNICATION SYSTEM, AND DATA COMMUNICATION METHOD - The communication management apparatus includes a network-presence-check processing unit that performs network presence check processing for generating network presence information, a token-circulation-order determining unit that determines token circulation order using the network presence information, a setup processing unit that notifies each of communication nodes in the network of token circulation destination information, a token-frame processing unit that, after transmission of a data frame by a data-frame-communication processing unit, transmits, based on the token circulation order, a token frame including information concerning a transmission right acquiring apparatus that acquires a transmission right next and determines whether the transmission right acquiring apparatus of the transmission right acquiring apparatus information of the received token frame is the own apparatus, and the data-frame-communication processing unit that performs transmission and reception processing for a data frame for acquiring the transmission right. | 04-26-2012 |
20120099481 | METHOD AND SYSTEM FOR OBTAINING A DEPLOYMENT SCHEME OF WIRELESS LOCAL AREA NETWORK ACCESS POINTS - A method for obtaining a deployment scheme of Wireless Local Area Network (WLAN) Access Points (APs) is provided. The method includes obtaining coverage information of each AP according to a WLAN competition model and deployment information; and combining a constraint relationship between the coverage information of each AP and cost information of each AP, and obtaining the deployment scheme of the APs through calculation. A device and a system are further provided, so as to automatically obtain a deployment scheme of APs, and control the cost. | 04-26-2012 |
20120106397 | IMPROVEMENTS TO BODY AREA NETWORKS - A method of performing communications of network devices ( | 05-03-2012 |
20120106398 | METHOD FOR ACTIVATING A COMMUNICATION TERMINAL - A method and apparatus are provided for activating a communication terminal situated in a wireless communication network including a plurality of access nodes. The method includes: receiving, by an access node of the communication network, termed an anchor access node, at least one datum to be transmitted to the communication terminal; identifying, by the anchor access node, at least one access node to which the communication terminal was previously attached, termed a last known access node, on the basis of the datum to be transmitted; and transmitting to the at least one last known access node at least one activation datum destined for at least one communication interface of the terminal, making it possible to activate the terminal. | 05-03-2012 |
20120106399 | IDENTITY MANAGEMENT SYSTEM - A local identity management module is described that is able to identify each of a plurality of user devices. The user devices communicate with the outside world via a network address translation device that converts an internal address of the user devices to a single internet protocol address, typically the internet protocol address of the network address translation device. An external identity management system can communicate with the local identity management module in order to identify which of said plurality of user devices made a particular request and, in some embodiments, to identify a user of said user device. | 05-03-2012 |
20120113867 | METHOD FOR KEEPING THE ROUTING TABLES OF AN UNSTABLE DISSEMINATION NETWORK UP TO DATE - A method for keeping the routing tables of the nodes of an unstable dissemination network up to date, the nodes joining or leaving said network unpredictably. A node periodically sends a synchronization message to all other remote nodes. The period for sending a synchronization message to all other remote nodes increases when the network is tending to stabilize, the remote nodes all being synchronized and the local routing table not evolving. A node sends a synchronization message to another remote node particularly when the other node is desynchronized. | 05-10-2012 |
20120113868 | ORCHESTRATING WIRELESS NETWORK OPERATIONS - A wireless communication system is disclosed. A data store stores for each of a plurality of nodes, each node comprising a wireless communication system element, a node image data comprising metadata about or otherwise associated with the node. In various embodiments, the data store has the capability to create and support an organically changing schema, and provides a mechanism to propagate changes to the schema or data, but only as necessary. A processor receives an indication of an objective and uses node image data stored in the data store to identify programmatically from among the plurality of nodes a node to help achieve the objective and to determine the configuration of the node. | 05-10-2012 |
20120113869 | METHOD AND APPARATUS FOR IMPROVING UPLINK TRANSMISSION MODE CONFIGURATION - A method, an apparatus, and a computer program product for wireless communication are provided in which a first message to reconfigure an uplink transmission mode of a user equipment (UE) from a first uplink transmission mode to a second uplink transmission mode is transmitted. Further, a reconfiguration scheme to assure at least one of two or more second messages are recognizable by the UE during a transition period after transmission of the first message is implemented. In another example, a UE and eNB may be equipped to respectively transmit and receive a first message to reconfigure a SRS mode used by a UE. In such an aspect the first message may respectively indicate and be used to determine an SRS transmission port specified in a field capable of indicating a number of SRS transmission ports that is greater than a number of physical UE antenna ports. | 05-10-2012 |
20120113870 | CONFIGURATION OF NETWORK LINKS IN A VIRTUAL CONNECTION ENVIRONMENT - A method for establishing connections in a virtual connection environment by passing links, to external systems through a bridge. The bridge participates in the spanning tree, protocol procedure to reach a stable topology. Active bridge connections then behave as a simple pass through to external systems. The virtual connect domain appears to external systems as a single system void of any possible communication loops. | 05-10-2012 |
20120120848 | CONFIGURABLE NETWORK SOCKET RETRANSMISSION TIMEOUT PARAMETERS - A network communication device can implement configurable network socket retransmission timeout parameters on a per socket basis. In one embodiment, it is determined, at a first network device, whether to define a network socket with a custom or a default retransmission timeout value to transmit data to a second network device. In response to determining to define the network socket with the custom retransmission timeout value, the network socket is defined with the custom retransmission timeout value, the data is transmitted to the second network device, and it is determined whether response data is received from the second network device prior to expiration of a time period associated with the custom retransmission timeout value. In response to determining that the response data is not received from the second network device prior to the expiration of the corresponding time period, the data is retransmitted to the second network device. | 05-17-2012 |
20120120849 | MULTI-STANDARD RADIO NETWORK NODE CONFIGURATION DATA HANDLING FOR NETWORK OPERATION - This disclosure pertains to a method in a Multi-Standard Radio (MSR) network node, a MSR network node ( | 05-17-2012 |
20120120850 | TECHNOLOGY FOR MANAGING TRAFFIC VIA DUAL HOMED CONNECTIONS IN COMMUNICATION NETWORKS - Technique for handling traffic between a specific common source node and a network element NE being part of a dual homing configuration, via a main path and an auxiliary path in the configuration, the technique comprises redirection of the traffic from one of said paths to another while the path from which the traffic has been redirected remains active, while relearn of MAC addresses which is required due to the redirection is performed without executing a MAC addresses flush operation. | 05-17-2012 |
20120120851 | PROTOCOLS FOR OUT-OF-BAND COMMUNICATION - Methods for managing an optical network through out-of-band communication between optical transceiver modules in a heterogeneous network fabric are disclosed. The disclosed methods include methods for performing fabric discovery, communicating error messages, detecting intrusion. Methods are also disclosed for communicating between transceivers of differing protocol versions and memory capacity. | 05-17-2012 |
20120127893 | APPARATUS AND METHOD FOR USING AND SOLVING LINEAR PROGRAMMING PROBLEM AND APPLICATIONS THEREOF - Method and system for analyzing a linear programming problem or any other problem involving inequalities constraints set relating to multiple variables. An initial feasible region is calculated based on a sub-set of the constraints set. The feasible region is updated based on the additional constraints added one at a time. The method checks for feasibly, identifies active constraints, and provides end-points of the feasible region. The method may be applied to a control system or to a crossbar switch handling routing between multiple input and multiple outputs, such as digital data networking switch used to route TDM digital data streams being packet, frame or cell based, in a LAN, WAN, MAN or Internet application. | 05-24-2012 |
20120134298 | Method, Device and System for Establishing On-Demand Route - The present invention relates to the field of network communication technologies, and discloses a method, a device, and a system for establishing an on-demand route. The method includes: determining that a stable route needs to be established; establishing the stable route and recording a route entry corresponding to the stable route in a route table; determining an effective time of the stable route, in which the effective time of the stable route is longer than the effective time of another common route; and performing an aging operation on the route entry according to the effective time of the stable route. | 05-31-2012 |
20120147786 | NETWORK OPERATION SYSTEM, NETWORK OPERATION METHOD AND NETWORK OPERATION PROGRAM - Data transfer with high throughput is enabled between servers. When in a set of sites each having a usable network operation unit, a new site is added or an existing site withdraws, designing is executed for determining a combination of the network operation units each one of which is to be used in each added or withdrawn site such that at least a site which transmits or receives data becomes reachable based on a connection relationship between each paired network operation units added or withdrawn, and when a combination of the network operation units is determined in the designing, the network operation unit determined is considered as a network operation unit to be newly used in each site. | 06-14-2012 |
20120155328 | METHODS AND APPARATUS FOR DYNAMIC MAPPING OF POWER OUTLETS - In some embodiments, an apparatus includes a network management module. The network management module is configured to send a request for power output data from a first network element having a first power supply configured to be coupled to a first power outlet, and a second power supply configured to be coupled to a second power outlet. The network management module is configured to receive a first confirmation from the first network element that the first power supply and the second power supply are receiving power. The network management module is configured to send a request to disable a third power outlet and to receive, after sending the request to disable the third power outlet, a second confirmation from the first network element that the first power supply and the second power supply are receiving power. The network management module is configured to define a power distribution table after receiving the second confirmation, the power distribution table designating the third power outlet as unused. | 06-21-2012 |
20120155329 | Dynamic Reroute Scheduling in a Directed Acyclic Graph (DAG) - In one embodiment, a particular node joins a directed acyclic graph (DAG) in a computer network at a parent node, and determines its grade based on a topology of the DAG, the grade lower than the parent node and higher than any child nodes of the particular node. In response to detecting a trigger for a routing change in the DAG, the particular node delays the routing change based on the grade such that the delay is longer than a first associated delay of any of the child nodes and shorter than a second associated delay of the parent node. Upon expiration of the delay, the particular node may determine if the trigger for the routing change is still valid, and if valid, performs the routing change. | 06-21-2012 |
20120155330 | System and Method for Topology Optimization of Directional Network - The present invention includes a system and method by which a network of directional, wireless nodes that are not fixed in space can be optimized by optimizing each node individually. The network does not have a central control node, so each node is responsible for optimizing its surrounding topology. This is accomplished by synthesizing incoming information from neighboring nodes and determining which nodes will provide the best connections based on specific utilities each node is attempting to optimize. Neighboring nodes then exchange messages to request, accept, or reject directional connections between them based on their preferred optimizations. The overall directional network topology is achieved by consensus driven by local preferences. | 06-21-2012 |
20120155331 | NODE RELATED INFORMATION COLLECTING SYSTEM, NODE DEVICE AND FRAME PROCESSING METHOD - In a system including a plurality of node devices that form an ad hoc network ( | 06-21-2012 |
20120170488 | MODIFIED TREE-BASED MULTICAST ROUTING SCHEMA - In mesh networks having multiple nodes that communicate data to and from each other, a great number of data transmissions may be initiated and carried out to get data to a proper processing node for execution. To get data where it needs to go (e.g., the proper destination node), a routing algorithm is used to define a set of rules for efficiently passing data from node to node until the destination node is reached. For the purpose of assuring that all data is properly transferred from node to node in a reasonably efficient manner, a routing algorithm may define subsets of nodes into regions and then send data via the regions. Even greater overall efficiency may be realized by recognizing specific adjacency relationships among a group of destination nodes and taking advantage of such adjacencies by rerouting data through regions other than the region in which a destination node resides. | 07-05-2012 |
20120176937 | AD HOC NETWORK - The present disclosure set forth a method for a node to participate in an ad hoc network. The first node receives a first link information broadcasted omnidirectionally by a second node. The first link information indicates if the second node is communicating via a first directional link in a first polarization with a third node. The first node establishes a second directional link in a second polarization with the second node. | 07-12-2012 |
20120176938 | METHOD AND SYSTEM FOR CREATING A VIRTUAL WIRELESS SENSOR NETWORK - A method for creating a virtual Wireless Sensor Network (WSN) is disclosed. The method includes extracting one or more niceties of a physical WSN and embedding at least one of the extracted niceties in a soft object to represent one or more sensor nodes of the physical WSN. The method includes, sending equivalent command to the one or more sensor nodes of the physical WSN, when one or more changes are performed on corresponding niceties of the soft object. Further, the method adding or deleting one or more niceties corresponding to the one or more sensor nodes from the soft object upon ingress or egress of the one or more sensor nodes in the physical WSN. The method also includes steps of building application using the soft object of the virtual WSN. | 07-12-2012 |
20120176939 | Reference Signal Transmission and Reception Method and Equipment - A communications system and a method for performing communications are provided. User Equipments (UEs) are provided with UE-specific configuration information, such as CSI-RS (Channel Status Indication-Reference Signal) patterns, antenna port groupings, reference signal configurations, subframe configurations, and/or scrambling codes. The UEs process the received reference signals in accordance with the received configuration information and feedback measurement information for, e.g., PMI/CQI/RI (Precoding Matrix Indicator/Channel Quality Indicator/Rank Indicator of the precoding matrix) and/or the RLM/RRM (Radio Link Monitor/Radio Resource Management). | 07-12-2012 |
20120176940 | COURSE SEARCHING METHOD AND NODE DEVICE - A node device for searching for a course between start and end points in a network under constraining conditions includes a holding unit holding the constraining conditions corresponding to node devices and links connecting the node devices and indexes corresponding to the node devices and the links as network topology information; a making unit making combinations of the constraining conditions from which a part of the constraining conditions is removed; a searching unit searching for the course between the start point and the end point under the constraining conditions; a joining unit obtaining a joined result by joining the successfully searched for course to the network topology information; and a presenting unit comparing a piece of the network topology information corresponding to course information of the successfully searched for course with the removed part, extracting a nonconforming portion, and storing the joined result and the extracted nonconforming portion. | 07-12-2012 |
20120176941 | WIRELESS MESH NETWORK WITH DYNAMIC BACK OFF AND METHOD OF OPERATION - A wireless mesh network with dynamic back off for reduced power consumption is generally described herein. In some embodiments, the wireless mesh network includes a network controller to configure a data frame comprising a sync period followed by at least one data period and a plurality of network nodes configured to operate in at least one of a network-running mode and a sleep/RF quiet mode. The network controller is configured to transmit synchronization messages during a first portion of the sync period and receive upstream requests from the network nodes during a second portion of the sync period. During the sleep/RF quiet mode, the network nodes are configured to wake up periodically during a listening interval for detection of a synchronization message from the network controller, and return to the sleep/RF quiet mode and increase a back-off time between listening intervals for increasingly longer periods when no synchronization message is detected. | 07-12-2012 |
20120182903 | INFERRING CONNECTIVITY IN THE PRESENCE OF CONFLICTING NETWORK DATA - The connectivity information provided by a variety of inference engines is integrated to provide a set of inferred links within a network. A consolidation is performed among inference engines that operate at a base level of connectivity detail to create a model of the network at this base level. The connectivity information provided by inference engines at each subsequent higher level of connectivity abstraction is then overlaid on the base level connectivity. By separately consolidating the connectivity information at each level of abstraction, the rules for dealing with conflicts can be simplified and/or better focused to resolve the conflict. By assuming that the more detailed lower level information is likely to be more accurate, rules can be developed to modify the connectivity models produced by the higher level techniques to conform to the lower level connectivity details while still maintaining the integrity of the higher level connectivity models. | 07-19-2012 |
20120195231 | DYNAMIC NAME GENERATION - A dynamic name of a device within a network may be generated by accessing information related to the device; accessing information related to a remote, neighbor device; generating a dynamic name of the device based on the accessed information related to the device and the accessed information related to the remote, neighbor device; and storing the generated dynamic name of the device. Alternatively, a topology map of devices within a network may be generated where a central controller may access, from memory, a dynamic name of controlled devices, the dynamic name of the controlled devices including information related to remote, neighbor devices of the controlled devices. The topology map may include dynamic names of the controlled devices. | 08-02-2012 |
20120195232 | Method And An Apparatus For Providing Configuration Information To A Mobile Terminal - A method and a Mobile Access Gateway (MAG) node for use in an IP network. The MAG node comprises a server for providing configuration information. The server includes a memory for storing configuration information, and a processing unit configured to generate a request for configuration information associated with a mobile terminal that has attached to the network. The server caches the configuration information in the server memory, and includes one or more items of configuration information from the cached information in a message to be sent to the mobile terminal. | 08-02-2012 |
20120201169 | METHOD & APPARATUS FOR PROVISIONING A NETWORK SWITCH PORT - A network switch is comprised of a control processor and one or more line cards. The control processor includes functionality to register interest with a hypervisor, operating in conjunction with a network host connected to the switch, in data object attributes maintained on the network host by the hypervisor. The hypervisor associated with the network host sends changes in the host attributes to the switch which the switch maintains in a listing of attributes. The switch traps and copies particular packets to the switch control processor where a provisioning function operates on the attribute information in the list with source information included in the packet header in order to configure a forwarding table on the line card. | 08-09-2012 |
20120207060 | Method and System for Implementing ID/Locator Mapping - A method and a system for implementing an ID-Locator (ID/LOC) mapping are disclosed. The method includes: after allocating a new IP address to User Equipment (UE), the network side sending an ID/LOC mapping request to an ID-LOC-split Mapping Functional Entity (ILM-FE); and the ILM-FE returning a response with mapping information to the network side according to the received ID/LOC mapping request. The method initiates the ID/LOC mapping based on a network in an ID/locator separation in NGN (IPSPLIT) network, which improves the efficiency of the ID/LOC mapping. | 08-16-2012 |
20120207061 | Distributed Storage of Routing Information in a Link State Protocol Controlled Network - A distributed hash table is implemented to store routing information on a network. Node IDs exchanged in connection with implementation of a link state routing protocol are used as keys in the distributed hash table, and routes are stored at one or more nodes on the network. When a route is learned, the route is processed against the set of keys to determine which nodes should store the route. When a route is needed, the route is processed against the set of keys to determine which nodes should have the route information. The manner in which the route is processed against the set of keys is the same in both instances, so that the DHT may be used to store and retrieve route information on the network. | 08-16-2012 |
20120213124 | METHOD AND APPARATUS TO TRIGGER DAG REOPTIMIZATION IN A SENSOR NETWORK - In one embodiment, a probing technique allows a root node to determine whether to trigger reoptimization of a computer network represented by a directed acyclic graph (DAG) without injecting unnecessary traffic into the network. The root node may store and maintain information indicative of an ideal shape or topology of the DAG. During a normal DAG maintenance operation, the root node may transmit a DAG discovery request (probe request) that is configured to probe each node within the DAG for information used to determine a current topology of the DAG. In response, each node may record the information, e.g., routing and non-routing metrics, in a DAG discovery reply (probe reply) that is propagated to the root node. Upon receiving one or more replies, the root node may analyze the metrics to determine whether the current topology of the DAG deviates from the ideal DAG topology. The root node may thus determine DAG topology deviation upon probing at minimal cost. A number of algorithms may then be used to determine whether reoptimization, i.e., global repair, of the DAG is is required and, if so, the root node may dynamically trigger the global repair. | 08-23-2012 |
20120213125 | Network Connecting Device and Method - A network connecting device includes: a wired LAN connection detection section that detects connecting of a LAN cable; a profile management section that manages a profile; a profile selection section that selects in sequence at least one profile that indicates wired LAN connection; a network configuration section that sets a network configuration based on the selected profile; a network identification information acquisition section that acquires network identification information; a network determination section that determines whether or not a wired LAN with which a connection is formed by the LAN cable and a network indicated by the profile match each other; and a network connection section that applies the profile when it is determined as a match. | 08-23-2012 |
20120213126 | METHOD AND SYSTEM FOR MOBILE NETWORK NODES IN HETEROGENEOUS NETWORKS - A method, and a system for implementing the method, for creating an optimized communications link between at least two mobile network nodes, whereby lookup tables of available network interfaces may be created and updated periodically thereof, configuration data is transmitted between the mobile network nodes via an available signaling channel, at least one signaling channel is created via one of the available network interfaces based on the configuration data in order to transmit configuration data, and at least one data channel is created via one of the available network interfaces based on the configuration data, with the data channel being changed from one available network interface to another available network interface, after determining by the use of the lookup table that quality of service of the one available network interface is insufficient. | 08-23-2012 |
20120218918 | WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, PROGRAM, AND WIRELESS COMMUNICATION SYSTEM - Provided is a wireless communication apparatus including an application, a communication control unit for controlling a search process for discovering at least one peripheral wireless communication apparatus and a connection process to a peripheral wireless communication apparatus, and a display control unit for generating a display screen including display of the at least one peripheral wireless communication apparatus discovered by the search process. The communication control unit starts control of the search process by start of the application, and controls the connection process to a wireless communication apparatus selected on the display screen. | 08-30-2012 |
20120224509 | AIR INTERFACE SELECTION BETWEEN NODES IN PEER-TO-PEER/AD-HOC NETWORKS - Aspects describe pairs of nodes negotiating air interfaces in a peer-to-peer and/or ad hoc network. The negotiation can take into account the capability of each node. The negotiation can be performed on a default link and after negotiation, the nodes can facilitate a communication handoff to the negotiated link. Further, one or more nodes can support multiple air interfaces, wherein nodes that support multiple air interfaces can establish more than one air interface with peer nodes over similar air interfaces or over different air interfaces as a function of negotiation between the nodes. | 09-06-2012 |
20120230224 | MOBILE COMMUNICATION SYSTEM, RELAY STATION, AND BASE STATION - A mobile communication system includes a base station and a relay station. The base station transmits carrier information to the relay station during connection of a first radio link using a first carrier. The carrier information indicates at least one candidate carrier available for performing multi-carrier communication on the first radio link. The relay station transmits, to the base station, request information about a configuration of the first radio link for the at least one candidate carrier indicated by the carrier information. The base station further determines, in response to receiving the request information from the relay station, a second carrier used with the first carrier for the multi-carrier communication. | 09-13-2012 |
20120230225 | Hash-Based Load Balancing with Per-Hop Seeding - Methods and apparatus for improving hash-based load balancing with per-hop seeding are disclosed. The methods and apparatus described herein provide a set of techniques that enable nodes to perform differing mathematical transformations when selecting a destination link. The techniques include manipulation of seeds, hash configuration mode randomization at a per node basis, per node/microflow basis or per microflow basis, seed index generation, and member selection. A node can utilize any, or all, of the techniques presented in this disclosure simultaneously to improve traffic distribution and avoid path starvation with a degree of determinism. | 09-13-2012 |
20120236757 | Convergent network topology discovery and mapping - Convergent network topology discovery and mapping. A topology discovery protocol allows for the discovery of the different respective communication links within a convergent network that may become composed of any of a number of different respective network types (e.g., a local area network (LAN), wireless LAN (WLAN/WiFi), a multimedia over coax alliance (MoCA) network, a HomePlug network, and a wireless point to point (P2P) system, etc.). Such a topology discovery protocol may be implemented as a Layer 2 peer-to-peer link layer discovery protocol (LLDP). Topology discovery may be limited to neighboring nodes only (e.g., reporting information corresponding only to those nodes directly connected to a given node). Any desired device within the overall convergent network may serve as a mapper operative communication device (e.g., that device which performs the mapping service such as in accordance with generating a graph corresponding to the topology indicating of connectivity among the various communication devices). | 09-20-2012 |
20120236758 | HYBRID NETWORKING SIMPLE-CONNECT SETUP USING FORWARDING DEVICE - A simple connect setup function for hybrid networks is provided that allows a user to add devices optionally having a number of different network interfaces (e.g., that facilitate communications using different network technologies or protocols) to a hybrid network in a single, simplified operation that alleviates the need for the user to individually connect and/or configure a multitude of different network interfaces. The simple connect setup function also alleviates the need for the user to know on which devices the simple connect setup function must be activated for successful simple connect setup. | 09-20-2012 |
20120243440 | METHOD FOR FEEDING BACK CHANNEL STATE INFORMATION AND DETERMINING COORDINATED MULTI-POINT MODE AND DEVICE - A method for feeding back channel state information and determining a coordinated multi-point mode and a device are disclosed. The method for feeding back channel state information includes: obtaining multiple pieces of channel state information of multiple cells in a coordinated multi-point mode; and selecting the preset quantity of pieces of irrelevant channel state information from the multiple pieces of channel state information, and feeding back the selected channel state information to a corresponding network side device. | 09-27-2012 |
20120243441 | Method and Apparatus for Multipath Communication - In accordance with an example embodiment of the present invention, there is provided a method, comprising exchanging connectivity information, setting up a connection, determining that a correspondent node has at least one access in an inactive state, and transmitting a request to the correspondent node to activate at least one of the at least one access in an inactive state. The setting up may be done based on the exchanged connectivity information. | 09-27-2012 |
20120250582 | DESIGNING MINIMUM TOTAL COST NETWORKS USING ITERATIVE ROUNDING APPROXIMATION METHODS - Minimum cost networks, such as fiber optic networks used in telecommunications, are obtained by defining available network elements having cost, required pairs, connectivity and penalty cost values and selecting from these available elements using an iterative rounding approximation method that constructs an LP relaxation incorporating the element parameters, finds an optimal basic solution, applies a selection criterion to pairs and edges in the optimal basic solution, and constructs a residual LP relaxation with selected pairs and edges. By fixing selected pairs and edges values to 1 in the residual LP, successive iterations of the method provide a design which is a 3-approximation solution to the minimum cost design problem. | 10-04-2012 |
20120250583 | Multi-Protocol Label Switching Multi-Topology Support - A network component comprising at least one processor configured to implement a method comprising receiving a packet, determining whether the packet comprises a topology label, and adding the topology label to the packet if the packet does not comprise the topology label. Included is a method comprising routing a plurality of packets corresponding to a plurality of forwarding equivalence classes (FECs) over a plurality of network topologies using a topology label and plurality of forwarding labels for each network topology. Also included is a network comprising a plurality of nodes in communication with each other and having a plurality of network topologies, wherein at least some of the nodes are configured to route data packets for a plurality of FECs along a path in each network topology using a topology label corresponding to each network topology and an inner label corresponding to each FEC. | 10-04-2012 |
20120257543 | NETWORK CONFIGURATION FOR DEVICES WITH CONSTRAINED RESOURCES - A method includes receiving a wireless beacon from an ad hoc network at a wireless device, wherein the wireless beacon includes a data structure that encodes at least a portion of a wireless identifier of an access point. The method includes configuring the wireless device from the data structure received from the wireless beacon. The method also includes establishing a wireless network between the access point and the wireless device utilizing at least a portion of the wireless identifier encoded in the data structure. | 10-11-2012 |
20120257544 | CONFIGURATION SPACE FEEDBACK AND OPTIMIZATION IN A SELF-CONFIGURING COMMUNICATION SYSTEM - Methods, devices, and computer program products facilitate proper allocation of network resource in a self-configuring network. The initial configuration space associated with the self-configuring network is updated based on information received from the network that describes particular adequacies or inadequacies of the initial configuration space. Based on the received information, the configuration space is updated to accommodate proper and efficient operations of the network. | 10-11-2012 |
20120257545 | METHOD FOR THE QUALITATIVE ROUTING IN A MULTI-HOP COMMUNICATION NETWORK, AND NETWORK NODE MANAGEMENT FACILITY - A method for the qualitative routing of data in an ad hoc multi-hop communication network makes it possible to determine, on the basis of a determinable communication quality criterion, at least one path for the passage of the data through links between nodes, the links being capable of mutually interfering during the passage of the data. According to the invention, in order to determine the path, the intra-flow interference is taken into account, and a step of determining overall network topology and a step of determining the interfering links are implemented, the latter step being implemented by determining a conflict graph. The path is obtained by resolving a linear system with completeness constraints. | 10-11-2012 |
20120269095 | METHOD AND APPARATUS FOR PROVIDING A NETWORK SEARCH FUNCTION - A method for providing an autonomous search function may include discovering, at a user terminal, a first access node providing access in accordance with a first radio access technology (RAT), causing an attempt to discover a second access node providing access in accordance with a second RAT in response to discovering the first access node where the first access node has a first coverage area and the second access node has a second coverage area that at least partially overlaps with the first coverage area, and causing storage of fingerprint information associated with the first access node together with storage of fingerprint information associated with the second access node. An apparatus and computer program product corresponding to the method are also provided. | 10-25-2012 |
20120269096 | SELF-FORMING NETWORK - A connected computer may be operated as node by inspecting communications from other nodes that pass through that node. From the communications, two or more pointers may be determined for the given node. These pointers may include a first pointer identified by a default designation that links the given node to a first node in the network, and a second pointer to another node. The second pointer may be identified by a determination that a designated criteria has been satisfied after the given node is placed on the network. | 10-25-2012 |
20120275342 | MICROWAVE BACKHAUL ARRANGEMENTS - Described herein are techniques related to wireless communication systems that may implement microwave backhaul for connectivity between network elements deployed by the wireless communication systems. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. | 11-01-2012 |
20120275343 | USING BATTERY-POWERED NODES IN A MESH NETWORK - In embodiments of the present invention improved capabilities are described for configuring a constant powered mesh network node to control a configuration of an intermittently powered mesh network node, where the intermittently powered mesh network node may include a repeater node that periodically powers down for a time period to conserve energy. The embodiments include transmitting a message beam to the repeater node, where a duration of the message beam length may exceed the time period that the repeater node is powered down, and where the message beam may contain a preamble with data that may indicate that the repeater node is to remain powered up in order to receive a message, and may cause the intermittently powered mesh network node to request configuration information relating to a network topology from the constant powered mesh network node when the intermittently powered mesh network node powers up. | 11-01-2012 |
20120275344 | METHODS AND APPARATUS TO IMPLEMENT SCALABLE ROUTING IN NETWORK COMMUNICATION SYSTEMS - An example method involves for a first virtual private network (VPN) installed on a candidate hub router, selecting a first spoke-to-hub assignment solution having a first least memory utilization cost to assign the candidate hub router a quantity of first virtual private edge (VPE) routers serving the first VPN; for a second VPN installed on the candidate hub router, selecting a second spoke-to-hub assignment solution having a second least memory utilization cost to assign the candidate hub router a quantity of second VPE routers serving the second VPN; determining third least memory utilization costs to assign the candidate hub router to a quantity of the first VPE routers, and fourth least memory utilization costs to assign the candidate hub router to a quantity of the second VPE routers; and selecting the first or second spoke-to-hub assignment solution for the candidate hub router based on the least memory utilization costs. | 11-01-2012 |
20120275345 | METHOD FOR GENERATING AND REGISTERING IDENTIFICATION IN WIRELESS SENSOR NETWORK - A method for generating and registering an identification in a wireless sensor network. The method includes generating an identification of a first layer node; transmitting the identification of the first layer node to a second layer node; detecting whether the identification of the first layer node is duplicated, using the second layer node; if the identification of the first layer node is not duplicated, transmitting a determination message from the second layer node to the first layer node; and determining the identification of the first layer node as a determined identification. The method further includes: if the second layer node does not have a determined identification, re-transmitting the identification of the first layer node after a predetermined period of time has lapsed. Therefore, an automatically identification allocating method using a hierarchical structure can be adopted to enable a distributed management. | 11-01-2012 |
20120287820 | METHOD AND A DEVICE FOR OPTIMIZING DATA TRANSFER IN A WIRELESS COMMUNICATION NETWORK - A method for optimizing data transfer in a wireless communication network is presented. A routing protocol is run for enabling data transmission devices ( | 11-15-2012 |
20120294192 | METHOD AND APPARATUS OF CONNECTIVITY DISCOVERY BETWEEN NETWORK SWITCH AND SERVER BASED ON VLAN IDENTIFIERS - A management computer for managing configuration of servers for connection to a switch comprises a port discovery module to: instruct a target server, for connection to a target switch port, to create a virtual adapter on a virtual switch associated with a physical NIC in the target server; obtain a list of VLAN IDs on all switch ports; select one or more VLAN IDs from the list based on a preset policy; set one such VLAN ID onto the virtual adapter; instruct the target server to manipulate the virtual adapter to send a packet with the set VLAN ID to the target switch port; if the switch accepted the packet sent to the target switch port, update a switch port mapping using the set VLAN ID as a discovered VLAN ID to map the physical NIC associated with the virtual adapter to the target switch port having the discovered VLAN ID. | 11-22-2012 |
20120294193 | Method and System for Increasing Forwarding Efficiency of Virtual Private LAN Service Network - The present invention provides a method and system for increasing forwarding efficiency of a virtual private LAN services network. The method includes: a root node provider edge (PE) in the VPLS network transmitting at least one of broadcast message, multicast message and unknown unicast message to leaf nodes PE in the same VPLS through a point-to-multipoint pseudo wire (P2MP PW). The present invention transmits messages through the P2MP PW between a PE and other PEs, thus decreasing the number of redundant messages on a physical link, increasing the forwarding efficiency of network, and reducing the network operating costs. | 11-22-2012 |
20120300674 | FAST CONVERGENCE ON CHILD LINK FAILURES AND WEIGHTED LOAD BALANCING OF AGGREGATE ETHERNET/SONET BUNDLES - A network device provides a selector list that includes indices of child nexthops associated with the network device, where each of the child nexthops is associated with a corresponding child link provided in an aggregated bundle of child links. The network device also receives an indication of a failure of a child link in the aggregated bundle of child links, and removes, from the selector list, an index of a child nexthop associated with the failed child link. The network device further receives probabilities associated with the child links of the aggregated bundle of child links. Each of the probabilities indicates a probability of a packet exiting the network device on a child link. The network device also creates a distribution table based on the probabilities associated with the child links, and rearranges values provided in the distribution table. | 11-29-2012 |
20120307685 | Method and Apparatus of Active Scanning in Wireless Local Area Network - Disclosed are a method and apparatus for active scanning of a station in a wireless local area network (WLAN), the method for active scanning in a wireless local area network (WLAN), the method including: receiving a probe request frame including probe request relaying information from a probe requesting station (STA) initiating the active scanning; determining whether to relay the the probe request frame; and relaying the probe request frame to an access point (AP) if it is determined to relay the probe request frame, the probe request relaying information including a transmitter address field that indicates an address of an STA transmitting the probe request frame, and a probe requesting STA address field that indicates an address of the probe requesting STA. With this imbalance between scanning coverage and service coverage in a TV WS is solved to thereby more efficiently perform scanning. | 12-06-2012 |
20120314623 | BLUETOOTH NETWORK CONFIGURATION - A method, apparatus, and computer program for operating a Bluetooth network is presented. The method comprises providing a Bluetooth system comprising a plurality of Bluetooth devices forming Bluetooth piconets disconnected from each other; and providing a route for a data packet between two remote Bluetooth devices through the Bluetooth system by sequentially changing structures of the Bluetooth piconets, wherein at least some of the plurality of Bluetooth devices sequentially create and terminate connections with different Bluetooth devices as a result of the sequential change of the structures of the Bluetooth piconets. | 12-13-2012 |
20120320800 | Mac Learning in a Trill Network - A switch of a data network implements both a bridge and a virtual bridge. In response to receipt of a data frame by the switch from an external link, the switch performs a lookup in a data structure using a source media access control (SMAC) address specified by the data frame. The switch determines if the external link is configured in a link aggregation group (LAG) and if the SMAC address is newly learned. In response to a determination that the external link is configured in a LAG and the SMAC address is newly learned, the switch associates the SMAC with the virtual bridge and communicates the association to a plurality of bridges in the data network. | 12-20-2012 |
20120327811 | VIRTUAL NETWORK CONNECTION METHOD, NETWORK SYSTEM, AND NETWORK DEVICE - A communication can be conducted between a hub network layer-3VPN-connected to a core network and a hub network layer-2VPN connected to the core network. A first NW that conducts a packet forwarding of a VPN, a second NW that is layer-3-connected to the first NW, and a third NW that is layer-2-connected to the first NW configure VPN. When a packet is transmitted from the second NW to a destination of the third NW, a packet forwarding processing by a layer is conducted, and information is stored in destination information of the packet and forwarded by using destination information and information on the network device PE belonging to the first NW which is connected to the third NW which is a relay point to the destination. | 12-27-2012 |
20130003603 | SCALE-FREE ROUTING TOPOLOGY FOR A POWER NETWORK - A scale free communication network in a power network is provided. The scale free communication network comprises a plurality of distribution devices communicatively coupled to each other in a power network that include a protection device and a controller coupled to each of the plurality of distribution devices in the power network. The controller identifies a plurality of isolated distribution devices. The controller further restores the plurality of isolated distribution devices in the power network by automatically activating the tie-switch in the power network. The controller also computes reliability indicators for each of the restored distribution device in the power network. Furthermore, the controller identifies critical distribution devices in the power network based on the computed reliability indicators and establishes a scale free communications network within the power network based on the identified critical distribution devices. | 01-03-2013 |
20130003604 | Method and Apparatus for Enhancing Downlink Control Information Transmission - A method is provided for transmitting an extended physical downlink control channel (E-PDCCH). The method comprises transmitting control information in at least one time-frequency resource unit that would otherwise be used to carry a physical downlink shared channel (PDSCH). The E-PDCCH and at least one PDSCH are multiplexed in a transmission time interval. A first set of configuration of the E-PDCCH is semi-statically signaled and a second set of configuration of the E-PDCCH is dynamically signaled. | 01-03-2013 |
20130003605 | NETWORK OPTIMIZATION - Aspects of the present disclosure involve a method for optimizing an extension of an optical network to provide service to one or more new customers. The method considers the location of existing network nodes as well as a metropolitan environment where the new customer is located (e.g., the geographical location of streets where fiber may be routed to a customer). Aspects of the present disclosure further employ one of various linear programming models, such as a 1-Layer Model, a 3-Layer Model, a 5-Layer Model and a Dual Path Model to generate cost effective solutions to extend the existing optical network to provide service to the new customers. | 01-03-2013 |
20130003606 | FORMATION AND REARRANGEMENT OF AD HOC NETWORKS - Systems and methods for the formation and rearrangement of ad hoc networks and more particularly to systems and methods for sharing bandwidth in ad hoc networks. The method comprises broadcasting a table to at least one potential lender requesting pertinent lender information and receiving the table from the at least one potential lender with the pertinent lender information. The method further includes selecting one or more lenders of the at least one potential lender which meet preset criteria and establishing an ad hoc network with the one or more lenders based on the selecting. | 01-03-2013 |
20130010643 | Method and apparatus for loop path search in mesh network - The present invention discloses a method and apparatus for loop path search in a mesh network, comprising: a network side searching for all nodes adjacent to node v | 01-10-2013 |
20130010644 | AUTO-DISCOVERY AND MANAGEMENT OF BASE STATION NEIGHBORS IN WIRELESS NETWORKS - Systems and methods are disclosed that include determining a local node configuration for a local network node. The local network node configuration can include a local range and a local location. In addition, these systems and methods can include receiving a remote network node configuration for a remote network node via a communications link. The remote network node configuration can include a remote range and a remote location. Also these systems and methods can further include generating a neighbor list that includes the remote network node and the local network node. The neighbor list can be determined using the local network node configuration and the remote network node configuration. | 01-10-2013 |
20130010645 | METHOD FOR ACQUIRING INFORMATION, USER EQUIPMENT, AND NETWORK EQUIPMENT - A method for acquiring information includes: receiving an Internet Protocol (IP) address acquisition request or Packet Data Network (PDN) address allocation information sent by User Equipment (UE); determining a PDN address capability according to the IP address acquisition request or the PDN address allocation information; and sending the determined PDN address capability to the UE. An UE and network equipment are also provided. The PDN address capability is determined by the network and is sent to the UE, so as to indicate to the UE the IP address information that may be acquired in a current PDN connection, such that when the network cannot provide an IP address for the UE any more, the UE is prevented from acquiring other IP addresses in other manners, avoiding service abnormality. | 01-10-2013 |
20130010646 | Method and device for managing network topology structure of machine to machine network - The disclosure discloses a method for managing network topology structure of a Machine to Machine (M2M) network. The method mainly includes: a control station of the M2M network obtains wireless link information of the M2M network; the control station completes establishment and/or adjustment of the network topology structure of the M2M network according to the obtained wireless link information. The disclosure also provides a device for managing network topology structure of an M2M network. By the disclosure, performing self-adaptive management on numerous terminals can be realized by the M2M network; by applying the disclosure to the wireless network management of the M2M network, manpower cost is saved and working efficiency is improved, and also it is of important significance to the smooth development of the telecom operation. | 01-10-2013 |
20130010647 | Audio Network System and Display Method - In a top row on an audio network view screen, device images corresponding to devices composing a basic network are displayed in such a manner as to be arranged in a horizontal direction according to a connection order along with connection cable images indicative of connections between the device images according to connections between devices in the network. In display rows subsequent under the top row, other device images corresponding to devices composing another network which is connected to a connection node in the basic network with a full bridge are displayed in such a manner as to be arranged in the horizontal direction in a connection order along with connection cable images indicative of connections between the device images according to connections in the other network. As for a network connected to the basic network with a partial bridge setting, a partial bridge image is displayed in a display rows. | 01-10-2013 |
20130016628 | METHOD AND SYSTEM FOR MANAGING NETWORK DEVICES OF GENERIC VENDORS AND MANUFACTURESAANM Bertani; SebastianoAACI MilanAACO ITAAGP Bertani; Sebastiano Milan ITAANM Piacente; CristianAACI CatanzaroAACO ITAAGP Piacente; Cristian Catanzaro ITAANM Rincon Ray; AndreaAACI San Fermo della Battaglia COAACO ITAAGP Rincon Ray; Andrea San Fermo della Battaglia CO IT - A method of remote management in a network having a plurality of nodes to be managed by a remote controller has an agent device that makes initial contact with the remote controller in order to establish a connection with the remote controller. After the connection is established, the remote controller executes a discovery procedure through intermediation of the agent device for discovering the plurality of nodes. After executing the discovery procedure, the remote controller executes an identification procedure through intermediation of the agent device for identifying the discovered nodes, including identification of at least one characterizing parameter such as model, vendor, manufacturer, software version, hardware version, firmware version, serial number and MAC address. | 01-17-2013 |
20130016629 | NETWORK-ASSISTED PEER DISCOVERY WITH NETWORK CODING - Techniques for performing network-assisted peer discovery with network coding are disclosed. For peer discovery with network coding, a device may generate a network-coded message based on a message assigned to the device and one or more messages received by the device from other devices. The device may transmit a proximity detection signal including the network-coded message. For network-assisted peer discovery with network coding, the device may register with a network for peer discovery and may be provided with at least one parameter to use for peer discovery with network coding. The devices may perform peer discovery with network coding in accordance with the peer discovery parameter(s) received from the network. The device may generate a network-coded message based on the at least one peer discovery parameter and may transmit the network-coded message to enable other devices to detect the device. | 01-17-2013 |
20130016630 | BEACONS FOR USER EQUIPMENT RELAYS - Certain aspects of the present disclosure provide methods and apparatus for detecting user equipment (UE) relays using beacons (whether in-band or out-of-band) or other mechanisms. One method generally includes determining an identifier indicative of a UE functioning as a relay and transmitting a broadcast signal including the identifier. Another method generally includes receiving, at a UE functioning as a relay, first broadcast signals at a first interval from an apparatus serving the UE; and transmitting second broadcast signals at a second interval, wherein the second broadcast signals are the same type as the first broadcast signals and wherein the second interval is greater than the first interval. | 01-17-2013 |
20130021949 | Distributing Information - Information related to a set of networks from a first node to a second node of a communication system can be distributed. A set of identifiers which belong to the set of networks can be stored at the first node. Hash values are generated at the first node for the identifiers in the set of identifiers using a hash function. The generated hash values are transmitted from the first node to the second node. The second node determines an identifier of a particular network available for communicating with the second node. The second node generates a hash value for the identifier using the hash function. The second node compares the hash value of the identifier with the hash values received at the second node from the first node to determine whether the particular network belongs to said set of networks. | 01-24-2013 |
20130028140 | USING SERVICE DISCOVERY TO BUILD ROUTING TOPOLOGIES - In one embodiment, a particular route optimizing device of a computer network (e.g., an NMS or a device in the network) discovers one or more registered services for the computer network, the registered services indicating one or more corresponding routing characteristics associated with the respective registered service. By comparing the one or more service-related routing characteristics with a current routing characteristic of a routing topology of the computer network (where the routing topology built based on a current routing topology strategy), it can be determined whether to update the routing topology strategy based on the comparison. In response to determining to update the routing topology strategy, one or more devices in the computer network may then be informed of an updated routing topology strategy and associated service-related routing characteristics, where the one or more devices are configured to update the routing topology based on the updated routing topology strategy, accordingly. | 01-31-2013 |
20130028141 | METHOD AND APPARATUS FOR ALLOCATING BACKBONE VLAN IDENTIFIERS - Methods and apparatuses for allocating backbone virtual local area network identifiers (BVIDs) to connection requests in a provider backbone bridging-traffic engineering (PBB-TE) network are described. During operation, a system (e.g., a network management system) can receive a set of connection requests for a set of connections that are desired to be set up in the PBB-TE network. Next, the system can allocate a BVID to each connection request in the set of connection requests so that, once the set of connection requests are set up in the PBB-TE network, conflicting connections in the PBB-TE network have different BVIDs. | 01-31-2013 |
20130028142 | RESILIENCY-AWARE HYBRID DESIGN OF CONTROLLER-SWITCH CONNECTIVITY IN A SPLIT-ARCHITECTURE SYSTEM - A method and apparatus for optimizing the resilience of a network using a combination of in-band and out-of-band signaling is disclosed. The metric used in the embodiment's algorithm to determine resilience is the maximum number of protected neighbors. Nodes closer to the controller are assigned a higher weight than those further from the controller because if their connection to the network is interrupted, all their downstream nodes will be affected and disconnected. Therefore, when determining a path to the controller, switches with alternate paths to the controller are preferred. Dedicated connections using out-of-band signaling are assigned to convert unprotected nodes to protected nodes thus improving the resilience of the network. | 01-31-2013 |
20130034020 | LINK SHARING WITHIN A COMMUNICATION SYSTEM - A method and apparatus for choosing members of a local-area network and choosing a network coordinator among the members is provided herein. During operation a mobile node will determine presence information for nodes within its local area. These nodes will be solicited by the node to be part of a local-area network. Of all nodes that accept the request to form a local area network, a network coordinator for the local-area network will be chosen by determining which node's data budget allows for the cheapest transfer of data. The node with the best data budget is then chosen to be a network coordinator. | 02-07-2013 |
20130034021 | AUTOMATED NETWORK CONFIGURATION IN A DYNAMIC VIRTUAL ENVIRONMENT - In a computer-implemented method, a port profile is associated with a virtual machine that requires a VLAN connection to an external network through an edge port. The port profile includes a VLAN identification associated with the VLAN connection and an edge port identification associated with the edge port. The method further comprises deploying the virtual machine to a target physical server, wherein both the target physical server is in communication with a network switch comprising the edge port. After deploying the virtual machine to the target physical server, the virtual machine is automatically provided with a VLAN connection to the external network in accordance with the port profile associated with the virtual machine. Similarly, a port profile may be associated with a virtual machine as it is created and deployed to a server, wherein the VLAN connection is configured according to the associated port profile. | 02-07-2013 |
20130034022 | Method of Unified Parameter Mapping - A method of unified parameter mapping for a communication device comprising a medium access control (MAC) abstraction sub-layer for converging a plurality of media in a network system is disclosed. The method comprises obtaining a unified parameter and value of the unified parameter from an upper layer of the MAC abstraction sub-layer, and a medium type of a MAC layer underlying the MAC abstraction sub-layer, determining a special parameter for configuration of the medium type of the MAC layer and a format of the special parameter according to the medium type of the MAC layer and the unified parameter, and generating value of the special parameter according to the value of the unified parameter and the format of the special parameter. | 02-07-2013 |
20130034023 | METHOD FOR CREATING WI-FI P2P GROUP - A method and an apparatus for creating a Wireless Fidelity (Wi-Fi) Peer-to-Peer (P2P) group are provided. The method includes creating a 1:N P2P group by connecting a third P2P device to a 1:1 P2P group created by setting a first P2P device as a group owner and setting a second P2P device as a group client, transmitting, by the second P2P device, a request message requesting creation of a new P2P group, to the third P2P device, transmitting, by the third P2P device, a response message to the request message, and creating the new P2P group between the second P2P device and the third P2P device through exchange of the request message and the response message. | 02-07-2013 |
20130034024 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR IMPLEMENTING A VIRTUAL POSTING SERVICE - A virtual posting service includes detecting, via a communications device over a wireless network, a presence of another communications device within a defined geographic community that is accessible by the wireless network. The service also includes determining a mode status of the other communications device. If the mode status of the other communications device is determined to be passive discover mode, the service includes automatically transmitting content stored in the communications device to the other communications device. If the mode status of the other communications device is determined to be active discover mode, the service includes transmitting a portion of the content stored in the communications device to the other communications device responsive to an inquiry from the other communications device. The inquiry includes search criteria. If the mode status is broadcast mode, the service includes receiving a communication over the wireless network from the other communications device. | 02-07-2013 |
20130039218 | LIMITING MAC ADDRESS LEARNING ON ACCESS NETWORK SWITCHES - A LAN includes a CORE switch linked to some number of TOR switches, and each of the TOR switches are linked directly to some number of host devices. Each of the switches in the LAN operate to process and transmit data frames they receive from neighboring LAN devices. Each TOR switch in the LAN builds and maintains a layer-2 forwarding table that is comprised of MAC address information learned from frames they receive from neighboring LAN devices. Selected ports/VLANs on some or all of the TOR devices are designated to be CORE/switch facing ports (CFP) or host facing ports (HFP). Each of the CFPs are configured to only learn the MAC address in unicast frames it receives and each of the HFPs can be configured to learn the MAC address of both unicast and multicast data frames provided the destination MAC address included in the unicast frame is known. | 02-14-2013 |
20130039219 | SYSTEM AND METHOD FOR CONTROLLING A POWER LINE NETWORK - A system and a method for controlling a power line network are provided. In the system and the method, a control unit device in every control network generates its own control network identification (CNID) and sends query messages to the other control networks to ensure each CNID is unique in the signal-reachable networks. The system and the method differentiate messages of the local control network from messages of the other control networks based on received signal strength of the messages in order to correctly demarcate multiple control networks. | 02-14-2013 |
20130039220 | CONFIGURATION OF SYNCHRONISATION NETWORK HAVING SYNCHRONIZATION TRAILS FOR TIME SYNC AND FREQUENCY SYNC - Configuring a node ( | 02-14-2013 |
20130039221 | FREQUENCY BAND SELECTION FOR MULTIPLE HOME NETWORKS - A network-capable device is configured to: automatically detect the presence of a MoCA network (or other network, depending on the network protocol in the application environment), and configure itself for communication on that network at the appropriate communication frequencies. The network-capable device can be configured to create a new network (e.g., a new MoCA network) if there is no network broadcast signal within a band. Preferably, the network-capable device requires little or no user intervention to configure itself for operation at network operating frequencies or to create a new network where none is detected. | 02-14-2013 |
20130044640 | Method of Processing Device Discovery - A method of processing device discovery for a first communication device in a network system is disclosed. The method comprises generating a discovery management frame including an identity and a medium access control (MAC) address of the first communication device, broadcasting the discovery management frame, and when a response corresponding to the discovery management frame is received from the second communication device, adding an entry with the identity and the MAC address of the second communication device in a device table stored in the first communication device. | 02-21-2013 |
20130044641 | FEDERATING INTERCONNECTION SWITCHING ELEMENT NETWORK TO TWO OR MORE LEVELS - A network control system for interconnecting several separate networks. The system includes i) several interconnection switching elements, each of which is for connecting one of the separate networks to a common interconnecting network, ii) a first set of network controllers for managing a first set of the interconnection switching elements at a first set of separate networks in order for machines at different networks within the first set to communicate with each other, iii) a second set of network controllers for managing a second set of interconnection switching elements at a second set of separate networks in order for machines at different networks within the second set to communicate with each other, and iv) a third set of network controllers for managing the first and second sets of network controllers in order for machines at networks in the first set to communicate with machines at networks in the second set. | 02-21-2013 |
20130058255 | MANAGED SWITCH ARCHITECTURES: SOFTWARE MANAGED SWITCHES, HARDWARE MANAGED SWITCHES, AND HETEROGENEOUS MANAGED SWITCHES - Some embodiments provide a system that includes a set of network controllers for receiving definitions of first and second logical switching elements. The system includes several managed switching elements. The set of network controllers configure the several managed switching elements to implement the defined first and second logical switching elements. The system includes several network hosts that are each (1) communicatively coupled to one of the several managed switching elements and (2) associated with one of the first and second logical switching elements. Network data communicated between network hosts associated with the first logical switching element are isolated from network data communicated between network hosts associated with the second logical switching element. | 03-07-2013 |
20130058256 | PORT MAPPING METHOD AND APPARATUS, AND COMMUNICATION SYSTEM - Embodiments described herein disclose a port mapping method and apparatus, and a communication system. A method includes: obtaining static port mapping information that includes a corresponding relationship between a public network port number, a DHCP client identifier, and a private network port number; obtaining a corresponding relationship between the DHCP client identifier and a private network IP address, and a public network IP address of a NAT gateway; and establishing a port mapping relationship according to the obtained public network IP address of the NAT gateway, the corresponding relationship between the DHCP client identifier and the private network IP address, and the static port mapping information. | 03-07-2013 |
20130064138 | Mechanism for controlling device-to-device discovery procedcure - There is provided a mechanism for registering and attaching a UE to a D2D discovery function. After identifying an ID information of at least one PLMN assigned for a D2D discovery and communication, a request for registering and attaching the UE to the D2D discovery function at the identified PLNM is sent to the network. The network sends a grant for the D2D discovery together with an indication corresponding to an identity of the at least one PLMN used for communicating resources dedicated to the D2D discovery and communication. | 03-14-2013 |
20130064139 | APPARATUS AND METHOD FOR DETECTING CRITICAL NODES AND CRITICAL LINKS IN A MULTI-HOP NETWORK - A method includes obtaining a matrix defining a topology of a multi-hop network, where the topology identifies nodes and links between the nodes in the multi-hop network. The method also includes identifying one or more Eigenvalues and/or one or more Eigenvectors of the matrix. The method further includes determining whether the topology of the multi-hop network defines a disconnected network using the one or more Eigenvalues and/or the one or more Eigenvectors. For example, one or more Eigenvalues of the matrix can be identified, and a determination can be made whether a second smallest Eigenvalue equals zero. As another example, Eigenvectors corresponding to two smallest Eigenvalues of the matrix can be identified, and a determination can be made whether the Eigenvectors have opposite zero and non-zero entries such that, for all entries in the Eigenvectors, an i | 03-14-2013 |
20130064140 | NODE INTERFACE INDICATORS - Techniques described herein provide for sending data packets from source to destination nodes. Indicators, such as counters, may determine the configuration of node interfaces. The data packets may be sent based on a comparison of current and stored indicators. | 03-14-2013 |
20130070644 | DISCOVERING NETWORK INFORMATION AVAILABLE VIA WIRELESS NETWORKS - Network information may be discoverable without requiring a connection to that network. For example, Access Network Query Protocol (“ANQP”) may allow a device to discover information about a network prior to the device associating with that network. In other words, ANQP allows a network terminal to request additional network information prior to establishing network capability. The additional network information that may be discoverable includes network latency, cellular capabilities, hotspot capabilities, mobility capabilities, neighbor reports, station identification, and multiple hotspot session identification. | 03-21-2013 |
20130070645 | ADDRESS TABLE FLUSHING IN DISTRIBUTED SWITCHING SYSTEMS - Methods and systems for improved address table flushing in distributed switching systems may be provided. In accordance with embodiments of the disclosure, a switch may include a plurality of line cards and a processor. Each line card may including a table of addresses. The processor may be configured to, in response to receipt of a plurality of simultaneous requests, each request a request to flush addresses associated with a particular flooding domain present on the switch, perform flushing of addresses based on an aggregate number of address entries for each particular flooding domain associated with the requests. | 03-21-2013 |
20130070646 | LONG RANGE, LOW POWER, MESH NETWORKING WITHOUT CONCURRENT TIMING - A first sensor node | 03-21-2013 |
20130070647 | METHOD OF PSEUDO-DYNAMIC ROUTING IN A CLUSTER COMPRISING STATIC COMMUNICATION LINKS AND COMPUTER PROGRAM IMPLEMENTING THAT METHOD - The invention relates to the pseudo-dynamic routing in a cluster comprising nodes, of the static communication links connecting these nodes. The routing is based on load levels associated with the links After having received ( | 03-21-2013 |
20130077528 | Route Topology Discovery in Data Networks - A system and method for performing topology discovery in a data network is provided. Network elements utilizing a distance-vector protocol, such as EIGRP, advertises routes and metric information. A resource control point or other element analyzes the advertised routes and metrics and determines the nexthop, thereby providing a topology map of the network. | 03-28-2013 |
20130077529 | AUTOMATED DEVICE DISCOVERY ON A NETWORK - A system and method provide automated discovery of devices on a network. The system may include specialized communications between devices for monitoring and tracking the devices. In particular, devices may transmit and/or receive messages over the network that includes information for discovering, identifying, and/or managing each of the devices on the network. | 03-28-2013 |
20130077530 | Scaling IPv6 on Multiple Devices Virtual Switching System with Port or Device Level Aggregation - Systems and methods are provided to support a large number of hosts while keeping the size of the FIB CAM low. Higher scalability may be achieved by consuming less FIB CAM space as hosts are added to a network. An L3 switching module may be provided capable of supporting a large number of virtual machines and/or hosts while maintaining a small FIB CAM size on a multiple device virtual switching system with port or device level aggregation. | 03-28-2013 |
20130077531 | Communication Method Between a Device and Another Device - The present invention relates to a method for communicating with another device through a first device having a Converged Personal network Service (CPNS) enabled entity. The communication method includes receiving a search request message including information regarding the mode of a second device when the CPNS enabled entity of the first device, set in the gateway mode, moves into the coverage area of a second network managed by the second device. The communication method includes: when it is confirmed that the CPNS enable entity of the second device is set with a gateway on the basis of the mode information, confirming whether there is at least one available PNE in all coverage areas of the first network and the second network; and determining whether to change the mode of the CPNS enable entity of the first device on the basis of whether there is at least one available PNE, as well as whether to change the mode of the second device. Here, according to the result of the determination, the mode of the CPNS enabled entity of the first device may be changed to a combined mode in the gateway mode. | 03-28-2013 |
20130077532 | Method for Communicating With Other Devices, and Communication Device - One embodiment of the present invention relates to a method for communicating with other devices, performed by a communication device comprising a converged personal network service (CPNS) enabled entity. The communication method comprises a step in which the CPNS enabled entity operates in a personal network entity (PNE) mode to establish a connection to a first device, wherein the first device is established as a gateway and thus manages a first network. The communication method further comprises a step of activating a bridge function in cases where the communication device has moved into the coverage of a second network managed by a second device. | 03-28-2013 |
20130077533 | METHOD FOR COMMUNICATING WITH OTHER DEVICES, AND COMMUNICATION DEVICE - One embodiment relates to a method performed by a converged personal network service (CPNS) enabled entity. The communication method comprises a step in which the CPNS enabled entity transmits a request message for instructing performance of a discovery procedure to a first PNE which belongs to a first network if a second PNE which belongs to a second network is not found in the coverage of the first network at the state where the CPNS enabled entity is established as a gateway for managing the first network; a step in which the CPNS enabled entity receives, from the first PNE, a response message; and a step of transmitting, based on the response message, a bridge request message for requesting that the second PNE operates as a bridge for interconnecting the first network and the second network, to a second gateway which manages the second network. | 03-28-2013 |
20130083699 | METHODS AND APPARATUS FOR DISTRIBUTED MEDIUM ACCESS IN WIRELESS PEER-TO-PEER NETWORKS - An apparatus, a method of the apparatus, and a computer program in the apparatus are provided in which the apparatus determines a group to which each of a plurality of wireless devices is associated based on signals received from the plurality of wireless devices. The apparatus selects a group for access to a wireless medium from a plurality of groups based on the group determined for each of the plurality of wireless devices and based on reducing interference with the plurality of wireless devices. Each of the plurality of groups has a different priority. The apparatus communicates using peer-to-peer communication on the wireless medium with a priority based on the selected group. | 04-04-2013 |
20130083700 | METHODS AND APPARATUS FOR CENTRALIZED MANAGEMENT OF ACCESS AND AGGREGATION NETWORK INFRASTRUCTURE - In some embodiments, an apparatus comprises a core network node configured to be operatively coupled to a set of network nodes. The core network node is configured to define configuration information for a network node from the set of network nodes based on a template, where the configuration information excludes virtual local area network (VLAN) information or IP subnet information. The core network node is further configured to send the configuration information to the network node. | 04-04-2013 |
20130083701 | Flexible Radix Switch - A system and method for interconnecting nodes and routing data packets in high radix networks includes constructing or redefining a network structure to provide improved performance. Computation and data storage nodes are connected to a network of switching nodes that provide near optimum bandwidth and latency for networks of any size. Specialized interconnection patterns and addressing methods ensure reliable data delivery in very large networks with high data traffic volume. | 04-04-2013 |
20130089001 | ASSOCIATING WI-FI STATIONS WITH AN ACCESS POINT IN A MULTI-ACCESS POINT INFRASTRUCTURE NETWORK - A wireless network client may be configured to use push button configuration (PBC) techniques to associate with wireless networks that include multiple access points. When the configuration buttons on a smart network host device, such as a wireless network host device, and an enrolling client device are pressed, one of the access points is selected to perform the push button configuration process with the client device. The selected access point then enters a PBC mode, allowing the client and selected access point to perform the authentication and configuration exchange. | 04-11-2013 |
20130089002 | UCDS: Unifying Connected Dominating Set Using Localized Two Hop Information with a Flexible Dominating Factor - The present disclosure is directed to a method for forming a connected dominating set (CDS) for a graph. The method may include directing each node of the graph to broadcast a dominating factor and neighboring node information; identifying a dominating set based on the dominating factor of each node in comparison with dominating factors of neighboring nodes according to a dominating set rule definition; identifying a connecting set for connecting nodes according to a connecting set rule definition; and forming the CDS as a union of the dominating set and the connecting set. | 04-11-2013 |
20130089003 | METHOD FOR TWO-STAGE PACKET AGGREGATION FACING WIRELESS SENSOR NETWORK OF HYBRID TOPOLOGY STRUCTURE - A method for two-stage packet aggregation facing wireless sensor network with hybrid topology structure including: building various nodes in a wireless sensor network into a hybrid topology structure which combines the star topology and mesh topology; establishing a two-stage packet aggregation architecture for periodic sensor data based on the above described topology structure; determining the packet format, aggregating and disaggregating the two-stage packets based on the topology structure and aggregation architecture; according to the application, the aggregated nodes in the network configuring router nodes and aggregation attributes of the nodes; according to the aggregation attribute, the sensor nodes performing the first-stage aggregation and generates an first-stage aggregation packet; according to the aggregation attributes, the router node implementing second-stage aggregation and generating a second-stage aggregation packet; the aggregation nodes taking charge of disaggregating the aggregated packets. Embodiments of the invention adopt the above described hybrid topology structure, feature a two-stage packet aggregation method, decrease the overhead of packet-head, reduce the energy consumption of the nodes and inter-node interference, and save communication resources. | 04-11-2013 |
20130089004 | CONTROL SYSTEM - The present invention relates to a system for controlling a group of devices, comprising: —a network of nodes interconnected in a topology to form a meshed network, and —a coordinator making it possible to communicate with the nodes in the network, in which each device is connected to a node in the network, in which each node comprises: —a receiver making it possible to receive an instruction, —an instructor making it possible to transfer an instruction to the device connected to the node, and —a transmitter making it possible to transmit the instruction to a neighbouring node. | 04-11-2013 |
20130089005 | Simple Topology Transparent Zoning in Network Communications - An autonomous system (AS) comprising a topology transparent zone (TTZ) comprising a plurality of TTZ nodes, wherein the plurality of TTZ nodes includes an edge node and an internal node, wherein each of the plurality of TTZ nodes is configured to connect to another TTZ node via an internal link, and a plurality of neighboring external nodes connected to the TTZ edge nodes via a plurality of external links, wherein no link state advertisements (LSAs) describing the internal links are distributed to the neighboring external nodes. | 04-11-2013 |
20130094402 | Centralized Access Control System and Methods for Distributed Broadband Access Points - A method includes automatically sending a request from a wireless access point to a configuration server during a power-up procedure for the wireless access point. The method includes receiving virtual private network tunnel parameters at the wireless access point from the configuration server in response to the request. The virtual private network tunnel parameters identify an access gateway. The method also includes establishing a virtual private network tunnel between the wireless access point and the centralized access gateway during the power-up procedure based on the virtual private network tunnel parameters. The virtual private network tunnel enables the wireless access point to provide one or more wireless devices access to a wide area network. | 04-18-2013 |
20130094403 | METHOD AND APPARATUS FOR PROVIDING SENSOR NETWORK INFORMATION - An apparatus for providing sensor network information receives sensing information containing sensing values obtained by sensor resources from sensor network middleware, converts the sensing information into an RDF (resource description framework) form, and stores and manages it in an RDF storage. The apparatus searches for information corresponding to a query from an application service, from among the information stored in the RDF storage, and provides it to the application service. | 04-18-2013 |
20130100858 | DISTRIBUTED SWITCH SYSTEMS IN A TRILL NETWORK - Featured are a system and method for providing a distributed switch system (DSS) in a TRILL-compliant network. An ingress network device in the TRILL-compliant network provides data to a received packet. The data includes instructions related to a feature of the DSS. The instructions are inserted into a TRILL header generated at the ingress network device. The TRILL header is output to an egress network device in the TRILL-compliant network. A determination is made whether the ingress network device and the egress network device are members of the DSS. The instructions are processed by the egress network device in response to determining that ingress and egress devices are members of the DSS. | 04-25-2013 |
20130107754 | METHOD FOR CONFIGURING A DELAY/DISRUPTION-TOLERANT NETWORK NODE AND CONFIGURABLE NODE OPERABLE IN A DELAY/DISRUPTION-TOLERANT NETWORK | 05-02-2013 |
20130107755 | DYNAMIC HARDWARE ADDRESS ASSIGNMENT TO NETWORK DEVICES IN A SWITCH MESH | 05-02-2013 |
20130107756 | Method of Generating Access Point Scanning Order | 05-02-2013 |
20130107757 | SYSTEMS AND METHODS FOR FAST INITIAL NETWORK LINK SETUP | 05-02-2013 |
20130114466 | NETWORK VIRTUALIZATION APPARATUS AND METHOD WITH SCHEDULING CAPABILITIES - Some embodiments provide a controller for managing several managed switching elements that forward data in a network. The controller includes an interface for receiving input logical control plane data in terms of input events data. The controller includes an input scheduler for (1) categorizing the input events data into different groups based on certain criteria and (2) scheduling supplying of the input event data into a converter based on the groups so that the converter processes a group of input events data together. The controller includes the converter for converting the input logical control plane data to output logical forwarding plane data. The controller includes a network information base (NIB) data structure module for storing the output logical forwarding plane data. The logical forwarding plane data is for subsequent translation into physical control plane data. | 05-09-2013 |
20130121209 | WAN OPTIMIZER FOR LOGICAL NETWORKS - Some embodiments provide a non-transitory machine readable medium of a controller of a network control system for configuring a wide area network (WAN) optimizer instance to implement a WAN optimizer for a logical network. The controller receives a configuration for the WAN optimizer to optimize network data from the logical network for transmission to another WAN optimizer. The controller identifies several other controllers in the network control system on which to implement the logical network. The controller distributes the configuration for implementation on the WAN optimizer. | 05-16-2013 |
20130121210 | SECURITY SYSTEM AND METHOD FOR WIRELESS COMMUNICATION WITHIN A VEHICLE - A method for reprogramming a node of an electronic communication system includes transmitting a signal from a first node to a second node. The signal requests that the second node be reprogrammed. The signal includes an identification of the first node. The second node is used to broadcast the identification of the first node to other nodes in the communication system. The second node is reprogrammed only if a predetermined quantity of the other nodes confirm, based on the identification, that the first node is legitimate. | 05-16-2013 |
20130121211 | FLOODING-BASED ROUTING PROTOCOL HAVING DATABASE PRUNING AND RATE-CONTROLLED STATE REFRESH - An enhanced, flooding-based link state routing protocol is described that provides pruning of link state data and, when needed, rate-controlled refresh of the pruned link state data from other routers of the flooding domain. A routing device comprises a network interface to send and receive packets over a layer-two (L2) communication medium. The routing device includes a control unit coupled to the network interface, and a flooding-based link state routing protocol executing on a processor of the control unit. The link-state routing protocol establishes an adjacency with a peer router. A database of the routing device includes entries that store a plurality of link state messages for a flooding domain of the link state routing protocol, wherein at least one of the entries in the database stores a partial link state message having a header portion and a payload having pruned link state data. | 05-16-2013 |
20130136033 | ONE-CLICK CONNECT/DISCONNECT FEATURE FOR WIRELESS DEVICES FORMING A MESH NETWORK - According to one embodiment of the invention, a system, electronic device and method are described for creating, connecting or disconnecting from a mesh network. The method comprises a first operation of detecting a duration of time (or number of press) that a mesh networking button of a wireless device has been actuated. Thereafter, in response to actuation of the mesh networking button up to a first predetermined duration (or presses), a first mesh network is created without additional input of information by a user. Optionally, in response to actuation of the mesh networking button for at least a second predetermined duration, where the second predetermined duration being longer (or different number of presses) in time than the first predetermined duration (or button presses), the electronic device issues a request to join a second mesh network detecting previously by the electronic device. | 05-30-2013 |
20130136034 | NETWORK DESIGN DEVICE - According to the information about a request bandwidth of a path newly requested between a starting site and an ending site of the requested path and the information about the type of a device candidate which may be provided at each site and the number of ports of each device, an objective function indicating a device cost and a constraint to be considered when the objective function is minimized are set. According to the arithmetic performance of a solver for executing the design, a problem scale corresponding to one path accommodation designing operation is set. Based on the set problem scale, a mathematical programming problem for minimizing the objective function is generated. An accommodation designing process is repeated on a plurality of paths until a solution to the mathematical programming problem is obtained by the solver, and all requested paths are completely designed. | 05-30-2013 |
20130136035 | METHODS AND SYSTEMS FOR PROVIDING MULTIPLE ACCESS WITHIN A NETWORK - Methods and systems for media access control allow master and slave nodes of a network to communicate using the same carrier while avoiding collisions of transmissions. At least one slave node is an implantable device. Master nodes initiate all data exchange sequences, and slave nodes are responsive to the data exchange sequences. The exchange sequences begin by master nodes contending for use of the carrier through a countdown procedure. A set order of communications occurs between a master node who won the contention and a slave node being communicated with by the master node to transfer a data frame. Contention is then repeated to determine the next master node that is allowed to transfer a data frame. New master nodes entering the network employ a discovery process to poll for existing devices in the network. | 05-30-2013 |
20130142078 | SYSTEMS AND METHOD FOR GRAPH-BASED DISTRIBUTED PARAMETER COORDINATION IN A COMMUNICATION NETWORK - Systems and method are disclosed for graph-based distributed parameter coordination in a communication network. In general, discrete local parameters to be coordinated among communication nodes in the network and their respective performance metrics, or costs, are modeled using a factor graph. Based on the factor graph, a variant of the sum-product algorithm, namely the min-sum algorithm, is applied in order for the communication nodes, through iterative message passing with their neighboring communication nodes, to decide upon optimal values for the local parameters for the communication nodes that collectively optimize a global performance metric across the communication network. In one embodiment, the communication network is a wireless communication network. In one specific embodiment, the wireless communication network is a cellular communication network. | 06-06-2013 |
20130142079 | Distributed Dynamic Virtual Machine Configuration Service - An approach is provided in which a local module receives a discovery message from a virtual network endpoint that is devoid of a corresponding virtual IP address. The local module sends one or more unicast network configuration messages to a dynamic configuration service and, in turn, the local module receives one or more unicast network configuration responses from the dynamic configuration service. One of the unicast network configuration responses includes one or more network configuration parameters. The local module configures the virtual network endpoint according to one or more of the network configuration parameters. | 06-06-2013 |
20130142080 | METHOD AND SYSTEM FOR ESTABLISHING DISPARATE CONNECTION PATHS FROM A MOBILE USER DEVICE TO A BASE STATION THROUGH A MOBILE PEER-TO-PEER (PTP) NETWORK - A system and method for establishing and/or maintaining disparate connection paths from an originating mobile user device to a base station via a mobile peer-to-peer (PTP) network including an originating mobile user device configured to broadcast at least one of a path establishment request signal and a confirmation request signal to an intermediate mobile user device; a mobile peer-to-peer network including the intermediate mobile user device configured to forwarding at least one of the path establishment request signal, the path establishment response signal, the path confirmation request signal, and a path confirmation response signal, via a disparate connection path; and a base station configured to broadcasting at least one of the path establishment response signal and the path confirmation response signal to the originating mobile user device via one or more disparate connection paths within the mobile peer-to-peer network. | 06-06-2013 |
20130142081 | System and Method for Multicast Transmission - A system and method for multicast transmission are disclosed. In one embodiment, a virtual exchange network including interconnected nodes is embedded within a network. A sender is disposed in communication with a root node and receivers are disposed in communication with a set of edge nodes. The sender publishes a packetized data stream to which the receivers subscribe. The packetized data stream is promulgated by implicit signaling through optimum virtual exchange network connections from the sender through the virtual exchange network to the receivers. The interconnected nodes, responsive to receiving the published packetized data stream, are adapted to multicast N instances of the published packetized data stream to N recipients selected from the group consisting of receivers and other of the interconnected nodes. | 06-06-2013 |
20130142082 | GRAPH-BASED DISTRIBUTED COORDINATION METHODS FOR WIRELESS COMMUNICATION NETWORKS - Systems and methods are disclosed for graph-based distributed parameter coordination in a communication network. In general, discrete local parameters to be coordinated among communication nodes in the communication network and their respective performance metrics, or costs, are modeled using a factor graph. Based on the factor graph, a variant of the sum-product algorithm, namely the min-sum algorithm, is applied in order for the communication nodes, through iterative message passing with their neighboring communication nodes, to decide upon optimal values for the local parameters for the communication nodes that collectively optimize a global performance metric across the communication network. In one embodiment, the communication network is a wireless communication network. In one specific embodiment, the wireless communication network is a cellular communication network. | 06-06-2013 |
20130142083 | TECHNIQUE FOR CHANGING THE OPERATING STATE OF A NODE WITHIN A NETWORK - A node residing within a wireless mesh network is configured to transmit a state transition message to a downstream node also residing within the wireless mesh network. The state transition message indicates a new operating state for the downstream node. Upon receipt of the state transition message, the downstream node may transition to the new operating state and then transmit an acknowledgement message back to the node that sent the state transition message. Alternatively, the downstream node may transmit the acknowledgement message back to the node that sent the state transition message first, and then transition to the new operating state. | 06-06-2013 |
20130148545 | METHOD AND APPARATUS FOR MANAGING DEVICE DISCOVERY IN WIRELESS SYSTEM - A method and apparatus for managing device discovery in a wireless system are provided. The method includes performing a periodic search operation to discover a peer device, stopping the periodic search operation upon discovering a suitable peer device, and switching to a periodic listening operation for allowing the Wireless Fidelity (WiFi) Peer-To-Peer (P2P) device to be discovered by the discovered peer device and for permitting a connection with the discovered peer device. | 06-13-2013 |
20130148546 | SUPPORT FOR CONVERGED TRAFFIC OVER ETHERNET LINK AGGREGATION (LAG) - In one embodiment, a system includes a switching processor configured to execute logic, a plurality of ports, at least some of the ports being grouped together in one or more link aggregations (LAGs), logic adapted to create at least a first virtual local area network (VLAN) interface for Ethernet traffic using transmission control protocol/internet protocol (TCP/IP) that is received on at least one of the plurality of ports, and logic adapted to create at least a second VLAN for storage area network (SAN) traffic using Fiber Channel over Ethernet (FCoE) and/or remote direct access memory (RDMA) over Converged Enhanced Ethernet (RoCEE) that is received on at least one of the plurality of ports, wherein no SAN traffic using FCoE and/or RoCEE is assigned to the first VLAN, and wherein no Ethernet traffic using TCP/IP is assigned to the second VLAN. | 06-13-2013 |
20130148547 | METHOD AND SYSTEM FOR COLLECTING TOPOLOGY INFORMATION - A method of providing topology information about a network to a topology manager is disclosed. The network includes a plurality of sensors each having a sensor ID, and the method includes performing the following steps at each of the plurality of sensors: receiving a stream of packets and identifying a topology trace packet in the stream of packets, wherein the topology trace packet has a destination address and an ID of a previous sensor, including the sensor ID in the topology trace packet, sending the topology trace packet to the destination address, forming a report message so as to include the sensor ID, the previous sensor ID, sending the report to the topology manager; and, providing network addresses of adjacent nodes to the topology manager. | 06-13-2013 |
20130155902 | SYSTEM AND METHOD FOR NON-DISRUPTIVE MANAGEMENT OF SERVERS IN A NETWORK ENVIRONMENT - An example method includes disengaging a target node from a cluster, where the disengaging comprises: selecting an inheritor; migrating flows from the target node to the inheritor; informing a migration manager that the target node is disengaged from the cluster; and broadcasting to peer nodes of the target node that the target node is replaced by the inheritor. In particular implementations of the present disclosure, the cluster can include a first layer of a network topology including a forwarding engine that implements hash-based packet forwarding; a second layer of the network topology comprising the target node and the inheritor, where the target node and the inheritor implement flow-based packet forwarding; and a third layer including service nodes configured for packet processing in a network. | 06-20-2013 |
20130155903 | System and Method of Radio Bearer Management for Multiple Point Transmission - A method for operating a multiple point transmission system is disclosed. The method includes reconfiguring the multiple point transmission system according to an updated configuration of an at least one radio bearer between an at least one transmission point and a terminal device, and communicating with the terminal device using the reconfigured multiple point transmission system. The configuration of the at least one radio bearer is updated according to operating condition information of the terminal device. | 06-20-2013 |
20130155904 | METHODS AND APPARATUS FOR EVENT DETECTION, PROPAGATION AND LOCALIZATION USING UWB IMPULSE RADIOS - A distributed wireless sensor network includes two or more wireless nodes adapted for sensing a condition at any first node, first programming located within each node for transmitting a signal representing the sensed condition from the first node to another node, second programming located within each node for receiving the signal transmitted from any other node and for retransmitting a received signal representing the sensed condition along with additional data indicating the number of retransmissions of the signal between nodes. | 06-20-2013 |
20130155905 | SYSTEMS AND METHODS FOR TRANSMITTING AND RECEIVING DISCOVERY AND PAGING MESSAGES - Methods, devices, and computer program products for transmitting and receiving discovery and paging messages are described herein. In one aspect, an apparatus operable in a wireless communication system includes a receiver and transmitter. The receiver receives a registration packet from a first device. The registration packet indicates interest in a service provided by another device in a wireless communications network. The receiver further receives a discovery packet from a second device during a first discovery interval of a plurality of discovery intervals. The discovery packet advertises a service provided by the second device, and the plurality of discovery intervals include recurring time intervals when a plurality of devices are configured to transmit and receive discovery packets in the wireless communications network. The transmitter transmits a notification packet configured to enable the first device and the second device to communicate directly. | 06-20-2013 |
20130155906 | SCALING ADDRESS RESOLUTION FOR MASSIVE DATA CENTERS - There is provided a network device disposed at an interface between an access segment and an interconnecting layer of a data center. The network device includes an address resolution processor configured to receive an address request addressed to virtual machines in a transmission domain of the network device. The address request specifying a source layer 2 address, requesting a layer 2 address of a target virtual machine in the data center, and specifying a layer 3 address of the target virtual machine. The network device is further configured to transmit a local message over the first access segment requesting the respective layer 2 address of a virtual machine which has the specified layer 3 address. In response to receiving a reply, the network device transmits a message to the specified source layer 2 address to provide the layer 2 address of the network device and the specified layer 3 address. | 06-20-2013 |
20130155907 | COMBINED OMNI- AND DIRECTIONAL- COMMUNICATIONS IN HIGH-FREQUENCY WIRELESS NETWORKS - In a wireless communication network, specific portions of the communication may combine directional transmission with omnidirectional reception. In particular, sector-level directional transmission may be established through sector sweeps, followed by antenna training for more directionality. In some embodiments, collisions during the exchange may be reduced by having different network devices use different sub-channels or different time slots. In some embodiments, each network may restrict its network communications to a single sub-channel that is different than the sub-channels used by adjacent networks. | 06-20-2013 |
20130163470 | TRAFFIC OPTIMIZATION OVER NETWORK LINK - In one embodiment, a method includes receiving a TCP (Transmission Control Protocol) packet at a service device configured to optimize traffic over a network link, inserting a discovery identifier in the TCP packet, encapsulating the TCP packet in a UDP (User Datagram Protocol) packet, and transmitting the UDP packet over the network link. An apparatus is also disclosed. | 06-27-2013 |
20130163471 | METHODS FOR DISCOVERING AND ANALYZING NETWORK TOPOLOGIES AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus for discovering and analyzing a network topology includes obtaining information regarding a network including a relationship of a plurality of nodes of the network. At least one value for each of a plurality of centrality parameters is determined for each of the plurality of nodes. At least one topology score for each of the plurality of nodes is generated based on one or more of the centrality parameter values. One or more relatively significant nodes are identified based on one or more of the topology scores and output. | 06-27-2013 |
20130163472 | AUTO-CONFIGURING MULTI-LAYER NETWORK - An auto-configuring multi-layer network including different communication protocols, namely both wired and wireless protocols, interchangeably and indifferently to interconnect various devices such as, for example, controllers, actuators, alarms, sensors, interfaces, etc. The auto-configuring multi-layer network uses a virtualization functionality that mirrors devices from one layer having a given communication protocol unto another layer having a different communication protocol. | 06-27-2013 |
20130163473 | IP ROUTER AND METHOD OF ALLOCATING IP ADDRESS - An Internet Protocol (IP) router and a method of allocating an IP address are provided. The IP router includes: an IP management unit which, if the IP router is connected to a second router connected to a second WAN, is allocated a preset number of IP addresses from the second router; and a Dynamic Host Configuration Protocol (DHCP) server unit which allocates the allocated IP addresses to at least one communication device connected to the IP router to form a sub network between the at least one communication device connected to the IP router and a communication device connected to the second router. | 06-27-2013 |
20130170398 | System and Method for Device Discovery for Device-to-Device Communication in a Cellular Network - An embodiment of a system enables a user equipment to employ a buddy list to initiate a D2D discovery process. The user equipment constructs a buddy list including other user equipments with which the user equipment would desire to communicate employing a D2D communication link. The user equipment transmits the buddy list to a serving base station. The user equipment transmits a request to the serving base station that it desires to communicate over a D2D communication link with a second user equipment that is on the buddy list. The user equipment receives D2D link setup information from the serving base station for the communication link with the second user equipment. The user equipment transmits a beacon signal employing the D2D link setup information. | 07-04-2013 |
20130170399 | CONTROLLER IN BIDIRECTIONAL ADHOC NETWORK RADIO COMMUNICATION - The invention describes a controller for data processing in bidirectional adhoc-network radio communication with a computation unit for data processing and ports for data input and data output. The computation unit is set up to process the data according to the ITS standard, wherein the data processing is limited to processing steps of the ITS Facility layer, which performs content-oriented evaluation and/or conditioning of the data which are received or need to be sent by means of the bidirectional adhoc-network radio communication, and a first wideband communication port is provided at least for receiving the data from an ITS communication unit for the purpose of bidirectional adhoc-network radio communication. | 07-04-2013 |
20130170400 | Dynamic Hierarchical Address Resource Management Architecture, Method and Apparatus - A Dynamic Hierarchical Address Resource Management Architecture (DHARMA) coordinates a logical hierarchy of address spaces with a virtual topology of network elements using a manageable database environment. Address spaces are apportioned into hierarchical levels in accordance with a network policy. Network elements may be represented as objects, coupled via the logical address space. Both address space hierarchy definition and virtual topology modelling may occur independent from actual network deployment. As a result, multiple address space hierarchy definitions and virtual topologies can be pre-generated and stored for selective use during network deployment. With such an arrangement, a flexible addressing architecture is provided which may advantageously be used in any network that desires dynamic network configuration. The connection between the logical address hierarchy and the virtual network topology may advantageously be implemented through the use of a logical tag that links a virtual network element to a logical address hierarchy level. | 07-04-2013 |
20130176900 | Discovery in MoCA Networks - Methods, apparatuses, systems, and computer program products that may be based on MoCA protocols for discovering MoCA devices in a MoCA network include causing a first MoCA device to periodically send the device specific information to a second MoCA device in the MoCA network. The information may be sent, for example in a link-layer discovery protocol (LLDP) message in which the information is encoded in a type-length value (TLV) message. The information may include a MAC address of the first MoCA device, an IP address of the first MoCA device, vendor identification information, hardware identification information, hardware version information, software identification information, a software version, a name of the first MoCA device, a location of the first MoCA device, a MoCA node assigned to the first MoCA device, or the like. | 07-11-2013 |
20130176901 | DEVICE AND METHOD FOR COMMUNICATION OF MANAGEMENT INFORMATION IN AD-HOC WIRELESS NETWORKS - A method includes detecting, by a first device, a beacon sent from a second device. The beacon is associated with an ad-hoc wireless network. In response to detecting the beacon, the first device sends to the second device a request for management information associated with the ad-hoc wireless network. The request identifies at least a first information element associated with at least a first portion of the management information and a second information element associated with at least a second portion of the management information. The method further includes receiving from the second device a first wrapper information element that includes at least the first information element. | 07-11-2013 |
20130176902 | SYSTEM AND METHOD OF COMMUNICATION USING DISTRIBUTED CHANNEL ACCESS PARAMETERS - A device includes a processor and a memory accessible by the processor. The memory includes access category data specifying one or more access categories. The one or more access categories include a sensor access category specifying distributed channel access parameters to be used by one or more station devices to wirelessly communicate sensor data via a network. The memory further includes instructions executable by the processor to send at least a portion of the access category data to a station device to enable the station device to communicate sensor data. | 07-11-2013 |
20130176903 | Methods and Apparatus for Establishing a Tunneled Direct Link Setup (TDLS) Session Between Devices in a Wireless Network - The present disclosure describes techniques for establishing and reestablishing tunneled direct link setup (TDLS) sessions. In some aspects a TDLS persistent capable bit is stored at a computing device to indicate whether the computing device is capable of storing persistent group[ information associated with TDLS sessions. Persistent group information is also stored at the computing device to assist the computing device in reestablishing TDLS sessions and directing reestablishment of TDLS sessions. | 07-11-2013 |
20130176904 | Providing Full Point-To-Point Communications Among Compute Nodes Of An Operational Group In A Global Combining Network Of A Parallel Computer - Methods, apparatus, and products are disclosed for providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: receiving a network packet in a compute node, the network packet specifying a destination compute node; selecting, in dependence upon the destination compute node, at least one of the links for the compute node along which to forward the network packet toward the destination compute node; and forwarding the network packet along the selected link to the adjacent compute node connected to the compute node through the selected link. | 07-11-2013 |
20130176905 | NODE ARBITRATED MEDIA ACCESS CONTROL PROTOCOL FOR AD HOC BROADCAST NETWORKS CARRYING EPHEMERAL INFORMATION - Techniques for organizing nodes of an ad hoc broadcast network into sets and employing the sets to arbitrate access by the nodes to a shared communications medium. Each node has a copy of a signal library and the node indicates its membership in the set by associating itself with a signal in the library. In one application, the signals are ranked, the set is a queue, and the node's position in the queue is indicated by the rank of the signal associated with the node. Each node has rules for selecting the next signal. The hidden terminal problem is solved by having each node broadcast its tone and all of the other tones it has heard. The techniques are particularly useful for the broadcast of ephemeral information by the nodes. | 07-11-2013 |
20130182609 | TECHNIQUE FOR IMPROVING LDP-IGP SYNCHRONIZATION - A technique may improve LDP-IGP synchronization in a MPLS network when an interface of a router coupled to a communications link along a shortest path between a source router and a destination router becomes newly active. Specifically, an IGP adjacency may be held down over the newly active link while a LDP adjacency is established over the link. The router may inject a temporary, non-redistributable route having a large administrative weight into its routing table utilizing addresses learned during establishment of the LDP adjacency. The injected route ensures that there is a reachable route to a peer router so that LDP may converge. After LDP has converged and all needed label bindings have been distributed in the MPLS network utilizing the injected route, IGP executing on the router may advertise a normal cost metric for the link associated with the newly active interface, and IGP convergence may be completed. | 07-18-2013 |
20130182610 | FAIRNESS PROVISION VIA CONTROLLING A TRANSMISSION OPPORTUNITY WINDOW IN A WIRELESS MESH NETWORK - The invention allows fairness provision in wireless mesh networks with respect to the data rate that stations communicate. A fairness metric is obtained during a mesh profile negotiation performed in order for a wireless station to join a wireless mesh network. Predetermined mesh transmission parameters of the wireless station are sent to previously joined wireless stations in a predetermined neighborhood of the wireless station. From the previously joined wireless stations their respective predetermined mesh transmission parameters are received. In response to a first predetermined event, a transmission opportunity window is determined for the wireless station based on the obtained fairness metric, the predetermined mesh transmission parameters of the wireless station, and the predetermined mesh transmission parameters of the previously joined wireless stations. | 07-18-2013 |
20130182611 | COORDINATION OF DISCOVERY RESPONSES - Disclosed are various methods and apparatus usable in, for example, an IEEE 802.11 type of wireless network. An exemplary method includes transmitting a probe request frame from a station; receiving a probe response frame from an access point; and examining the received probe response frame to determine whether an order in which probe response frames are received from the access point and from other access points has been coordinated and that the station is recommended to attempt to authenticate and associate to the access points according to the order in which the probe response frames are received. Related embodiments of access points and a discovery management entity are also disclosed. | 07-18-2013 |
20130182612 | Method for Efficiently Retrieving Topology-Specific Data for Point-to-Point Networks - Network topology codes are computed and used as keys to retrieve topology-specific information for isomorphic networks. | 07-18-2013 |
20130182613 | COMMUNICATION APPARATUS, COMMUNICATION METHOD THEREFOR, AND PROGRAM - A communication apparatus searches for another network after a network is created, participates in another network in accordance with a role, in communication parameter setting processing, of a communication apparatus existing in another network, and executes the communication parameter setting processing. After the communication apparatus decides to receive the communication parameters from another communication apparatus, the communication apparatus determines an activation state of a providing function of a provider apparatus of the communication parameters, and requests the provider apparatus to provide the communication parameters in accordance with the determination. | 07-18-2013 |
20130182614 | PEER-TO-PEER COMMUNICATION IN AD HOC WIRELESS NETWORK - For a peer-to-peer call in an ad hoc wireless network, a wireless device performs discovery of a target wireless device, performs authentication of the target wireless device and generates a session key (e.g., using a pre-shared key or a certificate provisioned on the wireless device), forms an ad hoc wireless network with the target wireless device, and communicates peer-to-peer with the target wireless device via the ad hoc wireless network. The wireless device may perform discovery with a list of identifiers for wireless devices designated to communicate with this wireless device. The wireless device may derive a service set identifier (SSID) used to identify the ad hoc wireless network based on its user-specific identifier (e.g., its phone number) and/or a user-specific identifier for the target wireless device. The wireless device may also performs IP address discovery using the user-specific identifier for the target wireless device. | 07-18-2013 |
20130182615 | ENERGY-SAVING MANAGEMENT METHOD AND SYSTEM FOR WIRELESS SENSOR NETWORK, AND REMOTE MANAGEMENT SERVER - The disclosure provides an energy-saving management method and system for a wireless sensor network, and a remote management server. In the method, the wireless sensor network sends remaining energy information of a node, and/or network topology information, and/or node hibernation information to a remote management server through a gateway device; the remote management server stores the information, makes an energy-saving decision according to the information, and sends the energy-saving decision to the wireless sensor network through the gateway device; and the wireless sensor network makes a response according to the energy-saving decision. Through the solutions, the remote management server provides the wireless sensor network with an energy-saving strategy so as to reduce the processing amount of the wireless sensor network caused by network topology management, thereby reducing the power consumption, prolonging the lifetime, and implementing the remote energy-saving management of the wireless sensor network. | 07-18-2013 |
20130188520 | DEVICE TOPOLOGY AND CAPABILITY DISCOVERY AND REPORTING TECHNIQUES - Techniques for the discovery of a topology of varying complexity and discovery of the capability of the devices of the topology include querying a plurality of node devices for node data. At least an initial portion of node data of one or more node devices is received in response to the query. In addition, previously determined node data is retrieved from a cache. The initial portion of node data is correlated to the previously determined node data to deduce node data for one or more node devices within a predetermined period of time. It is to be appreciated that the deduced node data may include node data beyond the initial portion of node data and/or node data for other node devices beyond the initially responding node devices. The deduced node data may then be reported to an operating system. | 07-25-2013 |
20130188521 | MANAGING A LARGE NETWORK USING A SINGLE POINT OF CONFIGURATION - One embodiment of the present invention provides a computing system. The switch includes a discovery module, a device management module, and a logical group management module. The discovery module constructs a multicast query message for a first multicast group to which the computing system is registered. The device management module extracts information about a remote switch from a query response message from the remote switch and constructs a client database, wherein a first entry in the client database contains the information extracted from the query response message. The logical group management module associates the remote switch with a second multicast group. | 07-25-2013 |
20130188522 | HIGH THROUGHPUT FEATURES IN 11S MESH NETWORKS - The addition of high throughput capability elements to beacon frames and peer link action frames in wireless mesh networks enable the utilization of desirable features without further modifications to the network. Rules can be established for high throughput mesh point protection in a mesh network, Space-time Block Code (STBC) operations and 20/40 MHz operation selections. However, features such as PSMP (power save multi-poll) and PCO (phased coexistence operations) are barred from implementation to prevent collisions. | 07-25-2013 |
20130188523 | COMMUNICATION APPARATUS, METHOD FOR CONTROLLING COMMUNICATION APPARATUS, AND COMPUTER-READABLE STORAGE MEDIUM - A communication apparatus includes a unit configured to operate as a providing apparatus for providing a communication parameter to another communication apparatus, a unit configured to operate as a reception apparatus for receiving a communication parameter provided from another communication apparatus, a determination unit configured to determine a role to perform based on predetermined processing for determining whether the communication apparatus operates as the providing apparatus or the reception apparatus by communication with another communication apparatus, and an execution unit configured to execute the predetermined processing again in a case where communication for sharing the communication parameter with another communication apparatus is not started after the determination unit determines that the communication apparatus operates as either the providing apparatus or the reception apparatus. | 07-25-2013 |
20130188524 | Mechanism for Automatic Network Formation and Medium Access Coordination - The invention provides a set of mechanisms by which a wireless mobile mesh node equipped with a directional antenna may self form and self adapt its steady-state communications schedule. A link establishment handshake is carried out over an ongoing subtemplate-based discovery scan. During time not reserved for steady-state communications with previously discovered neighbors, nodes continue to search for an establish links with new neighbors. Initial and subsequent bandwidth allocation protocols may be utilized to allow peer nodes to coordinate communication opportunities between the peer nodes without impacting or having knowledge about reservations for communications with other peers. The link establishment and initial bandwidth allocation protocols may be piggy-backed for readily establishing an initial steady-state schedule with a peer upon link establishment without impact on previous steady state reservations by other nodes or on ongoing link establishment attempts elsewhere. | 07-25-2013 |
20130194972 | Network Reconfiguration Method - A method of reconfiguring a data unit communication network that comprises bridge nodes is described. Each bridge node comprises two or more ports for receiving and sending data units, a controller for controlling said bridge node and for handling received data units, and a record for associating data unit address information with port identification information. The controller is capable of querying said record for determining which one or more ports to forward a received data unit to. The method comprises performing a topology reconfiguration procedure for said data unit communication network when detecting an occurrence of any one of one or more topology reconfiguration conditions, and performing a purge procedure of the records of the bridge nodes when detecting an occurrence of an indication of an upcoming topology reconfiguration of the data unit communication network, the indication being different from any of said topology reconfiguration conditions, and continuing to handle data units in the bridge nodes during the purge procedure. | 08-01-2013 |
20130194973 | In-Service Upgrade of Provider Bridge Networks - A system and method for in-service migration for a Virtual Local Area Network, VLAN, service if a Provider Bridge Metro Ethernet Network, PB MEN, is upgraded to a Provider Backbone Bridge, PBB, MEN or an Internet Protocol/Multi Protocol Label Switching, IP/MPLS, MEN. After the deployment of the new PBB or IP/MPLS technology, a sequence of management actions are performed to configure PBB or IP/MPLS edge nodes to use the new technology as well as the old PB-based technology to support the VLAN service. Both old and new connectivity structures are maintained in the edge nodes during the entire migration process. Customer traffic is then redirected per edge node to the new technology. When each edge node entirely provides the VLAN service under the new technology, the migration is complete. | 08-01-2013 |
20130194974 | NETCONF-ENABLED PROVISIONING IN ROLLBACK AGNOSTIC ENVIRONMENT - A method includes receiving configuration data for configuring network devices; generating remote procedure calls (RPCs) for configuring the network devices, which include provisioning and reverse provisioning RPCs, where each reverse provisioning RPC reverse provisions a particular pseudowire; providing to the network devices the provisioning RPCs; determining a success with respect to each of the provisioning RPCs, where the success indicates that all endpoints of a pseudowire have been successfully configured; providing the reverse provisioning RPCs to the network devices, when it is determined that the success has not been achieved; and storing an indication of success when it is determined that the success has been achieved with respect to the provisioning RPCs. | 08-01-2013 |
20130194975 | Switch Table Update using Demotion Command in PRIME - Embodiments of methods and systems for switch table update using demotion command in PRIME are presented. In one embodiment, the method is performed by a power line communication (PLC) device. For example, the PLC device may be a data concentrator. In such an embodiment, the method may include receiving a request for registration from a node in a PLC network. The method may also include determining whether the node was previously included in the network according to an alternate network topology configuration. Additionally, the method may include issuing a notification to a group of switch nodes in the network instructing the switch nodes to update respective switch tables in response to a determination that the node was previously included in the network according to an alternate network topology configuration. | 08-01-2013 |
20130201873 | DISTRIBUTED FABRIC MANAGEMENT PROTOCOL - A distributed fabric system comprises a plurality of independent network elements interconnected by inter-switch links and assigned to a same group. Each network element includes a switching chip, a processor, and memory storing program code that is executed by the processor. The program code of each network element includes a device configuration (DC) stacking module and a switch discovery protocol (SDP) module. The SDP module of each network element, when executed, discovers each other network element in the group and elects one of the network elements as a master network element. The SDP module of the master network element, when executed, sends messages to the DC-stacking module of the master network element. Each sent message identifies one of the network elements in the group. The DC stacking module of the master network element, when executed, maintains a record of all network elements that are currently members in the group. | 08-08-2013 |
20130201874 | DAD-NS TRIGGERED ADDRESS RESOLUTION FOR DOS ATTACK PROTECTION - A first network element that receives an appropriation message from a second network element that indicates a target address which the second network element intends to appropriate for its use. In response to the appropriation message, the first network element broadcasts a discovery message to a plurality of network elements on the network to request a link-layer address in association with the first target address. The first network element receives a discovery response from the second network element with the first target address and the link-layer address of the second network element. Then the first network element updates a neighbor cache to include a pre-cached neighbor cache entry associating the link-layer address to the first target address. This prevents one or more future neighbor cache misses associated with the first target address. | 08-08-2013 |
20130201875 | DISTRIBUTED FABRIC MANAGEMENT PROTOCOL - A distributed fabric system comprises a plurality of independent network elements interconnected by inter-switch links and assigned to a same group. Each network element includes a switching chip, a processor, and memory storing program code that is executed by the processor. The program code of each network element includes a device configuration (DC) stacking module and a switch discovery protocol (SDP) module. The SDP module of each network element, when executed, discovers each other network element in the group and elects one of the network elements as a master network element. The SDP module of the master network element, when executed, sends messages to the DC-stacking module of the master network element. Each sent message identifies one of the network elements in the group. The DC stacking module of the master network element, when executed, maintains a record of all network elements that are currently members in the group. | 08-08-2013 |
20130201876 | Protocol Stack for a Multi-Waveform AD Hoc Network - A protocol stack for an ad hoc type network comprises existing modules from third generation 3GPP architectures, a radio access plane, a mobility management module and a radio resource control module, said ad hoc type network being able to be organized into several groups- or clusters, a group corresponding to a grouping of radio resources for a given coverage area, and: a routing module arranged between the management module and the radio resource control module; a part of the mobility management being managed in the access plane in order to manage transfers, or handovers, between the groups, in the case of a network that is organized into groups of users or “clusterized”; the module manages handover decisions and radio resource management; said protocol stack additionally comprising, an L2RTP layer suitable for processing the radio-level regenerative relaying at the level of a data packet; a security plane for isolating security functions. | 08-08-2013 |
20130201877 | METHODS AND SYSTEMS FOR OPERATING A LOGICAL SENSOR NETWORK - Methods and systems for operating a sensor network comprising a plurality of nodes and at least one resource, where a resource can be a sensing device (e.g., a camera or microphone) or other peripheral devices (e.g., a storage or recording system). In at least one embodiment of the present invention, at least one node in a network determines at least one resource available to it and the type of the resource or its capabilities. Based on the type or capabilities of the resource, the node associates with one or more logical node names and acquires instructions for performing at least one function. | 08-08-2013 |
20130208624 | Link State Fast Flood with Computed Multi-Protocol-Label-Switching (MPLS) Broadcast Tree - A link state network comprising a plurality of interconnected nodes, and a multiprotocol label switching (MPLS) tree established amongst at least some of the interconnected nodes, wherein the MPLS tree is associated with an MPLS label, and wherein the interconnected nodes are configured to deterministically forward a plurality of link state update (LSU) packets comprising the MPLS label over the MPLS tree. | 08-15-2013 |
20130208625 | Persistent Principal Switch for Fibre Channel Fabric - According to one aspect, a Fibre Channel (FC) switch that is currently serving as a Principal Switch among a plurality of FC switches in a FC Fabric sends an Exchange Fabric Parameters (EFP) frame having an empty domain identifier list to neighboring FC switches during a first portion a Principal Switch Selection phase. During a second portion of the Principal Switch Selection phase that is after the first portion, the first Fibre Channel switch sends to neighboring FC switches an EFP frame having a non-empty domain identifier list to indicate to the neighboring FC switches that the first FC switch is to remain serving as the Principal Switch in the FC Fabric. | 08-15-2013 |
20130208626 | Method for Allowing One Device to Detect Another Device - The present invention provides, in one embodiment, a method for detecting another device performed by a first device having a converged personal network service (CPNS) enabled entity. The method for detecting another device comprises the steps of: performing a procedure for a physical connection with a second device, if the CPNS enabled entity within the first device is set to a personal network entity (PNE) mode; and receiving a search request message from the second device, in order to prevent the duplication of information between the CPNS enabled entity and the second device. Preferably, said search request message can be used to obtain one or more pieces of information, among the mode information of one or more devices detected while the procedure for the physical connection is performed and the information on a network to which one or more said detected devices belong. Said received search request message can include one or more pieces of information among the information on the mode of the second device and the information on the network to which the second device belongs. | 08-15-2013 |
20130208627 | FIRMWARE DOWNLOAD WITH ADAPTIVE LOST PACKET RECOVERY - Disclosed are methodologies for implementing a firmware download to endpoints in a mesh network. A firmware package is divided into a number of blocks, each block containing a number of packets and sent as a broadcast to endpoints in a wireless mesh network. A number of redundancy packets are sent to permit calculation of lost packets. A maximum number of redundancy packets to be sent is determined and a forward error correction code is developed depending on the maximum number of redundancy packets and the total number of firmware packets to be sent. A first block of redundancy packets, less than the maximum number, is sent followed by additional blocks of redundancy packets depending on reports from the receiving endpoints. | 08-15-2013 |
20130223286 | Asynchronous Wireless Dynamic Ad-Hoc Network - A method for establishing and maintaining a dynamic network designed to allow wireless devices to communicate with one another on an ad-hoc basis. The wireless network is designed specifically to function autonomously, remaining completely independent from relying on any internet service provider or any other subsidiary systems such as any access points or routers. Rather than using central routers, all nodes in the network share the same capabilities as one another, and allow for a dynamic routing protocol to be executed directly by the network nodes. | 08-29-2013 |
20130223287 | LAYER TWO EXTENSIONS - A network device may be configured to define a Layer 2 domain, wherein the Layer 2 domain defines a data link layer broadcast domain and assign an access interface to the Layer 2 domain. The network device may be further configured to assign a double Virtual Local Area Network (VLAN) identifier to the access interface in the Layer 2 domain, wherein the double VLAN identifier includes an inner VLAN identifier and an outer VLAN identifier, receive a data unit via the access interface, wherein the data unit includes the double VLAN identifier, and associate the data unit with the defined Layer 2 domain, based on the data unit being received via the access interface and based on the data unit including the assigned double VLAN identifier. | 08-29-2013 |
20130235762 | MANAGEMENT OF A DISTRIBUTED FABRIC SYSTEM - A distributed fabric system has distributed line card (DLC) chassis and scaled-out fabric coupler (SFC) chassis. Each DLC includes a network processor and fabric ports. Each network processor of each DLC includes a fabric interface in communication with the fabric ports of that DLC. Each SFC includes at least one fabric element and SFC fabric ports. A fabric communication link connects each SFC fabric port to one DLC fabric port. Each fabric communication link includes cell-carrying lanes. Each fabric element of each SFC detects connectivity between each SFC fabric port of that SFC and one DLC fabric port over a fabric communication link. Each SFC includes program code that reads connectivity matrix from fabric element chips and sends connection information corresponding to the detected connectivity from that SFC to a central agent. A network element includes the central agent, which, when executed, constructs a topology of the distributed fabric system from the connection information sent from each SFC. | 09-12-2013 |
20130235763 | MANAGEMENT OF A DISTRIBUTED FABRIC SYSTEM - A distributed fabric system has distributed line card (DLC) chassis and scaled-out fabric coupler (SFC) chassis. Each DLC includes a network processor and fabric ports. Each network processor includes a fabric interface in communication with the fabric ports of that DLC. Each SFC includes at least one fabric element and SFC fabric ports. A fabric communication link connects each SFC fabric port to one DLC fabric port. Each fabric communication link includes cell-carrying lanes. Each fabric element detects connectivity between each SFC fabric port of that SFC and one DLC fabric port over a fabric communication link. Each SFC reads a connectivity matrix from fabric element chips and sends connection information corresponding to the detected connectivity from that SFC to a central agent. A network element includes the central agent, which, when executed, constructs a topology of the distributed fabric system from the connection information sent from each SFC. | 09-12-2013 |
20130235764 | VALIDATING REACHABILITY OF NODES OF A NETWORK OF AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEM - A device validates reachability of nodes of a communication network of an industrial automation and control system. The device includes a collector module configured to update a data set including discovered dataflow information by detecting direct neighbour nodes having a physical connection to a selected node, and updating the data set by adding the selected node and those direct neighbour nodes which have configured logical network constraints matching logical network constraints of the selected node. The device includes a repeater module configured to repeat the selecting of a direct neighbour node in the data set and directing the collector module to update the data set using the selected direct neighbour node. The device includes a validation module configured to validate reachability of nodes of the network by comparing the data set with a data set including designed dataflow information which defines reachability requirements for nodes of the communication network. | 09-12-2013 |
20130242804 | PATH CALCULATION METHOD - When a path which is a network communication path is calculated, the amount of path calculation is reduced while satisfying the requirement of the path. The network is logically divided into a plurality of calculation domains, and the divided calculation domains are hierarchically managed, and the path attribute of a path within the calculation domain of a lower hierarchical layer is held as a link attribute of an abstract link of a higher hierarchical layer. | 09-19-2013 |
20130242805 | METHOD AND APPARATUS FOR MANAGING A GROUP PROFILE IN A WI-FI DIRECT COMMUNICATION SYSTEM - A Wi-Fi direct communication system and method are used for regenerating a group of an electronic device in the Wi-Fi direct communication system, and an operation mode is determined in information of an obtained profile. When the operation mode is a group owner mode, the electronic device is set to an automatic group owner. At least one device included in the profile information is retrieved, and the retrieved device is invited to the group. When the invitation is completed, the group regeneration is completed. | 09-19-2013 |
20130250808 | BUILDING ALTERNATE ROUTES IN REACTIVE ROUTING NETWORKS - In one embodiment, an intermediate node in a computer network may receive one or more reactive routing route requests (RREQs) from an originating node and, based on those RREQs, may build a first directed acyclic graph (DAG) in the computer network that may be rooted at the originating node. The intermediate node may then forward the RREQs towards a target node in the computer network. The intermediate node may then receive one or more reactive routing route responses (RREPs) from the target node. Based on those RREPs, the intermediate node may then build a second DAG in the computer network that may be rooted at the target node. The intermediate node may then forward the RREPs towards the originating node. In this manner, the intermediate node may then forward traffic from the originating node toward the target node according to the second DAG (with alternate routes to the target node). | 09-26-2013 |
20130250809 | REGION-BASED ROUTE DISCOVERY IN REACTIVE ROUTING NETWORKS - In one embodiment, a region anchor node may receive a unicasted route request (RREQ) for a target node. The region anchor node may then flood the RREQ to a region within which it resides. Subsequently, the region anchor node may receive one or more reactive routing route replies (RREPs) returned by the target node within the region. Based on the RREPs, the region anchor node may build one or more region routes from the region anchor node to the target node, and returns the one or more region routes to the originator node to cause the originator node to concatenate the one or more region routes and the unicast route of the original RREQ to form a path from the originator node to the to target node. | 09-26-2013 |
20130250810 | TOPOLOGY DISCOVERY IN A HYBRID NETWORK - Systems and methods provide a discovery protocol allowing nodes that are interested in knowing a network topology to discover other nodes in the network topology. The discovery protocol includes two message types, topology discovery messages and topology query messages. A node issues topology discovery messages upon powering up, at periodic intervals, or upon detecting a change in network topology. The topology discovery messages are broadcast to all nodes on a network and identify the issuing node to the network. A topology query message is sent to a particular node and requests a response from the receiving node regarding the neighboring nodes of the receiving node. The querying node can use the response data to discover other nodes and to send the discovered nodes query messages such that the node can determine a network topology to a desired level of depth within the network. | 09-26-2013 |
20130250811 | DYNAMIC DIVISION OF ROUTING DOMAINS IN REACTIVE ROUTING NETWORKS - In one embodiment, a reactive routing network may be dynamically divided into reactive routing network sub-domains that comprise a plurality of nodes having bounded route request (RREQ) scopes (e.g., search-domains) that are limited to a particular path length. The transit node in a first reactive routing network sub-domain may receive a RREQ from an originating node within the first reactive routing network sub-domain for a target node determined by the originating node to be beyond the bounded RREQ scope of the originating node. The transit node may then discover a route from the transit node to the target node, and return the route to the originating node. In this manner, the transit node may establish a complete route between the originating node and the target node. | 09-26-2013 |
20130250812 | SYSTEM AND METHOD FOR ENHANCING LIFETIME AND THROUGHPUT IN A DISTRIBUTED WIRELESS NETWORK - A system and method for enhancing lifetime and throughput in a distributed wireless network is disclosed herein. The method may include sensing, by a first machine, different parameters of at least one neighboring machine; updating, by the first machine, at least one parameter of said first machine based on said sensed parameters of said neighboring machine; generating, by the first machine, a signed-graph on the basis of the updated parameter, wherein said generated graph comprises at least two nodes representing said updated parameter and at least one edge interconnecting said two nodes; iteratively updating, by the first machine, the at least one parameter at different time-scales until convergence is achieved; and communicating, by the first machine, inter-layer updates in individual layers of a transmission protocol stack of the first machine due to said update of at least one parameter. | 09-26-2013 |
20130250813 | UPGRADING A PROGRAMMABLE LOGIC GATE ARRAY IN AN IN-SERVICE PLUGGABLE TRANSCEIVER - Devices and methods for partially upgrading a programmable pluggable transceiver that is in service using the regular datapaths without degrading the basic transparent, hitless pass-through functionality of the transceiver. The programmable logic gate array can be divided into four generalized parts: core logic for basic transceiver pass-through functionality over the datapaths, upgradeable internal logic, connectivity logic for selectively outputting on the datapaths from the core and internal logics, and control logic for isolating, upgrading and reconnecting the internal logic without affecting the basic transparent hitless pass-through functionality of the transceiver. | 09-26-2013 |
20130250814 | APPARATUS AND METHOD FOR NETWORK CONTROLLING IN WIRELESS COMMUNICATION SYSTEM - An apparatus and a method for configuring a network in a terminal of a wireless communication system are provided. The network configuring method includes sending a reference message in a communication radius of the terminal; when receiving at least one ACKnowledge (ACK) message for the reference message, checking a node degree of each adjacent terminal which sends the ACK message, the node degree indicating the number of neighboring terminals of each adjacent terminal; forming an inner region and an outer region of the terminal based on an adjacent terminal of the greatest node degree among the adjacent terminals; determining a transmit power in the inner region and a transmit power in the outer region; and determining a final transmit power for configuring a network using the transmit power of the inner region and the transmit power of the outer region. | 09-26-2013 |
20130258904 | CONFIGURABLE WIRELESS NETWORKS, SYSTEMS AND METHODS - According to an embodiment of the invention there is provided a wireless network that may include a wireless network leader and multiple wireless units; wherein each wireless unit has a single father wireless unit, wherein the father wireless unit is selected out of the wireless network leader and the multiple wireless units; wherein each wireless unit may be arranged to be configured according to a wireless unit configuration selected out of: (a) an unauthorized and empty wireless unit, (b) an authorized and full wireless unit, (c) an authorized and not full wireless unit, and (d) an unauthorized and not empty wireless unit; wherein each wireless unit may be arranged to transmit messages only to a father of the wireless unit or to a son of the wireless unit. | 10-03-2013 |
20130258905 | SELF-EVOLVABLE LOGIC FABRIC - Methods and systems for achieving self-organized growth of a logic pathway. A number of hardware modules that represents a core can be configured and communicated via a packet routing architecture. Each core includes a plurality of sub-modules that interact dynamically to a growth algorithm. A flow network can be created between a sensor input and a prediction of a desired sensor input and a link can be formed between a regularity within a core and another core via a link-flow-selection process. A digital data packet can be transmitted between the cores for communicating activation of the regularity and to exchange energy. Such physically-self organized circuit fabric system interacts dynamically to a growth algorithm that takes the input to produce a desired output and continuously self-repair and/or heal if damaged. | 10-03-2013 |
20130258906 | COMMUNICATION CONFIGURATION AND METHOD FOR DEBUGGING, RESPECTIVELY FOR PROGRAMMING ONE OR MORE PARTICIPANTS OF THE COMMUNICATION CONFIGURATION - A communication system configuration has an annular design and includes multiple participants which are serially interconnected, one participant being configured as a master and the remaining participants being configured as slaves. The master is configured for transmitting a data packet to one or a plurality of slaves, and each slave has a shift register. The communication system includes a participant which has an external interface and is adapted for receiving data via the external interface from outside of the communication system to implement a debugging or a programming of one or a plurality of participants of the communication system or for transmitting data to outside of the communication system. | 10-03-2013 |
20130265909 | METHOD OF EXTENDING ROUTING PROTOCOL FOR M2M SERVICES IN WIRELESS MESH NETWORK - A method of extending a routing protocol for supporting an M2M service in a wireless mesh basic service set (MBSS) is provided. A method of extending a routing protocol that sets a mesh station (M-STA) that is connected to a distribution system in M-STAB of an MBSS to a mesh gate, in which the mesh gate transmits a RANN message and a gate announcement message to the M-STA, in which the mesh gate receives a path request message from the M-STA, and in which the mesh gate stores a path from the mesh gate to the M-STA based on the received path request message is provided. Because an M2M service terminal can be connected to the M-STA, the M-STA receives data from an M2M service terminal and the received data is included in a proxy update message, and the proxy update message is transmitted to the mesh gate. | 10-10-2013 |
20130265910 | Method, Gateway Device and Network System for Configuring a Device in a Local Area Network - The invention relates to a method for configuring a device in a local area network using a gateway. The gateway is being communicatively coupled to a remote management server outside the local area network. The local area network comprises a protected portion and an unprotected portion. The method comprises the following actions: First a connection request is received from a user device. The user device is provided with an address that enables the user device to establish a connection with the gateway within the unprotected portion of the local area network. Then a configuration request is received from the user device, in which the configuration request includes device information. Network information is appended to the configuration request and the appended configuration request is sent to the remote management server. In response a configuration response message is received. The response message includes the configuration data from the remote management server. Finally, configuration of the user device is established within the protected portion of the local area network using the configuration data. | 10-10-2013 |
20130286895 | Discovery and Configuration of Network Devices via Data Link Layer Communications - A method includes discovering a network device that has connected to a data link layer of a network based on a discovery packet broadcast by the network device via the data link layer. The method further includes configuring the network device based on a response packet transmitted to the network device via the data link layer in response to discovering the network device. | 10-31-2013 |
20130286896 | TELECOMMUNICATIONS AND COMPUTER NETWORK INTERCONNECTIVITY APPARATUSES AND METHODS THEREOF - A single line network interconnectivity apparatus includes a system board, one or more female Ethernet ports, an Ethernet data receiving port (EDRP), an Ethernet data transfer port (EDTP), and a data switch. The data switch includes at least one of configurable hardware logic configured to implement or a processor coupled to a memory and configured to execute programmed instructions stored in the memory including obtaining at least one network data packet from the EDRP. The data packet is communicated to the female Ethernet port, when it is determined that the identifier included in the network packet matches the identifier associated with the computing device connected to the female Ethernet port. The data packet is communicated to the EDTP, when it is determined that the identifier included in the data packet does not match the identifier associated with the computing device connected to the female Ethernet port. | 10-31-2013 |
20130286897 | SYSTEM AND METHOD FOR DISCOVERING SURROUNDINGS FOR COMMUNICATING OBJECTS - The invention relates to a system for determining surroundings in a wireless network, the system including first and second nodes, each node being programmed to periodically detect the nodes located in the surroundings thereof every time period Δ, characterized in that: the first node comprises a transmitter ( | 10-31-2013 |
20130286898 | Self-Configuration of an E-Node-B - A method of configuration of an e-Node B device, on order to integrate the e-Node B device in a telecommunication network, comprising equipment mode, —establishing a communication link with the telecommunication network, —receiving configuration data, —self-configuring using the received data, and —entering an operational state, wherein the establishment of the communication link comprises transmitting a data element indicating that the establishment of the communication originates from an e-Node B behaving as a user equipment. | 10-31-2013 |
20130294290 | METHOD, APPARATUS, AND SYSTEM FOR ESTABLISHING PVC LINK - The present invention discloses a method, an apparatus, and a system for establishing a PVC link, and belongs to the field of access networks. The method includes: receiving, by a central office device, a detection cell sent by a terminal, where the detection cell carries a PVC parameter built in the terminal; judging whether service connection configurations of the central office device contain the PVC parameter; if true, looping back, by the central office device, the detection cell to the terminal, so that the terminal enables a PVC link corresponding to the PVC parameter and disables PVC links except the corresponding PVC link. The present invention further discloses a corresponding central office device and a terminal and a system comprised of the central office device and the terminal. | 11-07-2013 |
20130308496 | System and Method for Generic Multi-Domain Network Pruning - A system and method for generic multi-domain network pruning A generic mechanism that can control network pruning can be applied to a multi-domain context. In one embodiment, the pruning mechanism is implemented using a network pruning control table that can be accessed using a source domain identifier and a destination domain identifier. The source domain identifier is shared by network traffic that is received from any of a first plurality of network devices that are included in a source network domain and the destination network domain identifier is shared by network traffic destined to any of a second plurality of network devices that are included in a destination network domain. | 11-21-2013 |
20130315104 | TRANSMISSION DEVICE, TRANSMISSION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM - A transmission device includes a memory which stores a program, and a processor which executes, based on the program, a procedure including calculating a difference between a first time when a frame is received by a first port which is in a blocked state and a second time when the frame is received by a second port which is not in a blocked state, and correcting a frame received after topology of a network is changed in accordance with states of the first and second ports after the topology is changed and the difference. | 11-28-2013 |
20130322297 | SERVICE CONSTRAINT ADVERTISEMENT AND DISCOVERY - Various embodiments for service constraint advertisement and discovery are provided. Each wireless device in a group of wireless devices can multicast a service advertisement frame to advertise a service provided, a discovery request frame to request for a service, a discovery response frame in response of a discovery request frame if the wireless device can provide the requested service, or a discovery proxy response frame in response of a discovery request frame if another wireless device can provide the requested service. The frames include information related to one or more services and capabilities, availability schedule, frequency band in use, and other information. This allows a new device joining the group to accomplish device discovery and service discovery at the same time. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. | 12-05-2013 |
20130322298 | Network Topology Discovery - Topology discovery includes determining connection data identifying connections between network devices. The connection data includes the network devices and network interfaces for the devices, iterations are performed to determine links in the topology based on the connection data. An iteration may include adding a link in the topology ( | 12-05-2013 |
20130329605 | MULTICAST SERVICE IN VIRTUAL NETWORKS - Techniques are described to provide multicast service within a virtual network using a virtual network controller and endpoint replication without requiring multicast support in the underlying network. The virtual network controller is configured to create a multicast tree for endpoint devices of a multicast group in the virtual network at a centralized location instead of in a distributed fashion. The virtual network controller communicates the multicast tree to one or more of the endpoint devices of the multicast group to instruct the endpoint devices to replicate and forward multicast packets to other endpoint devices according to the multicast tree. The replication and forwarding of multicast packets is performed by virtual switches executed on the endpoint devices in the virtual network. No replication is performed within the underlying network. The techniques enable multicast service within a virtual network without requiring multicast support in the underlying network. | 12-12-2013 |
20130336164 | SYSTEM AND METHOD FOR VIRTUAL PORTCHANNEL LOAD BALANCING IN A TRILL NETWORK - An example method includes storing a portion of virtual PortChannel (vPC) information in a TRansparent Interconnect of Lots of Links network environment, deriving, from the portion of vPC information, a physical nickname of an edge switch to which a frame can be forwarded, and rewriting an egress nickname in a TRILL header of the frame with the physical nickname. In example embodiments, the vPC information can include respective vPC virtual nicknames, EtherChannel hash algorithms, hash values, and physical nicknames of edge switches associated with vPCs in the network environment. In some embodiments, the portion of vPC information can be derived from an Interested vPC Type Length Value (TLV) information of an Intermediate System to Intermediate System (IS-IS) routing protocol data unit (PDU). | 12-19-2013 |
20130336165 | SWITCH IDENTIFICATION - An example switch in accordance with the present disclosure is to process a command to determine desired identification information; generate a link layer discovery protocol (LLDP) frame based at least in part on the desired identification information, wherein the LLDP frame comprises an optional type-length-value (TLV) that causes a second switch to enable a light source; and transmit the LLDP to the second switch, | 12-19-2013 |
20130336166 | SYSTEMS AND METHODS FOR DERIVING UNIQUE MAC ADDRESS FOR A CLUSTER - As cluster LAG (CLA or CLAG) is a link aggregation spread across cluster nodes, the same MAC address is to be used for a CLAG on all cluster nodes. Each node in a cluster will derive the unique MAC address for all cluster LAGs. When a cluster is formed, the cluster configuration coordinator (COO) (referred to as the “source MAC node”) will sync its MAC addresses of CLAGs to all nodes in a cluster. The same MAC address may be used for a CLA on all nodes from then onwards till the source MAC node is removed from cluster. Even if the CCO changes due to some reason, CLAG MACs will not be changed as long as a source MAC node is present in the cluster. | 12-19-2013 |
20130336167 | IDENTIFYING THE BEST SERVICE PROVIDER LINK FOR PERFORMANCE ROUTING - In one embodiment, a method includes obtaining a first packet included in a flow to be forwarded to a border router, and replicating the first packet to create a duplicate. The first packet is forwarded onto a first set of links, and the duplicate is forwarded onto a second set of links, to the border router. First information relating to the first packet and the first set of links, and second information relating to the duplicate and the second set of links, is obtained. The first information and the second information are used to determine whether to forward the flow on the first set of links. The first set of links is used to forward the flow if it is determined that the first set of links is to be used to forward the flow, otherwise the second set of links is used to forward the flow. | 12-19-2013 |
20130336168 | SELF-ORGANIZATION OF A SATELLITE GRID - Methods, machine-readable media, and systems are provided for self-organization of a satellite grid | 12-19-2013 |
20130343227 | Communication system including a non-overlapping ring network and method of establishing a smooth growth non-overlapping ring network - According to an illustrative embodiment, a communication system includes a plurality of nodes. The nodes are communicatively connected to form a plurality of non-overlapping rings. At least one of the rings has an order of a plurality of node positions that corresponds to a smooth growth non-overlapping ring network configuration. | 12-26-2013 |
20140003293 | ENABLING DIRECT LINKS BETWEEN COMPUTING DEVICES ON AN EXTENDED SERVICE SET | 01-02-2014 |
20140003294 | CONFIGURATION DIAGRAM PREPARING APPARATUS, AND COMPUTER-READABLE RECORDING MEDIUM HAVING STORED THEREIN CONFIGURATION DIAGRAM PREPARING PROGRAM | 01-02-2014 |
20140016510 | METHODS AND APPARATUS FOR EFFICIENT DECENTRALIZED INFORMATION DISSEMINATION IN A NETWORK - Methods and apparatus for efficient decentralized information dissemination in a network are discussed herein. The decentralized information dissemination techniques are based on non-deterministic protocols such as gossip-based protocols. An example method for dissemination of information in a network can include: selecting a destination node from a set of neighboring nodes using a gossip-based protocol; transmitting a message to the destination node; and receiving a feedback response from the destination node. The feedback response can include a level of usefulness of the message to the destination node. In addition, each neighboring node in the set can be associated with a selection weight, and the selection weights can be related to a probability of selecting each neighboring node in the set as the destination node using the gossip-based protocol. Upon receiving the feedback response, the method can include adjusting the selection weight of the destination node based on the feedback response. | 01-16-2014 |
20140016511 | RAPID SCANNING FOR FAST INITIAL LINK SETUP - Embodiments of station and responder and method for reducing the time and power consumption for stations to scan for wireless network coverage and establish a link to the responder to gain access thereto are generally described herein. In some embodiments, a first scan phase establishing the existence and perhaps other characteristics of responders, is followed by an responder discovery phase where a link can be established using active or passive scanning procedures. In some embodiments the two phases are somewhat combined with the first phase using a Probe Request with an Organizationally Unique Identifier as the Scan Request and an ACK message acting as a Scan Request Response and a Probe Response Request transmitted separately. Specific timings and message constructs allow utilization within existing or new 802.11 standards. | 01-16-2014 |
20140022951 | LOGICAL INTER-CLOUD DISPATCHER - Embodiments of the present invention provide a method and system for establishing a network communication path between a source node and a destination node. A destination geographic area of the destination node is determined. An intermediate node located in an intermediate geographic area that is adjacent to a source geographic area of the source node and is in a direction that is toward the destination geographic area is determined based at least in part on the destination geographic area. Connectivity with the intermediate node is requested or established. A determination is made as to whether the adjacent intermediate geographic area is the destination geographic area. If the determined adjacent intermediate geographic area is not the destination geographic area, a next intermediate node in another intermediate geographic area that is adjacent to the intermediate geographic area and is in a direction that is toward the destination geographic area is determined. | 01-23-2014 |
20140022952 | COMMUNICATION APPARATUS, COMMUNICATION METHOD, PROGRAM AND STORAGE MEDIUM - A communication apparatus includes: providing means for providing communication parameters to a receiving apparatus to be provided with communication parameters; determination means for determining whether there are a plurality of providing apparatuses that provide the communication parameters; and notifying means for, in case the determination means determines that there are the plurality of apparatuses, notifying the receiving apparatus that the providing means have already provided with the communication parameters of a notification that instructs the apparatus to halt the usage of the provided communication parameters. | 01-23-2014 |
20140029471 | NETWORK-ASSISTED PEER DISCOVERY - Techniques for transmitting information in a long term evolution (LTE) wireless communication network are disclosed. A base station may receive a first user equipment (UE) expression and first UE location information of a UE seeking peers. The base station may also receive a second UE expression and second UE location information of at least one of the peers. In accordance with the first and second UE expressions and the first and second UE location information, the base station may match ones of the peers proximate to the UE. The base station may transmit, using a data exchange efficiency technique, information to alert the UE to the presence of the peers. This transmission may comprise wide area network (WAN)-specific signaling. | 01-30-2014 |
20140036729 | LABEL DISTRIBUTION AND ROUTE INSTALLATION IN A LOOP-FREE ROUTING TOPOLOGY USING ROUTING ARCS - In one embodiment, a method comprises creating, in a computing network, a loop-free routing topology for reaching a destination device, the loop-free routing topology comprising distinct paths for reaching the destination device; generating a set of serialized representations describing the loop-free routing topology, each serialized representation describing a corresponding one of the paths; and propagating the set of serialized representations from the destination device to network nodes in the computing network, enabling the network nodes to establish loop-free label switched paths for reaching the destination device via the loop-free routing topology. | 02-06-2014 |
20140036730 | ADAPTIVE INFRASTRUCTURE FOR DISTRIBUTED VIRTUAL SWITCH - In one embodiment, a method includes identifying at a network device, characteristics of a distributed virtual switch comprising a control plane component and a plurality of data plane components, grouping the data plane components, and adapting operation of the distributed virtual switch for one or more groups of the data plane components based on the characteristics. An apparatus and logic are also disclosed herein. | 02-06-2014 |
20140044015 | T-STAR INTERCONNECTION NETWORK TOPOLOGY - According to one embodiment of the present invention, a method of constructing network communication for a grid of node groups is provided, the grid including an M dimensional grid, each node group including N nodes, wherein M is greater than or equal to one and N is greater than one, wherein each node includes a router. The method includes directly connecting each node in each node group to every other node in the node group via intra-group links and directly connecting each node in each node group of the M dimensional grid to a node in each neighboring node group in the M dimensional grid via inter-group links. | 02-13-2014 |
20140056176 | REDISTRIBUTING ROUTES IN BACKBONE EDGE BRIDGE MULTI-CHASSIS LINK AGGREGATION GROUP TOPOLOGIES BETWEEN TWO ROUTING PROTOCOLS - A method, system and computer readable medium for redistributing routes in backbone edge bridge multi-chassis link aggregation group topologies between two routing protocols is described. The method can include learning, at a first node and a second node, a first routing table entry originating from a first side of a network and being received in a first protocol and creating, at the first node and the second node, and generating second routing entry information corresponding to the first routing table entry, in a second protocol different from the first protocol. The method can also include exchanging the second routing entry information between the first node and the second node. The first node and/or the second node add the second routing entry information to the routing table when the first routing entry is not present in the routing table and ignores the second routing entry information when the first routing entry is present in the routing table. | 02-27-2014 |
20140056177 | DIRECTIONAL WIRELESS NETWORK DISCOVERY - A wireless device may perform one or more omnidirectional scans for network wireless devices. Based at least in part on results of those omnidirectional scans, the scanning wireless device may determine that one or more directional scans should be performed. The scanning wireless device may then select one or more scan directions and perform a directional scan in each of those scan directions. | 02-27-2014 |
20140064147 | METHODS AND APPARATUS FOR WAN ENABLED PEER DISCOVERY - A method, an apparatus, and a computer program product for communication are provided in connection with WAN entity enabled discovery to for P2P communications. In one example, a WAN entity is equipped to obtain location information associated with a UE, allocate a peer discovery resource to the UE for use during peer discovery based at least in part on the obtained location information, and send a control message to the UE including the allocated peer discovery resource and one or more attributes associated with the peer discovery resource for use during peer discovery. In another example, a UE is equipped to send location information associated with a physical location of the UE to a WAN entity, receive a control message including a peer discovery resource and one or more attributes associated with the peer discovery resource, and use the peer discovery resource during peer discovery. | 03-06-2014 |
20140064148 | Distributed Proxy Addressing Operations - An addressing redirection mechanism is initiated at a switch or a router in a computing network in order to enable the switch to perform one or more distributed proxy addressing operations on behalf of a connected router. An address request transmitted from a first host device to a second host device to obtain addressing information of the second host device is received at the switch, and the switch inspects the address request to identify addressing information for the first host device. The switch is configured to forward the addressing information for the first host device to the router | 03-06-2014 |
20140064149 | NETWORK ACCESS DEVICE AND METHOD FOR AUTOMATICALLY ESTABLISHING CONNECTION TO A WIDE AREA NETWORK - A network access device (NAD) is configured to automatically establish a connection to a WAN. The NAD tests IP configurations according to a first priority scheme at least until a currently best scoring one of the IP configurations is selected for use to communicate over the WAN. The testing of the IP configurations includes transmitting requests according to a first priority scheme and tracking any replies reflecting which IP configurations are valid. The first priority scheme is for selecting among IP configurations for testing and prioritizing a first type of IP configuration over a dynamically determined type of IP configuration. Which IP configurations of the dynamically determined type that are to be tested are determined by attempting to obtain DHCP leases using different VLAN IDs according to a second priority scheme of VLAN IDs to include in DHCP requests. | 03-06-2014 |
20140071855 | TRANSPARENT AUTO-NEGOTIATION OF ETHERNET - A system for negotiating Ethernet link settings between interconnected nodes in a network having an Ethernet protocol stack that includes a PCS sub-layer with an auto-negotiation function. The system comprises connecting an intermediate device coupled between two network nodes via optical or copper interfaces, with the link settings between each node and the connected intermediate device being the same, thereby bypassing the auto-negotiation of the PCS sub-layer in the intermediate device. The intermediate device may transparently send negotiation messages from each node to the other during the link negotiation phase without interacting with those messages. Instead of the intermediate device, a single form pluggable (SFP) device may be connected between the two network nodes via optical or copper interfaces on the network side and via an SFP slot on the device side. | 03-13-2014 |
20140071856 | TIMING ADVANCE INFORMATION FOR ADAPTING NEIGHBOR RELATIONS - Adjusting radio area network performance by adapting cell coverage area can help optimize the operating efficiency of a wireless network. Base station coverage areas can be determined by analysis of reported timing advance information. This can facilitate adjusting coverage areas. Further, integration with network topology planning components and management components can be employed. Moreover, prioritization of base stations in Automatic Neighbor Relations (ANR) neighbor lists can improve coverage balance by influencing complex heterogeneous coverage layout systems. Historical timing advance information can be employed to facilitate analysis of statistical coverage conditions for cells, analysis of coverage areas as they relate to performance metrics, analysis of coverage areas with regard to specific event such as handovers, etc. Moreover, coverage area analysis can be linked to alarm systems. | 03-13-2014 |
20140078936 | APPARATUS FOR CONFIGURING OVERLAY NETWORK AND METHOD THEREOF - Disclosed are an apparatus for configuring an overlay network and a method thereof. An apparatus for configuring an overlay network may include a network configuring device collecting topology information and bandwidth information of a physical network and configuring one logical network including a plurality of predetermined nodes by using the collected topology information and bandwidth information of the physical network; and a storage device storing the topology information and bandwidth information of the physical network. | 03-20-2014 |
20140086100 | Multi-Chassis Cluster Synchronization Using Shortest Path Bridging (SPB) Service Instance Identifier (I-SID) Trees - A method, apparatus and computer program product for providing synchronization of a multi-chassis cluster using SPB I-SID trees is presented. A plurality of network devices are defined for making up a single cluster. Each network device of the cluster is configured with a same cluster Identifier (cluster ID) and each network device of the cluster signals an Service Instance Identifier (I-SID). At least one ISID multicast tree is generated, each one of the at least one multicast tree rooted at one node of the cluster. Cluster synchronization messages are exchanged between the network devices of the cluster using the at least one multicast tree. | 03-27-2014 |
20140086101 | Wireless internet system and method - A method for providing a wireless Internet connection to WiFi-enabled devices (STAs) comprising: wirelessly connecting a first STA to the Internet through a first AP with a first SSID; remaining connected to the first Access Point (AP), the first STA creates a software-based wireless AP with a second SSID for wirelessly connecting other STAs to the Internet through the first STA. A software module running on the first STA allows a second STA a wide access to the Internet only if the second STA has a copy of the software module running installed and active therein. A method for configuring STAs to connect to a wireless network, comprising: a customer first connects a STA by wire to its network; a software on the STA copied to the STA the security information gained through the wired connection, thus setting the security parameters for the STA. | 03-27-2014 |
20140098710 | SOFTWARE DEFINED NETWORKING SYSTEMS AND METHODS VIA A PATH COMPUTATION AND CONTROL ELEMENT - Software Defined Networking systems and methods are described via a Path Computation and Control Element (PCCE) that is based in part on a Path Computation Element (PCE). A common, simple interface is designed based on an existing PCE interface that allows a centralized entity (i.e., a Path Computation and Control Element or PCCE) to control the initiation of new connections or tunnels and by default to manage the state of these connections or tunnels once established. In particular, the systems and methods create an extension to the PCE architecture to allow a centralized application or applications to control the creation, rerouting and deletion of connections within a network. | 04-10-2014 |
20140098711 | BICASTING USING NON-CONGRUENT PATHS IN A LOOP-FREE ROUTING TOPOLOGY HAVING ROUTING ARCS - In one embodiment, a method comprises creating, in a computing network, a loop-free routing topology comprising a plurality of routing arcs for reaching a destination network node, each routing arc comprising a first network node as a first end of the routing arc, a second network node as a second end of the routing arc, and at least a third network node configured for routing any network traffic along the routing arc toward the destination node via any one of the first or second ends of the routing arc, the loop-free routing topology providing first and second non-congruent paths; and forwarding bicasting data, comprising a data packet in a first direction from a network node and a bicasted copy of the data packet in a second direction from the network node, concurrently to the destination node respectively via the first and second non-congruent paths. | 04-10-2014 |
20140098712 | METHOD AND SYSTEM FOR IMPROVED COMMUNICATION NETWORK SETUP UTILIZING EXTENDED TERMINALS - Aspects of a method and system for improved communication network setup utilizing extended terminals are presented. Aspects of the method may comprise configuring a wireless Ethernet terminal functioning as a client station by a configurator via a network. The configured wireless Ethernet terminal may wirelessly receives information from a wireless station, and communicate the wirelessly received information to at least one of a plurality of wired stations via at least one of a plurality of corresponding wired interfaces. Aspects of the system may comprise a collocated device functioning as a configurator that configures a wireless Ethernet terminal functioning as a client station via a network. The configured wireless Ethernet terminal may wirelessly receives information from a wireless station, and communicate the wirelessly received information to at least one of a plurality of wired stations via at least one of a plurality of corresponding wired interfaces. | 04-10-2014 |
20140105068 | Methods for Zero Loss and Nonstop Packet Processing During System Software Upgrades - A method implemented in a network component for an in-service software upgrade (ISSU), the method comprising selecting a forwarding core (FC) for upgrade from a plurality of FCs that run at a data plane on a printed circuit board of the network component to process and forward a plurality of packets, and resetting the selected FC with a software upgrade, wherein at least one of the other FCs continues processing and forwarding packets when the selected FC is upgraded. | 04-17-2014 |
20140105069 | Mobile Network Management Using Multiple Wireless Modems - Presented is a system and method for providing mobile network management using multiple wireless modems. The method includes receiving a plurality of parameters relating to a plurality of wireless networks using a plurality of wireless modems each operable for communication according to one of the plurality of wireless networks. The method further includes evaluating the plurality of parameters according to one or more connection rules. Based on the evaluating, a connection is established to a first wireless network of the plurality of wireless networks using a first wireless modem of the plurality of wireless modems operable for communication according to the first wireless network. | 04-17-2014 |
20140105070 | MANAGING MAPPING IN NETWORKS - A method for managing mapping in a network includes: programming mapping relationships between a VSAN and a VLAN of a fabric in advance, which include mapping relationships between VSANs and VLANs programmed in advance for each FCoE switch needed by the fabric; obtaining mapping relationships between the VSANs and the VLANs configured currently for all the FCoE switches of the fabric, when obtained mapping relationships are inconsistent with the programmed-in-advance mapping relationships, automatically updating mapping relationships between the VSANs and the VLANs configured in FCoE switches corresponding to the inconsistent mapping relationships, and/or mapping relationships between the VSANs and the VLANs programmed in advance for the FCoE switches corresponding to the inconsistent mapping relationships. | 04-17-2014 |
20140112200 | APPARATUS, SYSTEM, AND METHOD FOR PEER GROUP FORMATION FOR MOBILE DEVICES BY PROXIMITY SENSING - The present invention includes apparatuses, systems, and methods for peer group formation for mobile devices by proximity sensing. The described embodiments further include methods, systems, and apparatuses configured to easily establish an ad-hoc peer network in which each of the devices in the network automatically discovers and is connected to other devices in the network upon establishing a connection with at least one member of the ad-hoc network. The connection is established using a tap of NFC devices in the two wireless devices. Further, the wireless devices in the ad-hoc network may be divided into logical peer groups. | 04-24-2014 |
20140112201 | Forming a Convex Polygon of Mobile Sensors - Forming a convex polygon of a plurality of mobile sensors in an area is provided. Sensor output data received from the plurality of mobile sensors in the area is analyzed using an optimization problem. It is determined whether the plurality of mobile sensors forms the convex polygon in the area. In response to determining that the plurality of mobile sensors does form the convex polygon in the area, an objective function and a set of constraints corresponding to the optimization problem are generated. Then, a sparse solution of the optimization problem is calculated using the objective function and the set of constraints to determine vector weight values for each of the plurality of mobile sensors. | 04-24-2014 |
20140126422 | RESILIENT INTERWORKING OF SHORTEST PATH BRIDGING AND ETHERNET VIRTUAL PRIVATE NETWORKS - An Ethernet network, an Ethernet method, and an Ethernet node provide active-active dual-homed interworking between two Ethernet networks. The network, method, and node can include two nodes interconnected each to a Shortest Path Bridging (SPB) network and an Ethernet Virtual Private Network (E-VPN). The two nodes can utilize a same Ethernet Segment Identifier (ESI) for the E-VPN network to cause the dual-homed links to appear as a single link from an E-VPN perspective and a dummy node to advertise an extra node in the SPB network enabling two paths therein. | 05-08-2014 |
20140126423 | ENABLING DYNAMIC ROUTING TOPOLOGIES IN SUPPORT OF REAL-TIME DELAY TRAFFIC - In one embodiment, a device determines a set of sources and used destinations for traffic in a computer network, where nodes of the network are configured to send all traffic to the used destinations through a root node of the computer network according to a directed acyclic graph (DAG). The device may then also determine a set of capable nodes as common ancestors to source-destination pairs that provide a more optimal path between the source-destination pairs than traversing the root node, and instructs the set of capable nodes to store downward routes to forward traffic for one or more of the used destinations according to the stored downward route rather than through the root node. | 05-08-2014 |
20140126424 | EVENT DRIVEN NETWORK SYSTEM - A network switch includes a plurality of internal ports, a plurality of external ports, an event handler, an action engine, and an event processor. The event handler detects an event and, in response, assembles a construct that includes event parameters. The action engine uses the construct to generate an event syntax. The event processor executes the event syntax to automatically configure the communication between the plurality of internal ports and the plurality of external ports. A first event may include the connection of a cable to a first external port and result in each of the plurality of internal ports communicating with the first external port. A second event may include the connection of a cable to a second external port and result in a first subset of internal ports communicating with the first external port and a second subset of internal ports communicating with the second external port. | 05-08-2014 |
20140126425 | WIFI-TO-SERIAL ENCAPSULATION IN SYSTEMS - Embodiments include a device comprising an interface module for interfacing with proprietary legacy systems. The interface module comprises a data interface for interfacing with a processing component of the legacy system, where the processing component uses a proprietary protocol for processing data of the legacy system. The interface module includes a protocol module that comprises a protocol corresponding to the proprietary protocol of the legacy system, and the interface module uses the protocol to exchange data with the processing component. The interface module includes a communication device that communicates with a remote system via a wireless channel. The interface module controls communications that include passing commands from the remote system to the legacy system, and passing event data of the legacy system to the remote system. | 05-08-2014 |
20140140243 | METHOD AND APPARATUS FOR LAYER 2 FAST RE-CONFIGURATION IN A ROUTING BRIDGE NETWORK - A method and apparatus in provided which enables fast layer 2 reconfiguration in a network that includes Routing Bridges. Each Routing Bridge stores, for each forwarding target, identifiers of a primary next Rbridge and an alternate next Rbridge. The forwarding target may be a network end node, or an Egress Rbridge associated with the network end node. In response to a trigger condition, layer 2 communications are selectively switched from a path that includes the primary next Rbridge device to a path that includes the alternate next Rbridge device. | 05-22-2014 |
20140140244 | SYSTEM AND METHOD FOR OPTIMIZING WITHIN SUBNET COMMUNICATION IN A NETWORK ENVIRONMENT - A method for optimizing within subnet communication in a network environment is provided and includes receiving, at a Top-Of-Rack (ToR) switch, an advertisement from an attached host belonging to a subnet of a network environment, seeking a Media Access Control (MAC) address of a remote host in the subnet, looking up a host information database in a control plane of the ToR switch, and responding to the advertisement with the MAC address of the remote host. If the MAC address is not found, the ToR switch may not respond to the advertisement. The method can further include receiving, at the ToR switch from a remote ToR switch in the subnet, a host information of the remote host in the subnet, including an IP address and the MAC address of the remote host, the Layer 2 broadcast domain it belongs to, and storing the host information in the host information database. | 05-22-2014 |
20140146709 | METHODS AND SYSTEMS FOR NETWORK CONFIGURATION - Network and device configuration systems and methods are described. In an embodiment, a first user interface configured to receive from a user configuration information regarding a first network provided. Program code stored in computer accessible memory is configured to generate a barcode that includes information related to the first network configuration information, wherein the barcode can be scanned by a device having a barcode scanner and a network interface to configure the network interface to access the first network. | 05-29-2014 |
20140146710 | Trill Network Communications Across an IP Network - A method, system and device of Transparent Interconnection of Lots of Links (TRILL) network communications across an Internet Protocol (IP) network are provided. The method includes: DC1 and DC2 which are respectively a local and remote Data Center (DC) networks connected with each other via the IP network; DC1 and DC2 are respectively deployed with a TRILL network; a first DCI device (S1, S2) is an RBridge located in core layer of TRILL network in DC1; a first access layer device (S10, S11, S20) is any RBridge located in access layer of TRILL network in DC1; a second DCI device (S1, S2) is an RBridge located in core layer of TRILL network of DC2; a second access layer device (S30, S31, S40) is an RBridge located in access layer of TRILL network in DC2; generating, by the first DCI device (S1, S2), a nickname forwarding table by learning routes to RBridges in local and remote TRILL networks, after receiving a packet destined for DC2 or sent by DC2, forwarding, by the first DCI device (S1, S2), the packet according to the nickname forwarding table. | 05-29-2014 |
20140153441 | NETWORK SWITCH AND METHOD FOR AUTOMATICALLY ESTABLISHING CONNECTION TO A WIDE AREA NETWORK - A network switch is configured to automatically establish a connection to a WAN by determining which of a plurality of ports of the network switch is a current uplink port leading to the WAN. The switch attempts to establish connectivity to the WAN using a first set of port configurations as the current set of port configurations. Upon determining that the first set of port configurations does not allow the network switch to determine an uplink port, the network switch changes to a mode having a first security measure and also having a relaxed set of current port configurations. The network switch again attempts to establish connectivity to the WAN, and upon further failures to determine an uplink port leading to the WAN, the network switch may be configured to switch to other modes utilizing further relaxed port configurations and the same or additional security measures. | 06-05-2014 |
20140153442 | Method, Device, and System for Packet Processing - The present disclosure provides a method, a device, and a system for packet processing, where the method includes: receiving a protocol packet from a downstream device, where the protocol packet carries uplink port information of the downstream device and the user VLAN of the downstream device; learning port types of the present device based on the uplink port information and classifying the user VLAN of the present device and the user VLAN of the downstream device based on the user VLAN of the downstream device; and forwarding the received packet based on configuration information stored on the present device, where the port type or types to which each VLAN type can be added are specified in the configuration information. | 06-05-2014 |
20140160987 | Enhanced Upstream Label Assignment (ULA) Mechanism For Point To Multi-Point (P2MP) and/or Multi-Point To Multi-Point (MP2MP) Facility Protection - A computer program product comprising computer executable instructions stored on a non-transitory medium of an upstream node in a network system comprising a plurality of nodes that when executed by a processor cause the node to advertise an upstream assigned label to a downstream node, receive a message from the downstream node, and if the received message confirms that no conflict with the upstream assigned label exists at the downstream node, assign the upstream-assigned label, or if the received message confirms that a conflict with the upstream-assigned label exists at the downstream node, either select a new upstream-assigned label or wait until indication is received that the label resource has become available. | 06-12-2014 |
20140160988 | VIRTUAL CLUSTER SWITCHING - One embodiment of the present invention provides a switch system. The switch includes one or more ports on the switch configured to transmit packets encapsulated based on a first protocol. The switch further includes a control mechanism. During operation, the control mechanism forms a logical switch based on a second protocol, receives an automatically assigned identifier for the logical switch without requiring manual configuration of the identifier, and joins a virtual cluster switch. | 06-12-2014 |
20140169221 | METHODS AND DEVICES FOR REPLACING AND CONFIGURING A ROUTER IN A NETWORK - A method of replacing a first router with a second router within a network may comprise placing the second router in client mode within the network such that the second router is not configured to route network traffic and is configured to search for a network access point provided by the first router. A protocol may then be invoked on the first and second routers, the protocol being configured to enable an exchange of the network name and password information from the first router to the second router in client mode. The second router, in client mode, may be configured according to the obtained network name and password information. The second router may then be switched from client mode back to router mode and enabled to route network traffic on the network. The first router may then be replaced with the second router. | 06-19-2014 |
20140169222 | BRIDGING NETWORK DEVICES IN A HYBRID COMMUNICATION NETWORK - A hybrid bridge can implement functionality for selectively populating its bridge tables based on preferred transmission routes to influence other network devices to transmit frames based on the preferred transmission routes. The hybrid bridge determines a preferred transmission route for communicating with each network device in the hybrid communication network. For each of the network devices, it is determined whether the hybrid bridge is part of the preferred transmission route associated with the network device. Depending on whether the hybrid bridge is part of the preferred transmission route to the network device and/or whether a network interface of the hybrid bridge is a transmit or a receive interface on the preferred transmission route, a local bridge table or a remote bridge table of the network interface can be populated with at least the address of a destination network device. | 06-19-2014 |
20140177472 | METHODS AND APPARTUS FOR TRANSMITTING DATA BETWEEN DIFFERENT PEER-TO-PEER COMMUNICATION GROUPS - Methods and apparatus for transmitting data between different peer-to-peer communication groups are disclosed. A wireless device determines if it is simultaneously connected to a plurality of peer-to-peer communication groups and instantiates a bridge interface at the wireless device (e.g., TRILL RBridge) for communications between each peer-to-peer communication group. The wireless device also determines if it is simultaneously connected to at least one peer-to-peer communication device and an access point. In such an instance, the wireless device determines if the access point also includes a bridge interface. If the access point does not include a bridge interface, the wireless device instantiates/runs the bridge interface at the wireless device for communications between the at least one peer-to-peer communication device and the access point. If the access point does include a bridge interface, the wireless device causes the bridge interface at the access point to be instantiated for communications between the at least one peer-to-peer communication device and the access point. | 06-26-2014 |
20140177473 | HIERARCHICAL ASYMMETRIC MESH WITH VIRTUAL ROUTERS - A network-on-chip configuration includes a first plurality of cores arranged in a two-dimensional mesh; a first plurality of routers, each of the first plurality of routers associated with a corresponding local one of the first plurality of cores, each of the first plurality of routers having a plurality of directional ports configured to provide connections to other ones of the first plurality of routers; a second plurality of cores disposed around a periphery of the two-dimensional mesh arrangement; and a second plurality of routers, each of the second plurality of routers associated with a corresponding local one of the second plurality of cores, and having a directional port configured to provide a connection to a neighboring one of the first plurality of routers. | 06-26-2014 |
20140177474 | METADATA-DRIVEN SWITCH NETWORK CONTROL - Disclosed are systems and methods to automatically and continuously control a switch network using a metadata-driven switch apparatus. In particular, a switch apparatus, comprised of multiple server-grade processors and co-processors coupled with a switch silicon, has a metadata-driven control program running on the switch apparatus to monitor and control the switch apparatus itself and the network traffic running through the switch apparatus. Furthermore, the switch apparatus and metadata-driven control program monitors the network state (health, behavior, and performance) of the entire switch network and receives feedback from the network to improve switch and network controls. The switch network may be composed of one metadata-driven switch apparatus coupled with one or more other metadata-driven switch apparatuses and may also be composed of one metadata-driven switch apparatus coupled with one or more foreign switch apparatuses. | 06-26-2014 |
20140177475 | Method and Device for Managing MAC Address Entry in Trill Network - A method for managing a MAC address entry in a TRILL network is disclosed. A first routing bridge obtains a TCN message through a switch connected to the first routing bridge. The first routing bridge clears a MAC address entry of the first routing bridge taking the first routing bridge as an egress bridge and sends a LSP packet to a second routing bridge in the TRILL network, so as to enable the second routing bridge to clear a MAC address entry of the second routing bridge taking the first routing bridge as the egress bridge. The second routing bridge and the first routing bridge are located in the same VLAN. | 06-26-2014 |
20140177476 | Network Capacity Management System and Method - A network capacity management system and method are disclosed. The system ( | 06-26-2014 |
20140185488 | Methods for Dynamic Service Deployment for Virtual/Physical Multiple Device Integration - A method implemented in an integrated edge node for performing routing functions and network appliance services at the edge of a network, the method comprising disassociating a first network feature from a port, creating a plurality of first internal virtual ports, associating the plurality of first internal virtual ports to a first network appliance service component and a core unit component, mapping the plurality first internal virtual ports to each other and to a plurality of ports, constructing an internal path comprising at least one port, a subset of the plurality of internal virtual ports, the network appliance service component, and the core unit component, and associating the first network feature to the internal path. | 07-03-2014 |
20140192683 | METHOD AND A CONTROLLER SYSTEM FOR CONFIGURING A SOFTWARE-DEFINED NETWORK - A method for configuring a network element of a software-defined network “SDN” includes retrieving ( | 07-10-2014 |
20140198686 | MANAGEMENT OF DISTRIBUTED NETWORK SWITCHING CLUSTER - Management of a network may be provided by moving management functions from each switch in a network cluster into a locally controlled server. The management functions may be organized into an Ethernet distributed fabric switching protocol (E-DFP) based management plane. Control functions of each switch may also be organized into a control plane. The management plane and control plane of the network may be moved from each switch and integrated into the server. Efficiency in network switching may be provided by releasing the switches of their management and control responsibilities and centralizing these responsibilities to the server. In some embodiments, the server may be outside the cluster. | 07-17-2014 |
20140204802 | DISTRIBUTED CLIENT STEERING ALGORITHM TO A BEST-SERVING ACCESS POINT - Network devices are steered to preferred access points using a probability function. A probe request for connection is received from a network device. The probe request can be from a network device attempting to use a wireless network (e.g., a IEEE 802.11-type network or other suitable type of network). A probability function that defines a likelihood of granting the network device a connection is used to determine whether to accept or deny the response. The probe response is then sent to the network device. | 07-24-2014 |
20140204803 | AUTOMATED NETWORK SERVICE DISCOVERY AND COMMUNICATION - A network switch includes a service registration database and a service discovery engine that is coupled to the service registration database. The service discovery engine receives a first service registration over a network from a first service included on a first service device and, in response, stores the first service registration in the service registration database. The service discovery engine then receives a multicast service discovery message over the network from a target device. The service discovery message includes a service identification. The service discovery engine then determines that the service identification is associated with the first service registration stored in the service registration database and, in response, sends a unicast service communication message over the network to the target device. The service communication message includes communication information for the first service. The service registration database may store a plurality of different service registrations for respective different services. | 07-24-2014 |
20140204804 | Method For The Exchange Of Data Between Nodes Of A Server Cluster, And Server Cluster Implementing Said Method - A method for the exchange of data between nodes of a server cluster comprising a plurality of nodes interconnected together by a geographic interconnection network comprising a plurality of transmission segments linking the nodes together, including sending by a sending node, data intended for at least one other node, or receiving node, transmitting the data using the geographic interconnection network, receiving the data by each receive node, supplying the data to each receiving node with information relating to the transmission segments of the geographic interconnection network traversed between the sending node and this receiving node on the transmission thereof. | 07-24-2014 |
20140211661 | Automatic Discovery of Multiple Controllers in Software Defined Networks (SDNs) - Controllers in a Software Defined Network (SDN) automatically discover and authenticate each other as part of the control plane operations, without any need for manual configuration of other controllers. The new capability of such controllers is based on Controller-Advertisement messages transferred between controllers in the same or different SDNs. In doing so, multiple controllers can be used for load sharing, improved reliability under failure of a controller by enabling seamless take over and recovery. Moreover, controllers can cooperate to enable end-to-end services to work across multiple SDNs. Controller-Advertisement messages are also used to check the health statuses of discovered controllers in the same or different SDNs. | 07-31-2014 |
20140211662 | Network Topologies for Energy Efficient Networks - One embodiment identifies all one-hop neighbor nodes and two-hop neighbor nodes of a node; determines an active set of one-hop neighbor nodes for the node, comprising: includes in the active set each one-hop neighbor node that is either an edge node or connected with at least one two-hop neighbor node with which no other one-hop neighbor nodes are connected; and if the active set is not yet complete, then: determine all combinations of one-hop neighbor nodes that are not already in the active set; and tests each combination in order of each combination's total-energy value to determine whether a specific combination is able to complete the active set; if no combination is able to complete the active set, then including all one-hop neighbor nodes in the active set; and communicates a message to each one-hop neighbor node in the active set indicating that it is in the active set. | 07-31-2014 |
20140233429 | METHOD AND SYSTEM OF ENHANCING MULTIPLE MAC REGISTRATION PROTOCOL (MMRP) FOR PROTOCOL INTERNETWORKING - A method is disclosed to forward Ethernet frames associated with a service instance at a node (a “forwarding node”) in a network supporting an implementation of a protocol for creating logical loop-free topologies. The method starts with receiving a number of MMRPDUs at the forwarding node from links in the first network (receiving links), where each MMRPDU of the first plurality of MMRPDUs contains a first interested node list including one or more interested nodes identified by MAC addresses. Then a service instance identifier (SID) is identified for the service instance and a first set of MAC addresses interested in the service instance is formed. Then a number of MMRPDUs are sent to links associated with the service instance, where each MMRPDU contains a second set of MAC addresses interested in the service instance. The sending may be accompanied by the node installing filtering at the forwarding node accordingly. | 08-21-2014 |
20140241211 | MIMO-OFDM SYSTEM FOR ROBUST AND EFFICIENT NEUROMORPHIC INTER-DEVICE COMMUNICATION - A Multiple Input Multiple Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) system for inter-device communication is described. Information data from each neuromorphic chip is coded and modulated, on the basis of destination, into different channels. The parallel signals in different channels are sent serially using TDM to a central router. After signal grouping by a central switching controller, each group of signals may be delivered to corresponding transmitter in the central router for transmission to a corresponding receiver in the neuromorphic chip using TDM. | 08-28-2014 |
20140241212 | SYSTEM AND METHOD FOR STORAGE AND RETRIEVAL OF NEIGHBORING SWITCH TOKENS - A system and method for storage and retrieval of neighboring switch tokens includes a switch including one or more processors, memory storing a first token, and a first port configured to couple the switch to a second switch. The one or more processors are configured to send a first token storage request to the second switch, send a first token retrieval request to the second switch requesting the information associated with the first token, and receive a first retrieved token message from the second switch. The first token storage request includes information associated with the first token. The first retrieved token message includes first information associated with the first token. | 08-28-2014 |
20140247752 | NODE QUERY IN AD HOC HOME MESH NETWORK - An embodiment is a technique to collect network and device information. A request for local information is responded to. The request is sent by a remote node in an ad hoc home mesh network. A first node listed in a local route table is queried for node information of the first node. Querying is expanded to a second node in the ad hoc home mesh network using the node information. The second node is a neighbor of the first node. | 09-04-2014 |
20140247753 | USING TRANSACTIONS TO COMPUTE AND PROPAGATE NETWORK FORWARDING STATE - For a controller for managing a network comprising several managed forwarding elements that forward data in the network, a method for configuring a managed forwarding element is described. The method generates a first set of flow entries for defining forwarding behaviors of the managed forwarding element based on a current network policy for a logical network implemented in the several managed forwarding elements. The method sends the first set of flow entries to the managed forwarding element in order for the managed forwarding element to forward data that the managed forwarding element directly receives from an end machine based on the current network policy. The method generates a second set of flow entries for modifying forwarding behaviors of the managed forwarding element based on a new network policy for the logical network. The method sends the second set of flow entries to the managed forwarding element in order for the managed forwarding element to forward the data based on the new network policy. | 09-04-2014 |
20140254431 | Advanced TDM Daisy-Chain Communication Systems and Devices - Advanced TDM daisy-chain configurations utilize data transmission over a frame sync signal path with feedback to allow for communication between the master device and slave devices and/or between individual slave devices while maintaining a simple TDM communication interface. In certain daisy-chain configurations, the feedback path returns to the frame sync signal path between the master device and the first slave device, which allows for transmission of data from the last slave device to the master device and/or to the first slave device. In other daisy-chain configurations, the feedback path returns to the frame sync signal path between the first slave device and the second slave device, which allows for transmission of data from the last slave device to the first slave device (which may transfer data to the master device, e.g., over separate command and/or data lines) and/or to the first slave device. | 09-11-2014 |
20140254432 | SYSTEM AND METHOD FOR AUTOMATIC PROVISIONING OF STACKED SWITCHES - A system and method for automatic provisioning of stacked switches includes entering a client state, setting one or more ports of the switch to normal mode, sending a first provisioning discover request on the one or more ports, receiving a first provisioning offer on a first port selected from the one or more ports, detecting whether the first provisioning offer is a full offer or a partial offer, entering a server state when the first provisioning offer is a full offer, entering a relay state when the first provisioning offer is a partial, and provisioning the switch based on information associated with the first provisioning offer. | 09-11-2014 |
20140269432 | vPC AUTO CONFIGURATION - Techniques for configuring a virtual network device are provided. Embodiments identify a network device profile specifying a virtual link teaming domain. Upon receiving a network message advertising the virtual link teaming domain from a peer network device of the two or more network devices, on a plurality of links of the first network device, the plurality of links are teamed, based on the virtual link teaming domain, to create a first link bundle. Embodiments advertise a virtual link teaming identifier to a neighboring network device of the first network device. Here, the neighboring network device is configured to use the virtual link teaming identifier to bundle links between the neighboring network device and the virtual network device. | 09-18-2014 |
20140269433 | Failure Notification in a Network having Serially Connected Nodes - Multicast capabilities of a link state protocol controlled network are used to accelerate the flooding advertisement of topology change notifications within portions of the network. This flooding mechanism may be particularly efficient in a network with a large number of two-connected nodes such as a ring network architecture. A control plane specific multicast group address is used when flooding topology change notifications, and a process such as reverse path forwarding check is used as an additional control on forwarding of the notification to prevent looping of control plane packets. Two-connected nodes insert a forwarding entry into their FIB to enable frames containing the control message to be forwarded via the data plane on to the downstream node so that propagation of the control message along a chain of two-connected nodes may occur at data plane speeds. | 09-18-2014 |
20140301245 | DISTRIBUTED METHOD FOR SELECTING A CONFIGURATION IN MOBILE NETWORKS - A method for determining the configuration of a set of nodes and/or links of a cluster possessing a cluster head comprises: triggering an information request by interrogating one or more nodes or links and asking the said nodes or the said links to evaluate for each communication channel an index of communication quality, and then selecting a configuration when the cluster head has received the indices of communication quality; verifying whether the indices of quality received comply with a given constraint, retaining the indices which satisfy the largest number of nodes or links, and triggering a configuration selection procedure; if the configuration retained satisfies the set of nodes or links interrogated, then updating the list of channels and communicating this configuration to the nodes or links of the cluster; if not, updating the list of communication channels, or remaining in the initial configuration of the set of nodes or links. | 10-09-2014 |
20140307587 | Wireless Communication Management System and Method - A system and method is provided for managing communication of data by a wireless networking device in a zone. The zone may be analyzed to determine compliance with a performance threshold. Conditions such as interference affecting the communication of data may be detected and analyzed to determine a solution. The system may control one or more wireless networking device, which may be heterogeneous, to apply the solution. | 10-16-2014 |
20140313937 | IDENTIFICATION OF PATHS IN A NETWORK OF MIXED ROUTING/SWITCHING DEVICES - The invention relates to a computer implemented method of identifying a next hop from a focus device in a path of interconnected devices including switching and routing devices, wherein a switching device operates according to a switching address protocol and a routing device operates according to a routing address protocol, the method implemented at a management computer having a query path to the interconnected devices and comprising: for a focus device which is configured to receive traffic addressed to a terminal destination and to act as a routing device for the traffic, dispatching a query message containing a query key based on a destination identifier for the terminal destination from the management computer to the focus device to identify the next routing address for traffic addressed to the terminal destination; receiving a result message containing a new routing address which is the next routing address; and ascertaining from the new routing address the corresponding switching address which is the switching address for switching traffic at a switching device in a direction to the terminal destination, wherein the switching address is usable in a query key for a query directed to a focus device which is a switching device. | 10-23-2014 |
20140313938 | PACKET DATA UNIT (PDU) STRUCTURE FOR SUPPORTING DISTRIBUTED RELAY CONTROL PROTOCOL (DRCP) - A method supporting distributed resilient network interconnect (DRNI) in a link aggregation group at a network device is disclosed. The method starts with encapsulating a distributed relay control protocol data unit (DRCPDU) in a frame, wherein the DRCPDU includes a protocol data unit (PDU) structure. The PDU structure includes a type field indicating that the DRCPDU is for DRCP, a version field indicating a version number of the DRCP, and a set of type/length/values (TLVs) including: a terminator TLV indicating an end of the PDU structure, a portal information TLV indicating characteristics of the first portal, a portal configuration information TLV indicating configuration information of the first portal, a DRCP state TLV indicating variables associated with an intra-portal link (IPP), a home ports information TLV and a neighbor ports information TLV. The method continues with transmitting the frame encapsulating the DRCPDU from the network device to a neighbor network device. | 10-23-2014 |
20140313939 | METHOD AND SYSTEM FOR SYNCHRONIZING WITH NEIGHBOR IN A DISTRIBUTED RESILIENT NETWORK INTERCONNECT (DRNI) LINK AGGREGATION GROUP - A method of supporting a distributed resilient network interconnect (DRNI) at a network device is disclosed. The method starts with initializing the network device for operating distributed resilient control protocol (DRCP) on an intra-portal port (IPP) coupled to a neighbor network device using an intra-port link (IPL). The method continues with the network device checking that DRCP is enabled at the IPP and then enters an expired state. The network device then receives a DRCPDU and determines that the received DRCPDU is associated with the first portal it is assigned to. It determines that the received DRCPDU is compatible with the network device, and records neighbor network device's state information included in the received DRCPDU as state operational variables of the neighbor network device at the network device, wherein the neighbor network device's state information includes DRCP variables for the IPP. | 10-23-2014 |
20140313940 | EXPLORATORY LINKTRACE OPERATIONS IN A COMPUTER NETWORK - In one embodiment, an exploratory linktrace is initiated from an initiating network device with an exploratory linktrace message (ELM) having a target address. Each network device receiving the ELM may then propagate the ELM on a plurality of its ports to a plurality of downstream network devices based on the target address. In addition, each receiving network device returns an exploratory linktrace reply (ELR) for each of the plurality of ports, where each ELR is returned according to one or more mechanisms to mitigate stormed replies to the initiating network device. | 10-23-2014 |
20140328215 | FAST OPPORTUNISTIC DISTRIBUTED RESOURCE REALLOCATION FOR ESTABLISHED CONNECTIONS IN A MULTIHOP NETWORK - A multihop network and nodes are described herein that implement a reactive routing protocol that enables resources of the multihop network to be continuously adapted in a distributed/opportunistic manner in response to a topology change within the multihop network so as to optimize the performance of a connection between a source node and a destination node. The types of resources that can be adapted include for example: (1) a route; (2) a channel; and/or (3) physical layer parameters. The different types of topology changes that can occur include: (1) movement of a node; (2) quality variations in a channel between the source node and the destination node; (3) changes in traffic patterns in the multihop network; (4) changes in transmit patterns (e.g., power, beamforming direction) in the multihop network; and (5) changes in resource allocations in the multihop network. | 11-06-2014 |
20140328216 | Node, mesh communication network and routing reconfiguration method - The invention relates to a module equipping a node of a mesh communication network, identified on said network by a logic number and including an input and/or output port, which is characterized by configuration data for said network, including data corresponding to an adjacency matrix of said network and data corresponding to the logic numbers of the neighboring network nodes of the considered node; and a computation means capable of computing a routing vector from said configuration data, the routing vector being intended to be used by said input and/or output port for message routing. | 11-06-2014 |
20140341079 | CONFIGURATION VALIDATION IN A MIXED NODE TOPOLOGY - Techniques for validating configuration changes in a mixed node topology are provided. In one embodiment, a device can identify a link to be removed from a topology comprising a plurality of nodes, where the plurality of nodes includes one or more nodes of a first type and one or more nodes of a second type. The device can then determine whether the removal of the link from the topology would require data traffic between two nodes of the first type to pass through a node of the second type. | 11-20-2014 |
20140348027 | PROPAGATING LDP MAC FLUSH AS TCN - A first provider edge (PE) device is configured to: receive a Label Distribution Protocol (LDP) MAC Flush message from a PE device via an input port; flush a routing table in response to the LDP MAC Flush message; determine whether the LDP MAC Flush message comprises a PE identifier corresponding to the PE device; generate a Topology Change Notification (TCN) message based on the LDP MAC Flush message when the LDP MAC Flush message comprises the PE identifier corresponding to the PE device; and output the TCN message. | 11-27-2014 |
20140355484 | Self-Organising Network - A method for optimising a self organising network comprising a plurality of cells. The method comprises monitoring performance measurement data indicative of performance of one or more cells in a group of cells in the network, and monitoring trace data indicative of traffic statistics within the cells of the group. The method comprises generating, from the performance management data and the trace data, a plurality of key performance indicators each indicative of performance of an aspect of a cell in the group, and processing the key performance indicators so as to generate a hotspot value indicative of general performance of the cell in the group. The method comprises comparing the hotspot value with a threshold hotspot value, and if the hotspot value is greater than the threshold hotspot value, processing attribute data from the cells in the group so as to generate cause data indicative of a cause associated with the hotspot value exceeding the hotspot threshold value. The method also comprises generating, from the cause data, recommendation data for modifying an attribute of the network, and modifying the attribute of the network based on the recommendation data. | 12-04-2014 |
20140362737 | STATE INFORMATION AND ROUTING TABLE UPDATES IN LARGE SCALE DATA NETWORKS - In a communication network comprising nodes and links between the nodes, a controller node disseminates link state information. A nodal routing table exists at each node comprising routes between pairs of nodes. The nodal routing table is either populated by the given node based on network information received from the controlling node or populated at the controlling node and received by the given node. Each node receives heartbeat signals from its neighbouring nodes. An unexpected delay between heartbeat signals may be perceived as a failure of a link. The perceived failure of that link is reported by the perceiving node to the controlling node. Upon receiving link failure information from a node, the controlling node may determine a subset of nodes in the network influenced by the link failure and indicate the link failure to the determined subset of influenced nodes. | 12-11-2014 |
20140369238 | SYSTEM AND METHOD FOR IDENTIFYING AN INGRESS ROUTER OF A FLOW WHEN NO IP ADDRESS IS ASSOCIATED WITH THE INTERFACE FROM WHICH THE FLOW WAS RECEIVED - A system and method collects information for VPN traffic from non edge routers that are coupled to edge routers and identifies the path the traffic took and the 5 customer corresponding to the VPN. The system and method also identifies the ingress router coupled to the non edge router from which the traffic was collected. The system and method may assign identifiers to-route targets. | 12-18-2014 |
20140369239 | NETWORK CONFIGURATION FOR DEVICES WITH CONSTRAINED RESOURCES - A method includes receiving a wireless beacon from an ad hoc network at a wireless device, wherein the wireless beacon includes a data structure that encodes at least a portion of a wireless identifier of an access point. The method includes configuring the wireless device from the data structure received from the wireless beacon. The method also includes establishing a wireless network between the access point and the wireless device utilizing at least a portion of the wireless identifier encoded in the data structure. | 12-18-2014 |
20140376408 | mDNS SUPPORT IN UNIFIED ACCESS NETWORKS - Methods, systems and computer readable media for mDNS support in unified access networks are described. | 12-25-2014 |
20140376409 | ROUTING METHOD AND APPARATUS - In an ID-based communication system, a routing apparatus creates a hierarchical network topology by using link state information on higher-level domains, lower-level domains, and peer domains. The routing apparatus then makes a routing table based on the hierarchical network topology, and performs routing by using the routing table. | 12-25-2014 |
20150016306 | Autonomous Transport Layer Connection Setup by a Transport Layer Concentrator - The present disclosure concerns wireless communication. More particularly, a method and an apparatus (e.g. a SCTP concentrator) for setting up transport layer connections (e.g. SCTP associations) between a eNB and a (H)eNB are disclosed. | 01-15-2015 |
20150023216 | Distributing Information - Method and communication system for distributing information relating to a set of networks from a first node to a second node of the communication system, wherein a set of identifiers of respective networks which belong to the set of networks is stored at the first node. Hash values are generated at the first node for the identifiers in the set of identifiers using a hash function. The generated hash values are transmitted from the first node to the second node. The second node determines an identifier of a particular network which is available for communicating with the second node. The second node generates a hash value for the identifier of the particular network using the hash function. The second node then compares the hash value of the identifier of the particular network generated at the second node with the hash values received at the second node from the first node to thereby determine whether the particular network belongs to said set of networks. | 01-22-2015 |
20150036544 | MULTIPLE RING IDENTIFICATION AND CONFIGURATION PROTOCOL - A protocol identifies and configures rings in a network topology automatically in order to simplify and quicken the actions that need to be performed in response to addition, deletion and shuffle of network nodes in that topology. Such rings do not need to be identified and configured manually. The protocol involves two separate sequentially performed phases. In the first phase, the protocol can automatically identify all rings that are present within a Virtual Local Area Network (VLAN) topology. In the second phase, the protocol can automatically configure each node of each such ring in conformity with the Ethernet Ring Protection (ERP) protocol. After this ERP configuration has been performed, the failure of a link within the network will not require every network node to re-learn paths through the network; instead, the nodes that are required to re-learn such paths can be limited to those within the particular ring that contained the failed link. | 02-05-2015 |
20150043384 | MULTIPLE TOPOLOGY ROUTING ARCHITECTURE IN COMPUTER NETWORKS - In a multiple interface, low power and lossy network comprising a plurality of nodes, a low transmission power and medium transmission power topology are defined for the network and a channel-hopping schedule is defined for the devices operating in each topology. A sender determines that data is capable of being transmitted via a link on the low transmission power topology. The sender determines the transmission parameters for the transmission of the data over the link on the low transmission power topology and determines a low transmission power channel for transmission of the data. The sender transmits the determined channel and the transmission parameters to the receiver. The sender transmits the data via the determined channel in the low transmission power topology. | 02-12-2015 |
20150043385 | COMMUNICATION METHOD AND APPARATUS FOR DEVICE-TO-DEVICE (D2D) - Provided are a communication method and apparatus for device-to-device (D2D). More particularly, the communication method for D2D includes configuring a network topology using at least one cooperating base station to communicate among devices included in multiple heterogeneous cells, creating an association between multiple device pairs and at least one base station based on configuring the network topology, and determining a cooperation context for communication among the multiple device pairs is provided. The communication apparatus carries out such a method. | 02-12-2015 |
20150043386 | Self-Organizing Network Function Interaction - A set of reporting features are specified for implementation by lower-level Self-Optimizing Network (SON) functions to support the observation of network SON algorithms by high-level SON functions (e.g., OAM functions). The lower-level SON functions may be operative to adjust local parameters related to the network element serving area and/or capacity. The reported SON algorithm events and measurements can be defined such that they can be used by the higher-level SON function to resolve conflicts and control the lower-level SON functions. Some embodiments specify SON function reporting features and their configuration in the framework of the 3GPP defined Itf-N interface specification. | 02-12-2015 |
20150049643 | METHOD AND APPARATUS FOR PROVIDING DEFAULT SERVICES TO PROSPECTIVE SUBSCRIBERS IN A COMMUNICATION NETWORK - In one embodiment, a subscriber services controller comprises at least one processing device having a processor coupled to a memory. The subscriber services controller is configured to associate at least one default profile with an access node of a communication network, to detect an access attempt by a prospective subscriber via the access node, and responsive to the detected access attempt, to provide default services to the prospective subscriber via the access node in accordance with the default profile. The default profile may be provided to a broadband service aggregator associated with the access node in a set of authorization parameters. As a more particular example, the set of authorization parameters may be sent to the broadband service aggregator in a RADIUS-ACCESS-ACCEPT message from a RADIUS server, responsive to a successful authentication process performed in the RADIUS server. | 02-19-2015 |
20150071118 | NETWORK COORDINATION APPARATUS - A method comprising determining at least one event criteria from a received event function request; determining an event impact from the at least one event criteria and a general function impact; determining whether the event impact interferes with at least one implemented function instance; and generating a coordination output based on the determination whether the event impact interferes. | 03-12-2015 |
20150071119 | Technique for Explicit Path Control - A technique for explicit path control for traffic forwarding in a network comprising multiple nodes is described. A device embodiment comprises a path computation element that is configured to receive, from an edge node, control protocol data units of a control protocol. The path computation element is further configured to determine an explicit path from information contained in the received control protocol data units and to instruct the edge nodes to perform an action to have the explicit path installed in the network. | 03-12-2015 |
20150071120 | METHOD AND APPARATUS FOR IMPROVING NETWORK PERFORMANCE - A method for improving performance of a network includes identifying at least two communities of users within the network, analysing a structure of each community and clustering the communities according to community performance. The method further includes comparing a structure of a lower performing community with a structure of a higher performing community, and changing the structure of the lower performing community substantially to resemble the structure of the higher performing community. Related computer program product for carrying out a method of introducing connections among users of a network and an apparatus configured to introduce connections among users in a network are disclosed. | 03-12-2015 |
20150071121 | SYSTEMS AND METHODS FOR CONCURRENT SERVICE DISCOVERY AND MINIMUM SPANNING TREE FORMATION FOR SERVICE DELIVERY - Systems, methods, and devices for wireless service delivery are described herein. In some aspects, a method for wireless service deliver may include transmitting, by a first wireless node, and receiving, from each of a plurality of wireless nodes, a service discovery message for a service. The method may further include selecting one of the plurality of wireless nodes based on a link quality metric associated with each of the plurality of wireless nodes. The method may additionally include establishing a communication pathway to a provider of the service through a link to the selected wireless node. | 03-12-2015 |
20150071122 | TRANSPARENT INTECONNECTION OF ETHERNET FABRIC SWITCHES - One embodiment of the present invention provides a switch. The switch includes a fabric switch module and a border module. The fabric switch module maintains a membership in a first fabric switch. The fabric switch includes a plurality of switches and operates as a single logical switch. The border module determines that the egress switch identifier in a first encapsulation header of a first packet is associated with a switch outside of the fabric switch. The first packet is forwardable in the first fabric switch based on the first encapsulation header. In response to the determination, the border module changes the ingress switch identifier in the first encapsulation header of the first packet to a first virtual switch identifier associated with a first virtual switch. This first virtual switch externally represents the first fabric switch. | 03-12-2015 |
20150071123 | INTEGRATING SOFTWARE DEFINED STORAGE AND SOFTWARE DEFINED NETWORKING - A coordination task to interface with VM, SDS and SDN environments to guarantee that the overall QoS of the combined SDN and SDS meet desired levels. The coordination task performs this coordination when virtual targets are originally developed, when the virtual targets are modified and when the accessing servers are reconfigured, such as when a VM moves. | 03-12-2015 |
20150078204 | DOMINATING SET IDENTIFICATION FOR PATH COMPUTATION BASED ON DIRECTED ACYCLIC GRAPH MEMBERSHIP - In one embodiment, a method comprises a path computation device receiving device information from member network devices, each member network device belonging to a directed acyclic graph to a destination in a low power lossy network; and the path computation device classifying each member network device belonging to a directed acyclic graph as belonging to a dominating set, for generation of optimized routes distinct from any directed acyclic graph, for reaching any one of the member network devices of the dominating set. | 03-19-2015 |
20150078205 | Self-Organising Method for Establishing Deterministic Routes in a Large Computer Network - The invention relates to a method for establishing deterministic communication routes in a large computer network, wherein all affected end systems and switches of the computer network have a global time and a deterministic communication route is generated on the basis of an existing communication route between two or more end systems of the computer network in that a time-triggered connection manager (TTCM) of an end system
| 03-19-2015 |
20150078206 | METHOD FOR ACQUIRING INFORMATION, USER EQUIPMENT, AND NETWORK EQUIPMENT - A method for acquiring information includes: receiving an Internet Protocol (IP) address acquisition request or Packet Data Network (PDN) address allocation information sent by User Equipment (UE); determining a PDN address capability according to the IP address acquisition request or the PDN address allocation information; and sending the determined PDN address capability to the UE. An UE and network equipment are also provided. The PDN address capability is determined by the network and is sent to the UE, so as to indicate to the UE the IP address information that may be acquired in a current PDN connection, such that when the network cannot provide an IP address for the UE any more, the UE is prevented from acquiring other IP addresses in other manners, avoiding service abnormality. | 03-19-2015 |
20150078207 | MICROWAVE BACKHAUL ARRANGEMENTS - Described herein are techniques related to wireless communication systems that may implement microwave backhaul for connectivity between network elements deployed by the wireless communication systems. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. | 03-19-2015 |
20150085704 | VIRTUAL STACKING OF SWITCHES - A first processor assigns switches and/or switch ports to a virtual stack according to configuration information and stores the virtual topography of the virtual stack in a mapping table. The mapping table correlates switches, switch ports, computer processors, and virtual stacks. The first processor receives a data unit from a first switch that includes a source address and a destination address. The destination address identifies a switch and switch port. The first processor compares the destination address to the mapping table to determine a second computer processor and sends the data unit to the second computer processor, the second computer processor corresponding to a switch and/or switch port identified in the destination address of the data unit. | 03-26-2015 |
20150085705 | RELIABLE STATUS DELIVERY AND REQUEST MECHANISM FOR STATIC PSEUDOWIRES - Various exemplary embodiments relate to a method for determining peer status in a pseudowire (PW) node, the method including: sending a first PW status request message to a peer node including a PW node local message ID, PW node remote message ID, and request flag; starting a first retry timer; starting a second retry timer when the first retry timer expires and no response to the first PW status request message is received; starting a first request timer when the second retry timer expires and no response to the first PW status request message is received; and starting a third retry timer when the first request timer expires and no response to the first PW status request message is received. | 03-26-2015 |
20150092606 | Efficient Network Data Dissemination - A method of efficiently disseminating various types of information throughout a mesh network is disclosed. Information is typically propagated through the network using a variety of protocols and messages. However, in one embodiment, a single message, communicates all of this information at once. The message includes data originating at the leader, which does not change as the messages are propagated through the network, as well as topology and link information that is created by the forwarding nodes. The data originating at the leader includes the identity of the leader node and a sequence number. Additionally, a version number is included by the leader which represents the state of the quasi-static information. Quasi-static information may include, for example, the identity of a node that has access to a central control system or the internet. This compact message format allows improved efficiency and use of the network. | 04-02-2015 |
20150092607 | Communication Apparatus - A communication apparatus may form a first wireless network so as to establish a wireless connection with a first external apparatus, in a case where a first wireless connection request is obtained from the first external apparatus and it is determined that a connection number has not reached an upper limit. The communication apparatus may newly form a second wireless network while maintaining a state of the first wireless network being formed, so as to establish a wireless connection with a second external apparatus, in a case where a second wireless connection request is obtained from the second external apparatus in the state of the first wireless network being formed and it is determined that the connection number has not reached the upper limit. In the first and second wireless networks, the communication apparatus may be configured to operate as a parent station. | 04-02-2015 |
20150103698 | SYSTEM AND METHOD FOR TOPOLOGY OPTIMIZATION WITH A PLURALITY OF MATERIALS - A method for producing a design topology is provided. The method includes entering a problem constraint into a computer, wherein the problem constraint includes a domain, a load vector, an objective function, and a plurality of types of materials. The domain is divided into a plurality of elements, wherein individual elements are associated with one type of material such that each of the plurality of types of materials is associated with more than one element. A element variable is calculated for the element, and the computer determines if the calculations are complete. If the calculations are not complete, the step of calculating the element variable for the elements is repeated. If the calculations are complete, the design topology is output. | 04-16-2015 |
20150109964 | Specifying Priority on a Virtual Station Interface Discovery and Configuration Protocol Response - A method implemented by a network component is provided. The method includes receiving a Virtual Station Interface (VSI) Discovery Protocol (VDP) request from an Edge Virtual Bridging (EVB) station and transmitting, to the EVB station, a VDP Response in response to the request. The VDP Response includes a VDP Type-Length-Value (TLV) having a Filter Information field. The Filter Information field is configured to specify a Priority Code Point (PCP) value associated with one or more Virtual Local Area Network (VLAN) Identifier (VID) values carried by the VDP Response. The PCP value is carried in a PCP field and adopted by the EVB station as a default PCP value associated with the VSI and at least one VID. The Filter Information field further contains a PCP Significant (PS) field associated with each PCP field, and wherein the PS field indicates whether the PCP field carries the PCP value. | 04-23-2015 |
20150117261 | USING MULTIPLE TRAFFIC PROFILES TO DESIGN A NETWORK ON CHIP - The present application is directed to designing an efficient Network on Chip (NoC) interconnect architecture that is adaptable to varied interface protocols of different SoC components/hosts and is compliant to handle different types and models of traffic profiles. Aspects of the present application include a method, which may involve utilizing multiple traffic profiles described in a specification to generate a NoC that satisfies all the traffic profiles. Such a NoC interconnect architecture can be formed from multiple traffic profiles by generating a single consolidated traffic profile from individual or subset based dependency graphs of the multiple traffic profiles. | 04-30-2015 |
20150117262 | LINK ADDITION TO A NETWORK OF LINKED NODES - A method of adding a link to a network of linked nodes is provided. Scoring information is received. The scoring information includes a first node identifier, a second node identifier, and a link value. The link value is determined using an analytic model. A first anchored network record for which a first node associated with the first node identifier is an anchor is identified. A first link record is added to the identified first anchored network record using the first node identifier, the second node identifier, and the link value. A first node record associated with the second node identifier is added to the identified first anchored network record. A node record is identified for the first node in the identified anchored network record. A network score value included in the identified node record is computed based on the link value. The identified node record is updated with the computed network score value. | 04-30-2015 |
20150117263 | TECHNIQUES FOR SIMPLIFYING STACKING TRUNK CREATION AND MANAGEMENT - Techniques for simplifying stacking trunk creation and management are provided. In one embodiment, a switch in a stacking system can receive first and second control packets from one or more other switches in the stacking system, where the first and second control packets are received on first and second stacking ports of the switch respectively. The switch can then determine, based on the first and second control packets, whether the first and second stacking ports can be configured as a single stacking trunk. | 04-30-2015 |
20150117264 | MEDIA STREAM PROVIDING DEVICE AND METHOD FOR CONNECTING THERETO, MEDIA STREAMING SYSTEM, AND COMPUTER-READABLE MEDIUM - Disclosed herein, among others, is a media streaming system, comprising a registrar server, a media stream providing device, and a media stream receiving device. The registrar server is configured to register a piece of connection information associated with the media stream providing device, the connection information comprising a local network location, a public network location, a broker location, and a proxy location. The media stream receiving device is configured to obtain the connection information from the registrar server, and to commence measuring simultaneously, based on the aforementioned locations, first, second, third, and fourth costs for connecting to the media stream providing device via a local path, a remote path, a peer-to-peer path, and a proxy-assisted path, respectively. The media stream receiving device then selects one of those paths based on the measured costs. | 04-30-2015 |
20150117265 | System and Method for Topology Transparent Zoning in Network Communications - An Autonomous System domain comprising a topology transparent zone comprising a plurality of topology transparent zone nodes at least some of which are topology transparent zone edge nodes, wherein the topology transparent zone nodes are interconnected with one another via a plurality of internal links, and a plurality of neighboring external nodes connected to the topology transparent zone edge nodes via a plurality of external links, wherein no link state advertisements (LSAs) describing the internal links are distributed to the neighboring external nodes. | 04-30-2015 |
20150124652 | WEIGHTED EQUAL COST MULTIPATH ROUTING - In some implementations, network traffic can be routed along equal cost paths based on weights assigned to each path. For example, weighted equal cost multipath routing can be implemented by assigning weights to each equal cost path (e.g., uplink, next hop node) to a destination device. When the network device receives a packet, the network device can generate a key (e.g., a random value, a hash value based on packet data, a value between 0 and n, etc.). The key can be used to select an uplink or path upon which to forward the packet. A key can be generated for a packet flow or flowlet. Each flow can be associated with the same key so that each packet in a flow will be forwarded along the same path. Each flowlet can be forwarded along a different uplink. | 05-07-2015 |
20150124653 | MANAGING MAPPING IN NETWORKS - A method for managing mapping in a network includes: programming mapping relationships between a VSAN and a VLAN of a fabric in advance, which include mapping relationships between VSANs and VLANs programmed in advance for each FCoE switch needed by the fabric; obtaining mapping relationships between the VSANs and the VLANs configured currently for all the FCoE switches of the fabric, when obtained mapping relationships are inconsistent with the programmed-in-advance mapping relationships, automatically updating mapping relationships between the VSANs and the VLANs configured in FCoE switches corresponding to the inconsistent mapping relationships, and/or mapping relationships between the VSANs and the VLANs programmed in advance for the FCoE switches corresponding to the inconsistent mapping relationships. | 05-07-2015 |
20150131487 | Joint positioning method and device - Disclosed are a joint positioning method and device, and the method includes: a positioning module is enabled after a terminal receives a positioning request; the positioning module determines a primary positioning submodule implementing a primary positioning mode and an auxiliary positioning submodule implementing an auxiliary positioning mode according to a communication scenario or a predetermined setting; implementing respectively positioning by the primary positioning submodule and by the auxiliary positioning submodule, and outputting respective positioning results to a comparison module of the terminal; the comparison module compares the positioning results, selects an optimal positioning result and sends the optimal positioning result and/or positioning results other than the optimal positioning result to the primary positioning submodule; and the primary positioning submodule reports the optimal positioning result and/or positioning results other than the optimal positioning result to a server or the terminal through an interaction module of the terminal. The present disclosure can solve a problem that existing positioning applications have limited methods and poor accuracy can be better solved. | 05-14-2015 |
20150139035 | Dynamic Virtual Port Instantiation for Scalable Multitenant Network - A leaf switch of a switch fabric includes multiple ports to connect with respective ones of multiple servers. Virtual local area networks (VLANs) are configured on the leaf switch. Dynamic creation of virtual ports is enabled on the leaf switch for at least one of the VLANs on an as needed basis. The leaf switch receives from a particular server connected to a corresponding one of the ports a notification message that a virtual machine is hosted on the particular server. Responsive to the notification message, the leaf switch dynamically creates a virtual port that associates the corresponding one of the ports with the at least one of the VLANs. | 05-21-2015 |
20150139036 | METHOD AND SYSTEM FOR AN OVERLAY MANAGEMENT CONTROL NETWORK - Embodiments of the present invention provide a novel solution that enables traditional network management services to be automated without requiring the standard user oversight often required by conventional networking systems. Embodiments of the present invention are operable to utilize in-band communications used by network devices within an existing Layer 2 network to automatically generate a virtualized Layer 2 management network. By using MAC address learning procedures and/or generating a logical convergence state for an existing physical Layer 2 network, embodiments of the present invention can generate a virtual layer 2 network interface that facilitates automatic network connectivity for new and/or existing network devices. As such, embodiments of the present invention can enable communication between various network layers (e.g., Layer 3/Layer 4 networks) that allows network devices to be bootstrapped to an existing network infrastructure in a manner that requires no configuration. | 05-21-2015 |
20150139037 | CONFIGURATION OF TRANSPARENT INTERCONNECTION OF LOTS OF LINKS (TRILL) PROTOCOL ENABLED DEVICE PORTS IN EDGE VIRTUAL BRIDGING (EVB) NETWORKS - Embodiments of the invention relate to automatically configuring a Transparent Interconnection of Lots of Links (TRILL) device port in an edge virtual bridging (EVB) network environment. One embodiment includes sending, by a virtual machine (VM) in an EVB network, a message to a device that implements TRILL protocol. The device communicates with a table using the message. Network information is obtained from the table by the device. A port for the device is automatically configured based on the network information. The device has the TRILL protocol either enabled or disabled. | 05-21-2015 |
20150146573 | APPARATUS AND METHOD FOR LAYER-2 AND LAYER-3 VPN DISCOVERY - An apparatus and a method for layer-2 and layer-3 VPN discovery are disclosed. The apparatus is incorporated in a network, and the network includes a first carrier network. The first carrier network includes at least two layer-1 provider edge devices. Layer-1 VPN information is created within the first carrier network. BGP next hop information passes within the first carrier network. The BGP next hop information is for a selected one of the following: a layer-2 VPN-based provider edge device, a layer-3 VPN-based provider edge device, and a layer-2 and layer-3 VPN-based provider edge device. The network also includes a second carrier network within which the BGP next hop information is used for VPN discovery. | 05-28-2015 |
20150146574 | SYSTEM, METHOD, AND COMPUTER-READABLE MEDIUM FOR DYNAMIC DEVICE DISCOVERY FOR SERVERS BINDING TO MULTIPLE MASTERS - A system that facilitate broadcast of a device discovery beacon by a dynamic physical device wishing to bind to one or more control systems are provided. If the dynamic physical device comprises a server that is configured to bind to multiple master controllers, the dynamic physical device may include a device Type Flag and set the value of the device Type Flag to indicate the dynamic physical device comprises a server. On detection of the beacon, a master controller evaluates the device Type Flag if it is present in the device discovery beacon. If the device Type Flag is present and indicates the dynamic physical device comprise a server which may bind to multiple master controllers, the master controller may automatically load a device Module for the dynamic physical device and commence communications with the dynamic physical device with no manual intervention. | 05-28-2015 |
20150296439 | DISTRIBUTED NEIGBORING CELL ASSISTED NEIGHBOUR DISCOVERY - A system for distributed network-assisted neighbor discovery is operable by a network entity that performs a network discovery action to discover a plurality of neighboring cells to be neighbors of each other. The network entity informs at least one of the plurality of neighboring cells of a neighbor relationship with the plurality of neighboring cells, in response to determining the plurality of neighboring cells to be neighbors of each other. | 10-15-2015 |
20150304164 | Data center auto provisioning - A method and system for auto provisioning a data center network having a plurality of switches interconnected in a folded Clos topology includes each switch advertising information about itself to neighboring switches and locally storing received information. The configuration server queries information stored by one switch and uses a predefined protocol and the information stored by the one switch to query each switch neighboring the one switch about the information stored locally by the each switch neighboring the one switch to generate a database having topology information of the data center network. Configuration settings for each switch in the data center network are generated, with each generated configuration setting corresponding to one switch. The configuration server uses the predefined protocol and the database having topology information of the data center network to send the configuration settings to the corresponding one switch for each switch in the data center network. | 10-22-2015 |
20150304209 | DYNAMIC CONTROL CHANNEL ESTABLISHMENT FOR SOFTWARE-DEFINED NETWORKS HAVING CENTRALIZED CONTROL - Dynamic control channel establishment for an access network is described in which a centralized controller provides seamless end-to-end service from a core-facing edge of a network to access nodes. For example, a method includes receiving, by the centralized controller, a discover message originating from a network node, which includes an intermediate node list that specifies a plurality of network nodes the discover message traversed from the network node to an edge node, determining, based on the plurality of nodes specified by the discover message, a path from the edge node to the network node, allocating each of a plurality of Multi-protocol Label Switching (MPLS) labels to a respective outgoing interface of each of the plurality of network nodes, and outputting one or more control messages for configuring the network node, wherein the control messages are encapsulated within a label stack comprising the allocated plurality of labels. | 10-22-2015 |
20150312094 | Method and Apparatus for Pilot Configuration in a Mobile Communications Network - Method and apparatus for pilot configuration in a mobile communications network There is provided a method of operating a central scheduler node in a mobile communications network when one or more mobile devices are located in the coverage area of a first base station and a second base station, the first base station and the second base station having a shared cell identity, the method comprising determining ( | 10-29-2015 |
20150312103 | IDENTIFYING THE LOGICAL LOCATION OF A NETWORK DEVICE ON A CUSTOMER'S LAN - A method and apparatus for identifying logical locations of network devices on a Local Area Network (LAN) is provided herein. The method may include receiving an input including a network identifier of a network terminal adaptor on a LAN, determining, using the received network identifier, one or more network devices connected upstream of the TA, wherein a network address of each of the one or more network devices connected upstream is filtered such that only network devices including a private IP address are identified; determining device telemetry data associated with each determined network device and the network terminal adaptor, and generating, using the device telemetry data, a data structure including (a) a representation of a logical location of the network terminal adaptor and of each determined network device connected to the LAN, and (b) at least some of the device telemetry data. | 10-29-2015 |
20150312129 | DATA PROCESSING - Measures for processing data in a packet-switched network. At a first device in the network, an echo request packet is transmitted into the network. The echo request packet comprises a predetermined identifier. An echo response packet is received from a second device in the network. In response to the received echo response packet comprising the predetermined identifier, the received echo response packet is identified as a packet generated on the basis of an echo request packet originated from the first device, and an Internet Protocol (IP) address comprised in the received echo response packet is determined to be an IP address of the second device. | 10-29-2015 |
20150312138 | BICASTING USING NON-CONGRUENT PATHS IN A LOOP-FREE ROUTING TOPOLOGY HAVING ROUTING ARCS - In one embodiment, a method comprises creating, in a computing network, a loop-free routing topology comprising a plurality of routing arcs for reaching a destination network node, each routing arc comprising a first network node as a first end of the routing arc, a second network node as a second end of the routing arc, and at least a third network node configured for routing any network traffic along the routing arc toward the destination node via any one of the first or second ends of the routing arc, the loop-free routing topology providing first and second non-congruent paths; and forwarding bicasting data, comprising a data packet in a first direction from a network node and a bicasted copy of the data packet in a second direction from the network node, concurrently to the destination node respectively via the first and second non-congruent paths. | 10-29-2015 |
20150312937 | BASE STATION DEVICE, MOBILE STATION DEVICE, WIRELESS COMMUNICATION METHOD, AND INTEGRATED CIRCUIT - A flexible subframe is efficiently set. A base station device communicates with a mobile station device using a time division duplex system in a single cell. The base station device includes a transmitting unit that transmits first information indicating an arrangement of a first subframe, a second subframe and a third subframe in a frame, and second information indicating an arrangement of the first subframe, the second subframe, the third subframe and a fourth subframe in the frame to the mobile station device. | 10-29-2015 |
20150326440 | STREAM CREATION WITH LIMITED TOPOLOGY INFORMATION - The discovery of a topology of a network with an unknown topology can enable the selection of a data path within the network, and the establishment of a data stream over the selected data path. Routing tables mapping originating nodes to input ports can be created based on the receipt of discovery messages generated by the originating nodes. A source node can select a data path between the source node and a sink node in order to establish a data stream using the routing tables. Data paths can be selected based on, for instance, routing table bandwidth information, latency information, and/or distance information. Data streams can be established over the selected data path, and each node can release any reserved output bandwidth determined to be unnecessary for the data stream. | 11-12-2015 |
20150326441 | STREAM CREATION WITH LIMITED TOPOLOGY INFORMATION - The discovery of a topology of a network with an unknown topology can enable the selection of a data path within the network, and the establishment of a data stream over the selected data path. Routing tables mapping originating nodes to input ports can be created based on the receipt of discovery messages generated by the originating nodes. A source node can select a data path between the source node and a sink node in order to establish a data stream using the routing tables. Data paths can be selected based on, for instance, routing table bandwidth information, latency information, and/or distance information. Data streams can be established over the selected data path, and each node can release any reserved output bandwidth determined to be unnecessary for the data stream. | 11-12-2015 |
20150334630 | METHOD AND APPARATUS FOR TRANSMISSION OF DATA OVER A PLURALITY OF NETWORKS - There is discussed a method of transmitting data from a first network device to a second network device using a plurality of network links. The method comprises the first network device sending first data to the second network device over a first network link at a first transmission time and sending second data to the second network device over a second network link at a second transmission time. The first network device receives from the second network device an indication of the time difference between reception of the first data over the first network link and reception of the second data over the second network link. The first network device then calculates a propagation time difference between the time taken for the first data to reach the second network device over the first network link and the second data to reach the second network device over the second network link using the received time difference indication and the first and second transmission times, and determines a network link configuration and data sending order using the calculated propagation time difference. | 11-19-2015 |
20150341220 | TOUCHLESS ORCHESTRATION FOR LAYER 3 DATA CENTER INTERCONNECT IN COMMUNICATIONS NETWORKS - A method is provided in one example embodiment and includes receiving from an orchestrator element for a new Virtual Routing and Forwarding element (“VRF”) created in a communications network a name of the VRF and interconnect identification; selecting a border element for the VRF; and creating in a database a VRF entry for the selected border element, the entry identifying a configuration profile for the selected border element. The method further includes forwarding a VRF create notification to the selected border element; and providing the configuration profile from the corresponding entry to the selected border element in response to a query to the database from the selected border element. The selected border element applies the configuration profile automatically to configure the selected border element. | 11-26-2015 |
20150341843 | Method, Device and System for Establishing On-Demand Route - The present invention relates to the field of network communication technologies, and discloses a method, a device, and a system for establishing an on-demand route. The method includes: determining that a stable route needs to be established; establishing the stable route and recording a route entry corresponding to the stable route in a route table; determining an effective time of the stable route, in which the effective time of the stable route is longer than the effective time of another common route; and performing an aging operation on the route entry according to the effective time of the stable route. With the present invention, requirements of different applications on the delay may be satisfied, and the consumption of the network bandwidth may be reduced. | 11-26-2015 |
20150372866 | Method and Apparatus for Providing Automatic Node Configuration Using A Dongle - A network element (“NE”) is capable of starting an automatic configuration in response to an initiator such as a dongle. In one embodiment, after resetting a counter used for identifying a signal, a process for the automatic configuration forces a first test signal at a test mode output (“TMO”) pin of a console interface to a logic state zero. Upon detecting a break condition at a receiver pin, a second test signal at the TMO pin is forced to a logic state one. When logic state one is detected at the receiver pin of the NE, an automatic configuration mode at the NE is activated. | 12-24-2015 |
20150372873 | METHOD AND APPARATUS FOR DEPLOYING A MINIMAL-COST CCN TOPOLOGY - A CCN-deployment system can design and deploy a content centric network (CCN) topology, either across a collection of CCN nodes or across an existing computer network. During operation, the system analyzes a computer network of N network nodes to determine a physical network topology. The system also determines a number, k, of network nodes of the physical network on which to overlay a content centric network (CCN). The system then determines an average degree of connectivity, and a degree-of-connectivity distribution, that achieves an optimal performance metric for the CCN overlay network. The system generates a network topology of k network nodes that satisfies the average degree of connectivity, and that satisfies the degree-of-connectivity distribution. The system can deploy the content centric network topology across k nodes of the underlying physical network. | 12-24-2015 |
20160020948 | UPGRADING A PROGRAMMABLE LOGIC GATE ARRAY IN AN IN-SERVICE PLUGGABLE TRANSCEIVER - A programmable transceiver for a network element includes a programmable circuit including internal logic and control logic. Interfaces connect the programmable circuit to a network and a network element. The control logic facilitates programming of the internal logic responsive to an in-band program signal while the programmable circuit services network traffic received via at least one of the interfaces. | 01-21-2016 |
20160028652 | Techniques For Simplifying Stacking Trunk Creation And Management - Techniques for simplifying stacking trunk creation and management are provided. In one embodiment, a switch in a stacking system can receive first and second control packets from one or more other switches in the stacking system, where the first and second control packets are received on first and second stacking ports of the switch respectively. The switch can then determine, based on the first and second control packets, whether the first and second stacking ports can be configured as a single stacking trunk. | 01-28-2016 |
20160036643 | MAPPING RELATIONSHIPS AMONG VIRTUAL ELEMENTS ACROSS A SYSTEM - A technique for mapping relationships among virtual elements across a system includes: for a server having a virtualized network interface controller (vNIC) with a plurality of vNIC links connected to a switch, identifying relationships between physical ports on the switch and virtual ports on the switch; for each vNIC link, identifying local area network (LAN) interface information on the server; creating data structures establishing topology information between the switch and the server; and creating a mapping of each vNIC link to a respective virtual port on the switch by correlating the topology information with the LAN interface information. | 02-04-2016 |
20160057694 | STEERING CONNECTION REQUESTS FOR AN ACCESS POINT TO A BEST-SERVING ACCESS POINT - Network devices are steered to preferred access points using a probability function. A probe request for connection is received from a network device. The probe request can be from a network device attempting to use a wireless network (e.g., a IEEE 802.11-type network or other suitable type of network). A probability function that defines a likelihood of granting the network device a connection is used to determine whether to accept or deny the response. The probe response is then sent to the network device. | 02-25-2016 |
20160065407 | METHOD AND SYSTEM FOR SUPPORTING DISTRIBUTED RELAY CONTROL PROTOCOL (DRCP) OPERATIONS UPON MISCONFIGURATION - A method supporting a distributed resilient network interconnect (DRNI) in a link aggregation group at a network device is disclosed. The method starts with receiving a distributed relay control protocol data unit (DRCPDU), where the DRCPDU includes neighbor network device's state information and configuration information, wherein the configuration information includes its operational aggregation key, gateway digest, port digest. The method continue with determine whether or not the received configuration information is different from the one of the network device and how, and causing the next DRCPDU to be transmitted to the neighbor network device to include or not include certain information accordingly. | 03-03-2016 |
20160066249 | DYNAMIC ROUTING IN A MESH NETWORK - Technologies are described herein for dynamically determining and assigning parent nodes and routes for nodes in a mesh network. A host sends a command message to one or more nodes of the mesh network. The command message is configured to cause the nodes to collect communication parameters regarding neighboring nodes and to upload neighbor lists containing the communication parameters regarding the neighboring nodes to the host. The host then calculates a link score for the pairs of neighboring nodes in the mesh network based on the communication parameters in the uploaded neighbor lists and assigns one or more parent nodes to at least one of the nodes based on the calculated link scores. The host then sends a command message to the node causing the node to reconfigure based on the command message and begin communicating through the newly assigned one or more parent nodes. | 03-03-2016 |
20160080199 | Configuration Method for a Wiring System | 03-17-2016 |
20160087890 | AUTOMATED DETERMINATION OF TREE ATTRIBUTES AND ASSIGNMENT OF RECEIVER IDENTIFIERS BY DISTRIBUTED ELECTION IN MULTICAST ARCHITECTURES RELYING ON PACKETS IDENTIFYING INTENDED RECEIVERS - Exemplary methods include a first network device participating in an election process to determine a designated bit forwarding router (D-BFR). The methods include in response to determining the first network device is elected to be the D-BFR, performing D-BFR operations comprising determining an elected bitmask (BM) length of a BM based on maximum local BM lengths advertised by other BFRs in the network, wherein each bit of the BM will correspond to a bit forwarding egress router (BFER), and advertising the determined elected BM length to other BFRs. The methods may further include one or more of determining an elected tree type based on supported tree types advertised by other BFRs in the network, assigning one or more BM positions (BMPs) to one or more BFERs, and advertising the elected determined tree type and/or the assigned one or more BMPs. | 03-24-2016 |
20160094974 | FUZZY FINGERPRINTING OF COMMUNICATING WEARABLES - A collection of wearable communicating devices generates signals that may be detected and analyzed to produce a fingerprint of the collection of wearable devices. An analysis unit may recognize patterns or other information in detected signals and generate a fingerprint of a body area network corresponding to the collection of wearable devices. The fingerprint may be fuzzy fingerprint, matchable with a fingerprint of a similar, but not necessarily identical, collection of wearable devices that has been previously generated or obtained. The fingerprint may be used for tracking or other purposes. Some embodiments may allow the generation of additional signals that modify the fingerprint. | 03-31-2016 |
20160099841 | DEVICE HIERARCHY BUILDING FOR A REMOTE TERMINAL UNIT - A system constructs a hierarchy for field devices communicatively coupled to a remote terminal unit (RTU) by retrieving device information from field devices, caching the device information in the memory of the RTU, storing device identities in the memory of a host machine, and obtaining the device information at the host from the RTU in response to subsequent user requests to build the hierarchy, without re-sending commands to retrieve the device information directly to the field devices. | 04-07-2016 |
20160112297 | Auto Management of a Virtual Device Context Enabled Network Infrastructure - In some embodiments, a virtual device context (vDC) domain may be advertised to other network devices. If at least a partition of each device is determined to belong to the same vDC domain, the network interface communicating with the at least one device may be activated. | 04-21-2016 |
20160112299 | CONFIGURING FORWARDING INFORMATION - Based on an example, a network apparatus may calculate N equal-cost multi paths to a destination address; sort the N equal-cost multi paths into an order to obtain a sorted result; the sorted result specifying an order from a first ECMP to an Nth ECMP; populate an ECMP table with ECMP entries, each ECMP entry comprising forwarding information associated with a respective ECMP; wherein the ECMP table comprises M entries, wherein M is greater than N, and wherein the ECMP table is populated with ECMP entries according to the order of equal-cost multi paths in the sorted result, and wherein the order is treated in a circular manner such that the N+1th ECMP table entry is populated with forwarding information associated with the first table entry and wherein M=2 | 04-21-2016 |
20160119185 | SYSTEM AND METHOD FOR CONFIGURATION OF NETWORK-CAPABLE APPLIANCES - A controlling device is used to configure a target device for wireless network communications through use of a setup wizard. The setup wizard is used to obtain information required to perform communications on a wireless network via a wireless network router and a digital representation of the information obtained through use of the setup wizard is provided to the target device via use of the controlling device. The target device will use the digital representation of the information to configure itself for wireless network communications. | 04-28-2016 |
20160119220 | MULTIPLE RING IDENTIFICATION AND CONFIGURATION PROTOCOL - A protocol identifies and configures rings in a network topology automatically in order to simplify and quicken the actions that need to be performed in response to addition, deletion and shuffle of network nodes in that topology. Such rings do not need to be identified and configured manually. The protocol involves two separate sequentially performed phases. In the first phase, the protocol can automatically identify all rings that are present within a Virtual Local Area Network (VLAN) topology. In the second phase, the protocol can automatically configure each node of each such ring in conformity with the Ethernet Ring Protection (ERP) protocol. After this ERP configuration has been performed, the failure of a link within the network will not require every network node to re-learn paths through the network; instead, the nodes that are required to re-learn such paths can be limited to those within the particular ring that contained the failed link. | 04-28-2016 |
20160119932 | FACILITATING MOBILITY DIMENSIONING VIA DYNAMIC CONFIGURATION OF A SWITCH - Dynamic grouping of cell site devices to network devices that include a group of baseband processing devices is facilitated. One method includes determining, by a device including a processor, respective load information for cell site devices of respective cell sites associated with a network; and determining, by the device, interference information associated with the cell site devices. The method also includes determining, by the device, configuration information of a switch device communicatively coupled between the cell site devices and network devices that include a group of baseband processing devices. The determining the configuration information is based on the respective load information of the cell site devices and the interference information associated with the cell site devices. | 04-28-2016 |
20160127950 | MANAGED PEER TO PEER (P2P) OPERATION IN ENTERPRISE WIRELESS NETWORKS - According to one embodiment, a non-transitory computer readable medium within a first network device operating as an access point and comprising instructions which, when executed by one or more hardware processors, causes performance of a number of operations including transmission and reception of Peer-to-Peer messages between two or more network devices having Peer-to-Peer functionality. Thereafter, negotiations are conducted by network devices to selection of a Group Owner (GO) for a Peer-To-Peer group. The negotiations comprise specifically selecting a set of one or more values that ensures the first network device obtaining the GO role for Peer-to-Peer communications within the Peer-to-Peer group instead of randomly selecting the one or more values for the negotiating of the GO role. | 05-05-2016 |
20160135110 | ASSOCIATION IN LINE-OF-SIGHT COMMUNICATION NETWORKS - Various of the disclosed embodiments relate to line-of-sight (LOS), e.g., optical, based networks. Systems and methods are provided for connecting nodes based on their topological position in a line-of-sight communication network. Some embodiments may represent each node by a “backbone” and a “subnetwork” rank. The determination of a node's rank can prevent the formation of isolated “islands” of nodes, cut off from the backbone. The ranking can also provide a total ordering of nodes relative to the “fiberpop” node which can be used for healing and routing behaviors. | 05-12-2016 |
20160150350 | METHOD AND APPARATUS FOR PAIRING A WEARABLE DEVICE AND A SMART DEVICE - The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A method of an electronic device for communicating with another electronic device is provided. The method includes capturing user identity metrics of a user, and determining, by a processor of the electronic device, that the user is an authorized user based on a result of a comparison between the identified user identity metrics and association information. | 05-26-2016 |
20160164741 | SYSTEM AND METHOD OF DISCOVERING PATHS IN A NETWORK - A method and apparatus that discovers and tests paths in a network is described. In an exemplary embodiment, a device discovers a path by discovering a plurality of equal cost segments between the first and second network elements of the plurality of network elements. The device further generates a plurality of test data packets, wherein each of the test data packets has a different characteristic. In addition, the device injects the plurality of test data packets in the first network element such that the first network element transmits the plurality of test data packets to the second network element using the plurality of equal cost segments. The device additionally determines a path for each of the plurality of test data packets by recording which of the plurality of equal cost segments the first network element used to transmit that test data packet. | 06-09-2016 |
20160165455 | Method for configuring a wireless network and central station for a wireless network - A method for configuring a wireless network or a central station of a wireless network including at least the central station and at least two peripheral stations, includes in a first task, the central station ascertaining the peripheral stations which are reachable by wireless signals of the central station. In a second task, the central station configures at least one of the peripheral stations, which were ascertained in the first task, test-wise as a repeater, which receives and re-transmits the wireless signals of the central station. If the central station ascertains that more peripheral stations are reachable by the central station via the repeater, in a third task, the central station configures the peripheral stations, configured test-wise as repeaters, permanently as repeaters. | 06-09-2016 |
20160173330 | METHOD AND APPARATUS FOR CONTROLLING AUDIO/VIDEO BRIDGING STREAM FOR IN-VEHICLE ETHERNET | 06-16-2016 |
20160182306 | METHOD AND APPARATUS FOR SELECTING PREFERRED PARENT NODE IN WIRELESS SENSOR NETWORK | 06-23-2016 |
20160197785 | VIRTUAL CONTROLLER GROUP MANAGEMENT SYSTEM | 07-07-2016 |
20160197786 | SYSTEM AND METHOD FOR NOTIFYING A USER OF CONDITIONS ASSOCIATED WITH AN INTERNET-OF-THINGS (IOT) HUB | 07-07-2016 |
20160197787 | Mechanism for Automatic Network Formation and Medium Access Coordination | 07-07-2016 |
20160254956 | SYSTEM AND METHOD FOR AUTOMATICALLY DETECTING AND CONFIGURING SERVER UPLINK NETWORK INTERFACE | 09-01-2016 |
20160380814 | SYSTEMS AND METHODS FOR PROVISIONING A BATTERY-POWERED DEVICE TO ACCESS A WIRELESS COMMUNICATIONS NETWORK - In some aspects, the present disclosure provides a method of associating a device with a wireless communications network. The method includes receiving a signal from a second device, the signal received using an element configured to sense at least one of sound or vibration. The method further includes interpreting the signal in order to determine one or more parameters for a wireless communications network. The method also includes associating with the wireless communications network, based at least in part on the one or more parameters. | 12-29-2016 |
20170237626 | MAPPING RELATIONSHIPS AMONG VIRTUAL ELEMENTS ACROSS A SYSTEM | 08-17-2017 |
20170237627 | MAPPING RELATIONSHIPS AMONG VIRTUAL ELEMENTS ACROSS A SYSTEM | 08-17-2017 |
20220141121 | PATH DETERMINING METHOD AND RELATED DEVICE - This application provides a path determining method and a related device. The method includes: determining N | 05-05-2022 |