14th week of 2016 patent applcation highlights part 46 |
Patent application number | Title | Published |
20160099787 | APPARATUS, SYSTEMS AND METHODS FOR IDENTIFYING PARTICULAR MEDIA CONTENT EVENT OF INTEREST THAT IS BEING RECEIVED IN A STREAM OF MEDIA CONTENT - Obscuring systems and methods are operable to obscure an intervening content segment that a user does not wish to view and/or listen to if that particular intervening content segment is again received at a later time. An exemplary embodiment includes at least a content segment obscuring system that samples the decoded stream of information corresponding to an initial portion of the intervening content segment, determines a vector signature of the sampled initial portion of the intervening content segment, wherein the vector signature corresponds to at least one location and an orientation of a vector in a multi-dimensional vector space, and compares the vector signature with a plurality of predefined reference vector signatures. In response to the vector signature substantially corresponding to at least one of the plurality of predefined reference vector signatures, the intervening content segment is obscured with replacement content. | 2016-04-07 |
20160099788 | METHODS AND APPARATUS FOR EMPLOYING DIFFERENT CAPABILITIES FOR DIFFERENT DUPLEXING MODES - Certain aspects of the present disclosure propose techniques for independently signaling features supported by a user equipment (UE) in different duplexing modes. The UE may be capable of communicating in frequency division duplexing (FDD) and time division duplexing (TDD) modes. The UE may obtain a FDD-specific feature group indicators (FGIs) set and a TDD-specific FGIs set, and signal at least one of the FDD-specific FGIs set or TDD-specific FGIs set. In addition, the UE may take one or more actions to reduce the likelihood of transitioning to a mode of operation that is different from its current mode of operation. | 2016-04-07 |
20160099789 | SYSTEM AND METHOD OF TONE MAPPING DURING SINGLE USER AND MULTIPLE USER OPERATING MODES INCLUDING TRANSMISSIONS RESPECTIVELY OF OFDM SYMBOLS AND OFDMA SYMBOLS IN A WLAN - A system including a direct current tone, guard tone, data tone allocation, mapping, and inverse Fourier transform (IFT) modules. The direct current tone module determines a number of direct current tones based on whether a network device is operating in a single user or multi-user mode. The guard tone module determines a number of guard tones based on whether the network device is operating in the single user or multi-user mode. The data tone allocation module determines a number of data tones based on the number of direct current and guard tones. The mapping module receives data and based on the number of data tones, maps the data to the data tones. The IFT module performs a frequency to time domain conversion of an output of the mapping module to generate orthogonal frequency division multiplexing (OFDM) symbols during the single user mode and OFDM access symbols during the multi-user mode. | 2016-04-07 |
20160099790 | Cost Effective Network Interference Cancellation For Wireless Networks - Embodiments are described herein to provide improvements to known network interference cancellation techniques. One general approach involves a first network node attempting ( | 2016-04-07 |
20160099791 | ENHANCEMENT OF INTER-CELL INTERFERENCE COORDINATION WITH ADAPTIVE REDUCED-POWER ALMOST BLANK SUBFRAMES BASED ON NEIGHBOR CELL PROFILE DATA - An inter-cell interference coordination procedure in heterogeneous networks (HetNets) is enhanced based on utilization of cell profile data associated with neighbor access points to improve HetNet spectrum efficiency, mobility performance, and/or overall network capacity. In one aspect, a macro access point can receive cell profile data associated with neighbor access points and modify a power level of reduced-power almost blank subframes (ABS) transmitted by the macro access point to manage macro cell capacity. Further, the macro access point can configure the ABS pattern and transmit the ABS pattern to the neighbor access points. Based on the ABS pattern, the neighbor access points can schedule transmissions to user equipment that are located at (or close to) their cell-edge to reduce inter-cell interference. | 2016-04-07 |
20160099792 | Multiple-Wavelength Passive Optical Network (PON) Power Saving - An optical line terminal (OLT) comprising a processor configured to process a first power consumption data associated with a first optical network unit (ONU) for a plurality of wavelength channels in a multiple-wavelength passive optical network (PON), and select a first target wavelength channel from the plurality of wavelength channels based on the first power consumption data in order to reduce power consumption at the first ONU, and a transmitter coupled to the processor and configured to transmit to the first ONU a tuning control message instructing the first ONU to tune to the first target wavelength channel. | 2016-04-07 |
20160099793 | TERMINAL DEVICE AND PACKET PROCESSING METHOD - A packet processing method, the method includes, receiving TCP packets from a wireless access point. An A-MSDU packet is created by aggregating TCP ACK frames generated by the received TCP packets. When the current data transmission speed is less than or equal to a first threshold value and timeout for the A-MSDU packet sent to the wireless access point continuously occurs over a first predefined time, a transmission time interval is reduced by the first preset value and the packet size value is re-calculated according to the adjusted transmission time interval. When the current data transmission speed is greater than or equal to the second threshold value and the size of the created A-MSDU packet that achieves the packet size value occurs over a second predefined time, the packet size value is increased by the second preset value. | 2016-04-07 |
20160099794 | UE ASSISTED INTERFERENCE LEARNING - In an unlicensed band, different types of interference may be experienced by user equipments (UEs), and a serving evolved Node B (eNB) may not be aware of the interference types affecting a UE. Therefore, aspects presented herein provide UE assisted interference learning, in which the UE detects an interfering signal and reports information such as the interference level and properties of the interfering signal to a serving eNB. Another aspects presented herein provide for an eNB which receives, from one or more UEs, information indicating properties of each of at least one interfering signals experienced by the UEs, such as interference types affecting the UEs. The eNB further uses the information received from the UE, including the wireless technology type to determine the properties of its downlink transmission and the length of the contention window leading up to its downlink transmission. | 2016-04-07 |
20160099795 | TECHNOLOGIES FOR EXCHANGING HOST LOSS AND FORWARD ERROR CORRECTION CAPABILITIES ON A 25G ETHERNET LINK - Technologies for capabilities exchange include a network port logic having a communication link coupled to a remote link partner. The port logic transmits local host loss information to the link partner and receives remote host loss information from the link partner. The port logic may communicate the host loss information via an autonegotiation base page, an autonegotiation next page, or a PMD control frame. The port logic determines total channel loss based on the local host loss, the remote host loss, and cable loss. The port logic may bring the communication link up without forward error correction (FEC) if the total channel loss is less than a FEC limit, may bring the link up with FEC if the total loss is less than a specification limit, or may not bring the link up if the total channel loss is above the specification limit. Other embodiments are described and claimed. | 2016-04-07 |
20160099796 | ENCODING IN UPLINK MULTI-USER MIMO AND OFDMA TRANSMISSIONS - A method, an apparatus, and a computer-readable medium for wireless communication are provided. In one aspect, the apparatus is configured to determine a number of data symbols for transmitting a data payload. The apparatus is configured to determine a number of payload bits for transmitting the data payload based on the determined number of data symbols. The apparatus is configured to transmit a data frame. The data frame includes a signal field and data symbols encoded based on the data payload, the determined number of data symbols, and the determined number of payload bits, in which the data symbols are encoded using LDPC encoding or BCC encoding. | 2016-04-07 |
20160099797 | Systems and Methods for Pilot Signal and Control Data Retransmission - Historical decoding can be performed in accordance with pilot signal retransmission or control information retransmission to reduce the amount network resources consumed during data recovery. In one example, historical decoding is achieved through retransmitting a sub-set of coded bits carried by an earlier transmission, which are compared with a corresponding portion of the original signal (stored in memory) to obtain improved channel state information (CSI) relating to that earlier transmission. In another example, historical decoding is achieved through communicating parity information related to a sub-set of the coded bits carried by an earlier transmission, which are used in accordance with a data aided CSI technique to obtain the improved CSI relating to that earlier transmission. In yet another example, historical decoding is achieved by re-transmitting control information carried by an earlier transmission, which is used to decode an original signal (stored in memory). | 2016-04-07 |
20160099798 | MEDIUM ACCESS PROTECTION AND BANDWIDTH NEGOTIATION IN A WIRELESS LOCAL AREA NETWORK - A first communication device transmits a first control frame to multiple second communication devices via a wireless communication medium, wherein the first control frame i) indicates to other communication devices that the wireless communication medium is reserved for a first time period, and ii) indicates that the second communication devices are requested to simultaneously transmit respective second control frames to the first communication device via the wireless communication medium, wherein the second control frames are to include information indicating to other communication devices that the wireless communication medium is reserved for a second time period that is a subset of the first time period. | 2016-04-07 |
20160099799 | METHODS, APPARATUSES, AND SYSTEMS FOR TRANSMITTING HYBRID AUTOMATIC REPEAT REQUEST TRANSMISSIONS USING CHANNELS IN AN UNLICENSED SHARED MEDIUM - Methods, systems, and storage media for providing and/or obtaining feedback for data transmissions in an unlicensed shared medium are described. In embodiments, an apparatus may include radio control circuitry to demodulate and decode a data transmission from an evolved node B (eNB). The apparatus may include and processing circuitry, coupled with the radio control circuitry, and the processing circuitry is to receive the data transmission from the radio control circuitry and generate feedback based on the data transmission. The radio control circuitry may also control radio-frequency circuitry to determine whether a physical channel in an unlicensed shared medium is unoccupied, and transmit the feedback to the eNB over the physical channel when the physical channel is unoccupied according to the determination. Other embodiments may be described and/or claimed. | 2016-04-07 |
20160099800 | TRANSCEIVER AND OPERATION METHOD THEREOF - A receiver, a transceiver, and method of operating the transceiver are provided. The receiver includes a diplexer configured to separate a first band signal and a second band signal, the first band signal including a plurality of first subband signals; a first multi-mode switch configured to generate one or more signal paths corresponding to one or more of the plurality of first subband signals; and a plurality of first band pass filters configured to filter the plurality of first subband signals, wherein the plurality of first band pass filters and the first multi-mode switch are electrically coupled, and one or more of the plurality of first band pass filters, corresponding to one or more of the plurality of first subband signals, filter the plurality of first subband signals, respectively. | 2016-04-07 |
20160099801 | USER TERMINAL, RADIO BASE STATION AND RADIO COMMUNICATION METHOD - The present invention is designed to feed back feedback signals such as delivery acknowledgement signals properly even when the DL/UL configuration is reconfigured in TDD. A user terminal communicates, in time division duplexing, with a radio base station that reconfigures the DL/UL configuration, and has a judging section that judges a delivery acknowledgement in response to each DL subframe, and a feedback control section that allocates a delivery acknowledgement signal in response to each DL subframe to a UL subframe and sends feedback, and, when the number of DL subframes that correspond to a UL subframe is greater than a predetermined value in a radio frame after the reconfiguration of the DL/UL configuration, the feedback control section bundles at least part of the delivery acknowledgement signals for a plurality of DL subframes corresponding to the UL subframe, and sends feedback. | 2016-04-07 |
20160099802 | METHOD AND APPARATUS FOR TRANSMITTING/RECEIVING SIGNAL IN WIRELESS ACCESS SYSTEM WHICH SUPPORTS FDR TRANSMISSION - The present invention relates a wireless access system which supports a full duplex radio (FDR) transmission environment. A method for receiving a signal from a base station by a terminal in the wireless access system which supports FDR transmission according to an embodiment of the present invention comprises the steps of: receiving, from the base station, reference signal mode information indicating resources by which a reference signal is transmitted, from among reference signal available resources by which the reference signal can be transmitted; receiving, from the base station, additional resource mode information indicating additional data resources by which a terminal can simultaneously transmit data, from among the resources by which the reference signal is transmitted; and transmitting the data using the additional resource mode information simultaneously while receiving the reference signal using the reference signal mode information. | 2016-04-07 |
20160099803 | TIME SIGNAL VERIFICATION AND DISTRIBUTION - The time signal verification and distribution device disclosed herein verifies and distributes a time signal to consuming devices. The device determines a time quality status of a first and second time signal, calculates a difference between a first and a second time signal, and compares the difference to a predetermined threshold. Based on the time quality status and the comparison, the time signal verification and distribution device distributes a time signal to a plurality of time signal consuming devices. Exceeding the predetermined threshold may indicate a spoofing attack or other problem with the time signals. | 2016-04-07 |
20160099804 | SIGNAL DIGITIZER AND CROSS-CORRELATION APPLICATION SPECIFIC INTEGRATED CIRCUIT - According to one embodiment, a cross-correlator comprises a plurality of analog front ends (AFEs), a cross-correlation circuit and a data serializer. Each of the AFEs comprises a variable gain amplifier (VGA) and a corresponding analog-to-digital converter (ADC) in which the VGA receives and modifies a unique analog signal associates with a measured analog radio frequency (RF) signal and the ADC produces digital data associated with the modified analog signal. Communicatively coupled to the AFEs, the cross-correlation circuit performs a cross-correlation operation on the digital data produced from different measured analog RF signals. The data serializer is communicatively coupled to the summing and cross-correlating matrix and continuously outputs a prescribed amount of the correlated digital data. | 2016-04-07 |
20160099805 | System and Method for Efficient Support for Short Cryptoperiods in Template Mode - System and method embodiments are provided herein for efficient representation and use of initialization vectors (IVs) for encrypted segments using template mode representation in Dynamic Adaptive Streaming over Hypertext Transfer Protocol (DASH). An embodiment method includes sending in a media presentation description (MPD), from a network server to a client, a template for generating a universal resource locator (URL) to obtain an IV that is used for encrypting a segment, in absence of an IV value in the MPD, receiving from the client a URL configured according to the template, and upon receiving the URL, returning an IV corresponding to the URL to the client. Another embodiment method includes receiving in a MPD, at a client from a network server, a template for generating a URL to obtain an IV that is used for encrypting a segment, upon detecting an absence of an IV value or IV base value in the MPD, configuring a URL for the IV using the template, sending the URL for the IV, and receiving an IV. | 2016-04-07 |
20160099806 | DISTRIBUTING SECRET KEYS FOR MANAGING ACCESS TO ECUS - A system and method of controlling access to electronic control units (ECUs) includes: receiving, at an ECU supplier computer, a supplier encryption key derived from a master encryption key using a supplier identifier that identifies an ECU supplier; issuing an ECU identifier that identifies an ECU and includes the supplier identifier; generating for the ECU an ECU unlock authorization key using the supplier encryption key and the ECU identifier; and storing the ECU unlock authorization key and the ECU identifier in the ECU. | 2016-04-07 |
20160099807 | PROGRAM COLLATION SYSTEM, NODE, COLLATION METHOD, AND COMPUTER-READABLE MEDIUM - A collation system includes first through third nodes N | 2016-04-07 |
20160099808 | Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment - Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who requests services, and a second security token containing two other identities, one identifying the token issuer and the other identifying the owning process. When requesting services, the token-owning process sends a security token to indicate who is making the request, and uses its key to digitally sign the request. The token-owning process signs the request to indicate that it endorses the request. A receiving server accepts a request if (1) the token-owning process endorses the request by signing the request; (2) the token is valid (token is signed by its issuer and the digital signature is verified and unexpired); (3) user entity, which can be a real user or a deployment or a server process, that is represented by the token has the authorization to access the specified resources; and (4) the token-owning process is authorized to endorse the user entity represented by the token to access the specified resources. | 2016-04-07 |
20160099809 | TAMPER-EVIDENT NETWORK MESSAGING METHOD AND SYSTEM, AND DEVICE CONFIGURED THEREFOR - Described are various embodiments of a tamper-evident network messaging method and system, and device configured therefor. In some embodiments, tamper-evident messaging is enabled between network-interfacing devices. In general, these devices will each comprise a hardware hasher or the like, operatively configured to compute and supply a hash value to their respective network interface via an independent path distinct from the device's one or more software-accessible paths, where it may be combined with outgoing messages to provide indication of possible code tampering, or again evaluated against incoming hash values associated with incoming messages to verify an authenticity thereof. In some embodiments, such hash values may further or alternatively be used for the encryption/decryption of intercommunicated messages to provide a similar effect. | 2016-04-07 |
20160099810 | Key-Value Data Storage Device with Hybrid Architecture - A key-value storage device and method of using the same. In some embodiments, keys are stored in a key store in a first non-volatile memory and corresponding values associated with the keys are stored in a value store of a second non-volatile memory. An input command is received from a host device, the input command having a key associated with a value. Different first and second hash values are generated by applying a hash function to the key. The input command is executed responsive to the first and second hash values. | 2016-04-07 |
20160099811 | End-to-End Security For Hardware Running Verified Software - A verified software system may be executable on secure hardware. Prior to being executed, the software system may be verified as conforming to a software specification. First credentials attesting to an identity of the software system may be sent to an external application. Second credentials signed by a provider of the secure hardware may be sent to the external application. The second credentials may attest to an identity of the secure hardware. The external application may securely exchange one or more messages with a software application of the software system. For example, the one or more messages may be decryptable only by the external application and the software application to provide confidentiality for each message. As another example, an attestation may vouch for an identity of a sender of each of the one or more messages to attest to an integrity of each message. | 2016-04-07 |
20160099812 | NATURAL VISUALIZATION AND ROUTING OF DIGITAL SIGNATURES - Embodiments are provided for securely visualizing and routing digital signatures in an electronic document generated by an application program executing on a computer system. The application program may generate an electronic document for receiving a signature graphic, and calculate a hash value from the electronic document and the signature graphic, and create a cryptographic signature from the hash value using a cryptographic encryption method. The electronic document is digitally signed by embedding the cryptographic signature therein. The application program may further collect and route digital signatures by automatically collecting signatures from individual signers, one-by-one, and identify the appropriate signature line for each signer to sign. The application program may further generate a user interface for creating and collecting digital signatures. | 2016-04-07 |
20160099813 | Systems And Methods Of Dynamically Adapting Security Certificate-Key Pair Generation - Embodiments include systems and methods of certificate-key pair generation. A processor of a network element may anticipate a demand for certificate-key pairs, and the processor may generate certificate-key pairs at a key length in accordance with the anticipated demand. The processor may monitor whether the generation of the certificate-key pairs at the key length meets an observed demand for the certificate-key pairs. The processor may adjust the key length when the generation of the certificate-key pairs at the key length does not satisfy the observed demand for the certificate-key pairs. | 2016-04-07 |
20160099814 | SECURE PAIRING FOR SECURE COMMUNICATION ACROSS DEVICES - Technologies for securely pairing a first computing device with a second computing device include the first computg device to generate a session message key based on a key exchange with the second computing device. The first computing device receives a message including a hardware key certificate, | 2016-04-07 |
20160099815 | METHOD AND APPARATUS FOR DYNAMICALLY CHANGING GROUP CONTROL MODE BY USING USER INTERVENTION INFORMATION - The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the above technologies, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A method and an apparatus for dynamically changing a group control mode for operating a plurality of devices based on user intervention information according to a user's need are provided. A method of changing a group control mode using user intervention information by a home gateway includes executing the group control mode for controlling functions of a group of devices according to a predetermined setting, determining whether a user intervention condition is met, and, when the user intervention condition is met, suggesting a change to the group control mode based on pre-stored user intervention information and external environment data to a user. | 2016-04-07 |
20160099816 | RECEIVER PERFORMANCE IN A COMMUNICATION NETWORK - Methods and apparatus are described for improving receiver performance in a multicarrier communication network in which an encoded symbol is transmitted over a transmission channel in the communications system. A model of the transmission channel is estimated, said model characterising an effect of intercarrier interference on at least one carrier in the multicarrier system. The received symbol is decoded using the estimated model to remove a predicted effect of intercarrier interference. A pre-processor is also described for operation in conjunction with a communications receiver in the network. The pre-processor includes a channel estimator operable to estimate at least one feature of the communication channel based on a received signal. The pre-processor modifies the received signal dependent on the at least one estimated feature and provides the modified signal to the communications receiver. | 2016-04-07 |
20160099817 | N-PHASE PHASE AND POLARITY ENCODED SERIAL INTERFACE - System, methods and apparatus are described that facilitate transmission of data, particularly between two devices within an electronic apparatus. Information is transmitted in N-phase polarity encoded symbols. Data is encoded in multi-bit symbols, and the multi-bit symbols are transmitted on a plurality of connectors. The multi-bit symbols may be transmitted by mapping the symbols to a sequence of states of the plurality of connectors, and driving the connectors in accordance with the sequence of states. The timing of the sequence of states is determinable at a receiver at each transition between sequential states. The state of each connector may be defined by polarity and direction of rotation of a multi-phase signal transmitted on the each connector. | 2016-04-07 |
20160099818 | HYPOTHESES GENERATION BASED ON MULTIDIMENSIONAL SLICING - A receiver is configured to receive a sample of an inter-symbol correlated (ISC) signal, the sample corresponding to a time instant when phase and/or amplitude of the ISC signal is a result of correlation among a plurality of symbols of a transmitted symbol sequence. The receiver may linearize the sample of the ISC signal. The receiver may calculate a residual signal value based on the linearized sample of the ISC signal. The receiver may generate an estimate of one or more of said plurality of symbols based on a slicing of the residual signal value. The linearization may comprise applying an estimate of an inverse of a non-linear model. The non-linear model may be a model of nonlinearity experienced by the ISC signal in a transmitter from which the ISC signal originated, in a channel through which the ISC signal passed en route to the receiver, and/or in a front-end of the receiver. | 2016-04-07 |
20160099819 | RECEIVING CIRCUIT AND DATA DECISION METHOD - A receiving circuit includes: a first decision circuit to output boundary data obtained by performing a binary-decision on input data in synchronization with a first clock; a first decision feedback equalizer to output center data obtained by performing equalization and a binary-decision on the input data using a first equalization coefficient in synchronization with a second clock; a phase detection circuit to detect phase information of the input data based on the boundary data and the center data; a phase control circuit to output phase difference information of the center data based on an opening of an eye pattern formed by overlaying data transition patterns; a first phase adjustment circuit to adjust a phase of the first clock based on the phase information; and a second phase adjustment circuit to adjust a phase of the second clock based on the phase information and the phase difference information. | 2016-04-07 |
20160099820 | CIRCUITS AND METHODS FOR WIRELESS TRANSMITTERS - Circuits comprising: digital-to-amplitude converter (DAC), comprising: binary weighted switching transistors (BWSTs), each having gate coupled to amplitude control bit ACB, and wherein the drain of each of the BWSTs are connected together and wherein the source of each of the BWSTs are connected together; transistor M | 2016-04-07 |
20160099821 | POWER LINE CARRIER/COMMUNICATIONS WITH IMPROVED IMMUNITY FOR TRANSIENTS AND ELECTROMAGNETIC INTERFERENCES - Power line carriers (PLCs) are susceptible to transients and electromagnetic interference (EMI) on the power line. To address transients and EMI on the power line, an improved power PLC involves transmitting a signal over the power line using a controlled current source, where the current source is modulated by the signal. The current source output is designed to be independent of the voltage on the power line and the load, and thus, is less susceptible to transients and EMI on the power line. The system architecture of the improved PLC also allows for simple, predictable, and flexible termination. In an example implementation in the automotive industry, the improved high frequency PLC may provide a low cost replacement for existing communication interfaces. The improved PLC may consolidate system in-vehicle communication, reduce in-vehicle wiring, provide system flexibility, and decrease vehicle weight and system cost. | 2016-04-07 |
20160099822 | FILTERBANK-BASED MULTICARRIER TRANSMITTER FOR TRANSMITTING A MULTICARRIER SIGNAL - A filterbank-based multicarrier transmitter for transmitting a multicarrier signal is disclosed, the multicarrier signal comprising a synchronization part and a payload part, the synchronization part comprising K1 frequency sub-channels being arranged to form M subsequent multicarrier symbols, the payload part comprising K2 frequency sub-channels, the filterbank-based multicarrier transmitter comprising a processor being configured to assign subsequent pilot values of a pilot sequence to every P | 2016-04-07 |
20160099823 | REAL TIME OFDM TRANSMISSION SYSTEM - An OFDM (orthogonal frequency division multiplexing) transmitter includes an inverse fast Fourier transform circuit, which, in operation, generates, based on digital input data, a complex time-varying digital signal having real and imaginary components; and a multiplexer adapted to generate a time-multiplexed digital signal by time-multiplexing one or more of the real components with one or more of the imaginary components. | 2016-04-07 |
20160099824 | METHOD AND SYSTEM OF CYCLIC PREFIX OVERHEAD REDUCTION FOR ENABLING CANCELLATION OF INTER-SYMBOL AND INTER-CARRIER INTERFERENCES IN OFDM WIRELESS COMMUNICATION NETWORKS - A system and method are provided for reducing the overhead caused by the presence of the cyclic prefix while enabling inter-carrier interference (ICI) and inter-symbol interference (ISI) cancellation in an Orthogonal Frequency Division Multiplexing (OFDM) network that includes an OFDM transmitter and an OFDM receiver. | 2016-04-07 |
20160099825 | LIGHTWEIGHT FRAMEWORK WITH DYNAMIC SELF-ORGANIZING COORDINATION CAPABILITY FOR CLUSTERED APPLICATIONS - A method, a computer program product, and a computer system for a lightweight framework with dynamic self-organizing coordination capacity for clustered applications are provided. The lightweight framework provides a means for managing tasks that require coordination between application nodes. A node receives a task and determines whether one of other nodes is processing the task. The node runs as an active node to process the task, in response to determining that none of the other nodes is processing the task. The node runs as one of one or more passive nodes that monitor processing of the task, in response to determining that the one of the other node is processing the task. | 2016-04-07 |
20160099826 | SYSTEMS AND METHODS FOR UPDATING DATA ACROSS MULTIPLE NETWORK ARCHITECTURES - A method for updating a storage element may include receiving a first set of data from a first device that operating in a structure. The first set of data corresponds to a first data type interpretable by the first device. The method may also include translating the first set of data into a second set of data of a second data type interpretable by a second device operating in the structure but not by the first device. The first set of data and the second set of data are associated with a first portion of information associated with occupancy properties of the structure. The method may then include storing the second set of data in a storage element that includes a second portion information associated with the occupancy properties of the structure. | 2016-04-07 |
20160099827 | Fiber Channel 1:N Redundancy - Network devices, systems, and methods, including executable instructions and/or logic thereon to achieve fiber channel one for N (1:N) redundancy. A network device includes a processing resource coupled to a memory. The memory includes program instructions executed by the processing resource to group a number of switches in a 1:N cluster and provide each switch with a (virtual) A_Port link to all members of the 1:N cluster. If a failure of a fiber channel over ethernet forwarder (FCF) occurs, the program instructions execute to re-establish or redirect a connection over an alternate path through a redundant FCF without having to synchronize a connection state across all switches in the cluster. | 2016-04-07 |
20160099828 | Tunnel Management Method, Tunnel Management Apparatus, and Communications System - The present invention relates to communications technologies and discloses a tunnel management method, a tunnel management apparatus, and a communications system so that a node that causes failure of a tunnel management request can be determined. According to the present invention, a response returned by a tunnel management node to an initiating node includes not only a cause value of tunnel management request failure but also information of the node that causes failure of the tunnel management request, so that the initiating node can find the node that causes failure of the tunnel management request and determine the error checking direction. The present invention is applicable to network devices in a communications network. | 2016-04-07 |
20160099829 | SELF-HEALING COMMUNICATIONS NETWORK - A self-healing communications network including a network bus that connects a plurality of field controllers. Each field controller is configured to operate an element of a system installed in a building or similarly large structure, and each is connected to the network bus. An end-of-line resistor can be automatically enabled in any field controller to designate that field controller as a terminal device on the network bus. In an embodiment, a parent controller detects each field controller on the network bus, and monitors and controls operation of the plurality of field controllers via commands transmitted over the network bus. The parent controller has first and second receiver/transmitter ports, both connected to the network bus. The parent controller is configured to automatically repair a break in the network bus by enabling at least one end-of-line resistor in one of the plurality of field controllers in order to properly terminate the network. | 2016-04-07 |
20160099830 | DATA REROUTING AND CACHING THROUGH REDUNDANT NETWORK - A plurality of devices forms a communication network. The plurality of devices is networked via their respective primary link. The plurality of devices is configured to revert to a redundant network upon a primary link associated with a first device in the plurality of devices failing. A second device in the plurality of devices is configured to transmit data to the first device through the primary link associated with the first device when the primary link associated with the first device is operational. The second device is further configured to reroute the data through a secondary link associated with the first device in response to the primary link associated with the first device failing. The redundant network includes the secondary link associated with the first device. | 2016-04-07 |
20160099831 | TRANSMITTER AND TRANSMISSION SYSTEM - A transmitter used in a transmission system in which a first network is connected, via a second network, to a third network, the transmitter being arranged between the first network and the second network, the transmitter includes: a generator configured to specify an identifier of data area in which communication data affected by a failure occurred in the first network are stored, in a frame transmitted from the second network, and to generate failure information associated with the identifier specified; and a transmitter configured to transmit the failure information generated by the generator, via the second network, to another transmitter arranged between the second network and the third network. | 2016-04-07 |
20160099832 | RELATIVE LOCATION DETERMINATION FOR AUTO-CONFIGURATION OF COMPUTING SYSTEMS IN A NETWORK ENVIRONMENT - Embodiments of the invention provide for a method, device and computer program product for auto-configuring computing devices disposed in a network environment based upon a relative location of each of the computing devices. The method includes broadcasting into an electromagnetic near field from at least two surface positions of a computing device an identification and position of a corresponding one of the surface positions. The method further includes receiving in a receiver disposed on at least one of the surface positions, an identification of another computing device, and a corresponding position from which the identification had been broadcast. The method yet further includes repeating the broadcasting and receiving in other computing devices and determining in each of the other computing devices a position relative to another of the devices. Finally, the method includes establishing a device configuration in each of the computing devices based upon a correspondingly determined relative position. | 2016-04-07 |
20160099833 | INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING THE SAME, AND STORAGE MEDIUM - An information processing apparatus which has received an instruction to perform communication determines whether a server supports multi-connection communication. When the information processing apparatus determines that the server does not support multi-connection communication, the information processing apparatus performs communication by using one connection instead of using multi-connection communication. | 2016-04-07 |
20160099834 | SYSTEM AND METHOD FOR SYMMETRIC SWITCHING FABRICS - A system and method for a symmetric switching fabric includes a first switching tier that includes a plurality of leaf switches, a second switching tier that includes one or more spine switches, and a plurality of interlinks for coupling the leaf switches to the spine switches. Each of the leaf switches includes one or more first ports configured to couple each of the leaf switches to other network devices outside the switching fabric and one or more second ports for coupling each of the leaf switches to each of the spine switches. A ratio of a number of first ports and a number of second ports is selected based on an oversubscription ratio. For each pair of a first switch selected from the leaf switches and a second switch selected from the spine switches, a same number of first interlinks selected from the plurality of interlinks couple the first switch to the second switch. | 2016-04-07 |
20160099835 | SYSTEM AND METHOD FOR EXTENDING CLOUD SERVICES INTO THE CUSTOMER PREMISE - A cloud extension agent can be provided on a customer premise for interfacing, via an outbound secure connection, cloud based services. The cloud extension agent can reach the cloud based services through existing firewall infrastructure, thereby providing simple, secure deployment. Furthermore, the secure connection can enable substantially real-time communication with a cloud service to provide web-based, substantially real time control or management of resources on the customer premises via the cloud extension agent. | 2016-04-07 |
20160099836 | Device Commissioning - The disclosed subject matter may provide a system and methods for commissioning a device or appliance into a network. A processor may detect the insertion of a removable device into a data receptacle of a first device. The first device may be an appliance or a network controller. Information may be retrieved from or delivered to the removable device. The information may be information specific to the appliance, such as model number, or may be information related to the network controller. For example, information delivered from the network controller to the removable device may include a network address assignment and network protocol to be used by an appliance when the appliance communicates with the network. The removable device may be removed from the first device and inserted into a data receptacle of a second device. | 2016-04-07 |
20160099837 | Method and System For Remote Device Management - A system for remote device management includes in a network an auto-configuration server managing device, at least one database, and a plurality of auto-configuration servers. The auto-configuration server managing device and the database are coupled in a communicative connection. The database holds information for identification of electronic devices. The auto-configuration server managing device is arranged for communication with a manageable electronic device over the network. The auto-configuration server manager is further being arranged for:
| 2016-04-07 |
20160099838 | METHOD AND SYSTEM FOR UTILIZING A BROADBAND GATEWAY FOR PEER TO PEER COMMUNICATIONS - A broadband gateway may be used to provide peer-to-peer communications with other broadband gateways. One or more peer-to-peer connections may be configured with each of the other broadband gateway, for use in peer-to-peer communications, which may be utilized to communicate shared content among the broadband gateways. Users may receive incentives for participating in peer-to-peer communications, comprising sharing credits and/or reduced charges. The broadband gateway may track and/or aggregate sharing credits based on communication of shared content. Peer-to-peer connections may be configured using at least one physical layer connection utilized by the broadband gateway in communicating with corresponding access network service provider. Peer-to-peer connections may also be configured using direct connections and/or links between the broadband gateways. The broadband gateway may generate a directory for use in conjunction with peer-to-peer operations. The directory may be presented via a user interface. The broadband gateway may generate and/or communicate peer-to-peer related alerts. | 2016-04-07 |
20160099839 | TARGET MAPPING AND IMPLEMENTATION OF ABSTRACT DEVICE MODEL - A Hardware Abstraction Layer (HAL) for a target computing device that is equipped with an Application Specific Integrated Circuit (ASIC) or other hardware element that provides forwarding and/or switching capability is used to analyze an abstract candidate device model. The abstract candidate device model is received from a controller and specifies intended forwarding behavior for the target device. The HAL analyzes the abstract candidate device model based on its knowledge of the architecture of the ASIC or other hardware element providing forwarding or switching capability to the target device. If the behavior is supported by the target device's architecture, the model may be implemented in a specific manner supported by that architecture and used to control forwarding behavior on the target device. | 2016-04-07 |
20160099840 | METHODS AND SYSTEMS FOR REDUCING BURST USAGE OF A NETWORKED COMPUTER SYSTEM - Methods and systems for reducing burst usage of a networked computer system are described herein. In an embodiment, resource requesters can request, within a time window, resources over a computer network before the resources are available. The resources can then be allocated in batch mode when the resources are available. Thus, resource requests do not have to be processed in real-time, and resource requests can be received before the resources are available. | 2016-04-07 |
20160099841 | DEVICE HIERARCHY BUILDING FOR A REMOTE TERMINAL UNIT - A system constructs a hierarchy for field devices communicatively coupled to a remote terminal unit (RTU) by retrieving device information from field devices, caching the device information in the memory of the RTU, storing device identities in the memory of a host machine, and obtaining the device information at the host from the RTU in response to subsequent user requests to build the hierarchy, without re-sending commands to retrieve the device information directly to the field devices. | 2016-04-07 |
20160099842 | INTERSYSTEM AUTOMATED-DIALOG AGENT - A computing platform may receive, from a user device, data comprising a natural-language response input by a user, via the user device, in response to a natural-language prompt generated by the computing platform. The computing platform may determine, based on the data, a recommended action for the user. The computing platform may generate, based on the data, a natural-language response to the natural-language response input by the user. The natural-language response to the natural-language response input by the user may identify the recommended action. | 2016-04-07 |
20160099843 | INTERSYSTEM AUTOMATED-DIALOG AGENT - A computing platform may receive, from a user device, data comprising a natural-language response input by a user, via the user device, in response to a natural-language prompt generated by the computing platform. The computing platform may determine, based on the data, a recommended action for the user. The computing platform may generate, based on the data, a natural-language response to the natural-language response input by the user. The natural-language response to the natural-language response input by the user may identify the recommended action. In some embodiments, the computing platform may determine a recommended next action for the user. In such embodiments, the computing platform may generate a natural-language prompt identifying the recommended next action, and may communicate, to the user device, the natural-language prompt identifying the recommended next action. | 2016-04-07 |
20160099844 | CLOUD ASSIST FOR STORAGE SYSTEMS - Systems, methods, and computer readable storage mediums for using a cloud assist service to generate a read-only GUI to view the status of a storage system. An authorized user can login remotely to the cloud assist service to view the read-only GUI of the storage system. The read-only GUI will present a view of the status of the storage system that is similar to a local GUI available to users connecting directly to the storage system. Responses used to generate the local GUI are recorded and simulated by the cloud assist service to create a familiar read-only GUI. | 2016-04-07 |
20160099845 | USER INTERRACE PROVIDING INFORMATION SYSTEM TOPOLOGY PRESENTATION - A user interface includes a graphical topological representation of an information system. Information is collected regarding connections between switches, storage nodes and computer nodes in the information system. Any sub networks in the system are identified based on the collected information and classified as LANs or SANs. Connections between the various components are determined, and a layout of any identified LANs, computer nodes, SANs, and storage nodes is established for generating the topological representation in the user interface. The graphical topological representation of the information system is displayed in the user interface with the LAN icons, computer node icons, SAN icons and storage node icons laid out in a matrix-like arrangement of columns and rows, such that for LANs, computer nodes, SANs and/or storage nodes that are connected to each other, the corresponding icons are located on or near a same row in the graphical topological representation. | 2016-04-07 |
20160099846 | Managing Network Bandwidth Based on Cognitive Analysis of Site Content Against Organizational Needs - An approach is provided in which a network bandwidth manager receives a first request to access site content from a source site over a computer network. The network bandwidth manager analyzes the site content against a domain corpora that corresponds to one or more organizational needs of an organization. When the network bandwidth manager receives a second request corresponding to the source site, the network bandwidth manager modifies a quality of service of the computer network to access the source site based upon the previous analysis. In turn, the network bandwidth manager provides access to the source site over the computer network utilizing the modified quality of service. | 2016-04-07 |
20160099847 | METHOD FOR NON-DISRUPTIVE CLOUD INFRASTRUCTURE SOFTWARE COMPONENT DEPLOYMENT - The subject technology provides embodiments for defining, using a first application programming interface (API), a logical resource variant of a logical service resource. The logical resource variant is registered at a defining entity. Software components for the logical resource variant are then sent to a Infrastructure as a Service (IaaS) system to associate the software components with the logical resource variant. A call, from a second API, is received to enable create, read, update and delete (CRUD) operations for the logical resource variant. An instantiating entity is assigned for the logical resource variant of the logical service resource. It is then requested to the assigned instantiating entity to instantiate and configure the logical resource variant of the logical service resource. | 2016-04-07 |
20160099848 | SYSTEMS AND METHODS OF CLASSIFYING SESSIONS - Systems and methods of classifying sessions are disclosed. A particular method monitors user activity at one or more servers accessible via a network and capturing event entries in an activity log for user activity that is detected. The event entries include descriptive information regarding a user action, a client identifier and a session identifier. The method also includes attempting to classify sessions associated with a plurality of event entries of the activity log as legitimate use or illegitimate use of resources of the one or more servers. The method further includes identifying unclassified sessions. The method also includes determining a count of a number of unclassified sessions associated with a particular client identifier and determining a total number of sessions associated with the particular client identifier. The method further includes classifying the unclassified sessions as legitimate use or illegitimate use of the resources of the one or more servers. | 2016-04-07 |
20160099849 | Dynamic Reconfigurable Client Side Beaconing - Some embodiments provide a monitoring system for a distributed platform. The monitoring system dynamically controls the monitoring and reporting function of client applications running on user devices using a plurality of configurations. The system distributes different configurations to different client applications to control the monitoring and reporting of each client application independently. The system distributes different configurations to the same client application at different times in order to dynamically reconfigure the reporting function of that client application. The system compiles metrics from the client applications in order to generate custom performance reports for different content providers and identify performance issues. In response to a detected issue, the system can automatically reconfigure affected client applications to better diagnose the issue with increased reporting. The system can also issue alerts for others to take corrective action. The system can also self-heal by commanding operation of the affected client applications. | 2016-04-07 |
20160099850 | ABSTRACT ACTIVITY COUNTER - In order to provide a more realistic system activity score, an activity monitor gathers activity scores from a plurality of processes on one or more communication systems. An activity score defines an activity level of a particular process. For example, how many cache hits per second are occurring in a communication system or how may a HTTP sessions a web server is handling per second. Because the activity scores are gathered from individual processes within the communication system(s), a more realistic understanding of the overall activity of the communication system(s) can be determined. The gathered activity scores are summed to produce a system activity score. The system activity score is then sent to a user. The user can then utilize the system activity score to better manage the communication system(s). | 2016-04-07 |
20160099851 | METHOD AND SYSTEM FOR OPTICAL CONNECTION VALIDATION IN A RECONFIGURABLE OPTICAL ADD-DROP MULTIPLEXER (ROADM) NODE - A method of validating connections in an optical add/drop multiplexer (OADM) that includes a plurality of modules configured to route optical signals through the OADM, and at least one multi-fiber cable connecting modules of the OADM. A light source coupled to a first port of a first module is controlled to emit a test light. A determination is made whether or not the test light is received at a first photo-detector connected to a second port. Continuity of a connection between the first port and the second port is validated when the test light is received at the first photo-detector. | 2016-04-07 |
20160099852 | Apparatus and Method for Identifying Domain Name System Tunneling, Exfiltration and Infiltration - A machine includes a processor and a memory connected to the processor. The memory stores instructions executed by the processor to preserve a second level domain, track requests for subdomains of the second level domain, determine the size of encoded subdomain data and determine the size of response data for subdomain requests. When the ratio of the number of unique subdomains versus the number of subdomain requests is over a first threshold a first satisfied condition is established. It is determined, in response to the first satisfied condition, when the size of the subdomain data exceeds a second threshold and the size of response data exceeds a third threshold to establish a second satisfied condition corresponding to deemed domain name system tunnel activity. It is determined, in response to the first satisfied condition, when the size of the subdomain data exceeds the second threshold to establish a third satisfied condition corresponding to deemed domain name system data exfiltration activity. | 2016-04-07 |
20160099853 | ACTIVE AND PASSIVE DATAPLANE PERFORMANCE MONITORING OF SERVICE FUNCTION CHAINING - The present disclosure describes a technique for performing performance monitoring of service chains. Variations on performance monitoring can include: passive monitoring, active monitoring, or hybrid monitoring. To provide performance monitoring, the Network Service Header (NSH) is modified to include telemetry information usable for monitoring the performance of a particular traffic flow being transported over a service path. | 2016-04-07 |
20160099854 | DIGITAL CONTENT CONSUMPTION ANALYSIS - Content consumption session progress is predicted based on historical observations of how users have interacted with a repository of digital content. This is approached as a matrix completion problem. Information extracted from tracking logs maintained by one or more content providers is used to estimate the extent to which various content items are consumed. The extracted session progress data is used to populate a session progress matrix in which each matrix element represents a session progress for a particular user consuming a particular content item. This matrix, which in principle will be highly (≳95%) sparse, can be completed using a collaborative filtering matrix completion technique. The values obtained as a result of completing the session progress matrix represent predictions with respect to how much of a given content item will be consumed by a given user. | 2016-04-07 |
20160099855 | HYBRID CONTENT DELIVERY SYSTEM - Methods and systems for delivering content are generally described. In an example, a processor may receive a first request from a first device. The first request may be a request for the content. The processor may further send at least a first chunk of content data to the first device. The content data may be associated with the content. The processor may further receive a second request from a second device. The second request may be for the content. The processor may further send an identification of the first device to the second device. The processor may further send an instruction to the second device. The instruction may be effective to establish a communication channel between the first device and the second device in order for a second chunk of the content data to be sent from the first device to the second device through the communication channel. | 2016-04-07 |
20160099856 | FUSING ONLINE MEDIA MONITORING DATA WITH SECONDARY ONLINE DATA FEEDS TO GENERATE RATINGS DATA FOR ONLINE MEDIA EXPOSURE - Methods, apparatus, systems, storage media, etc., to fuse online media monitoring data with secondary online data feeds to generate ratings data for online media exposure are disclosed. Example methods disclosed herein to determine ratings data for online media exposure include accessing timestamps included in monitoring data obtained by monitoring exposure to online media. Such example methods also include searching a secondary online data feed using the timestamps included in the monitoring data for data entries associated with exposure to the online media. Such example methods further include fusing the data entries from the secondary online data feed with the monitoring data to generate the ratings data for online media exposure. | 2016-04-07 |
20160099857 | Method and System to Monitor a Network - A method of monitoring a network includes receiving by a user plane record aggregator first data associated with a user plane packet, the first data being selected by a user plane network element from second data, the second data being stored in a plurality of information fields, the plurality of information fields being associated with the user plane network element, the second data being obtained by the user plane network element from user plane traffic, the user plane network element processing the user plane packet in accordance with a user plane network function. The method further includes determining by an aggregation device a characteristic associated with the user plane traffic from the first data, thereby monitoring the user plane traffic without requiring a tap. | 2016-04-07 |
20160099858 | Span Session Monitoring - A monitoring session associated with a virtual nickname may be established in a TRILL network. A monitoring station may be connected to an edge switch of the TRILL network specifying the virtual nickname for the monitoring session. The monitoring station is set as a destination for the monitoring session and the virtual nickname is flooded throughout the TRILL network. A source may then be configured to the monitoring session by specifying the virtual nickname of the monitoring session without knowing the destination tied to the monitoring session. Network traffic through the source may then be forwarded to the destination tied to the monitoring session. | 2016-04-07 |
20160099859 | Reverse Path Validation for Source Routed Networks - A packet forwarding validation method comprising receiving a data packet that comprises a next-hop index and a plurality of next-hop identifiers, wherein the next-hop index references a next-hop identifier from the plurality of next-hop identifiers, and wherein the plurality of next-hop identifiers indicates a sequence of next-hops through a network for the data packet, identifying a previous-hop network node using the next-hop index and the plurality of next-hop identifiers, determining a transmitter network node of the data packet, comparing the previous-hop network node and the transmitter network node, detecting a forwarding error when the previous-hop network node and the transmitter network node are not the same, and processing the data packet when the previous-hop network node and the transmitter network node are the same. | 2016-04-07 |
20160099860 | NETWORK ENTITY FOR PROGRAMMABLY ARRANGING AN INTERMEDIATE NODE FOR SERVING COMMUNICATIONS BETWEEN A SOURCE NODE AND A TARGET NODE - The invention relates to a network entity for programmably arranging an intermediate node for serving communications between a source node and a target node in a communication network comprising a plurality of intermediate nodes arranged in a plurality of communication paths between the source node and the target node, the network entity comprising a metric determiner for determining a first metric of a first communication path and a second metric of a second communication path from the plurality of communication paths, the metric determiner being further configured to compare the first metric and the second metric and to select the communication path which is associated with the lesser metric, and a processor being configured to select an intermediate node arranged in the selected communication path to obtain a selected intermediate node, and to programmably arrange the selected intermediate node. | 2016-04-07 |
20160099861 | SYSTEMS AND METHODS FOR PERFORMING LAYER ONE LINK AGGREGATION OVER WIRELESS LINKS - A first layer one link aggregation master comprises a first port coupled to receive customer traffic; a first channel; a second channel; an aggregation engine coupled to the first and second channels; a first switch circuit coupled to the first port and to the first channel, and configured to communicate the customer traffic from the first port over the first channel to the aggregation engine, the aggregation engine including a splitter circuit configured to use layer one information to segment at least a portion of the customer traffic into a first virtual container and a second virtual container, the aggregation engine further including an encapsulation circuit configured to encapsulate the second virtual container using Ethernet standards for transport over the second channel; a radio access card configured to generate an air frame based on the first virtual container for wireless transmission over a first wireless link of a link aggregation group to the receiver; and a second switch circuit coupled to the second channel, and configured to communicate the Ethernet-encapsulated second virtual container over an Ethernet cable to a slave for wireless transmission over a second wireless link of the link aggregation group to the receiver. | 2016-04-07 |
20160099862 | REDUNDANT NETWORK FORMATION - Redundant links in a network of devices are established. A plurality of devices in the network is configured for communicating data through primary links coupling devices of said plurality of devices. A designated device is configured to receive device data from the plurality of devices. The designated device is further configured to identify a set of devices from the plurality of devices that is operable to establish redundant links in the network. The designated device is further configured to determine configuration data for each device in the set of devices. The designated device is further configured to send the configuration data to the set of devices. The configuration data is operable to establish redundant links for devices in the set of devices in case of a primary link failure. | 2016-04-07 |
20160099863 | SYSTEM ANALYZER AND METHOD FOR ANALYZING AN IMPACT OF A CHANGE IN A COMPONENT OF A DISTRIBUTED CONTROL SYSTEM - A system analyzer and a method for analyzing an impact of a change in a component of a distributed control system (DCS) are disclosed. The system can collect and store data representing the DCS components and their interconnection as well as signals of the DCS components. The DCS can be graphically modeled with nodes and directed edges, wherein a node represents either a type of DCS component or a signal of a DCS components, and wherein an edge is an “influence”-edge, or a “contains”-edge. Information on a change of a DCS components is received, a depth first or breadth first search is performed over the “influence”-edges and “contains”-edges and determine unchanged DCS components which would be affected by a malfunction, a removal or a taking out of operation of the at least one DCS component, and information on the affected DCS components is transmitted to an operator interface. | 2016-04-07 |
20160099864 | SELECTIVE SERVICE BYPASS IN SERVICE FUNCTION CHAINING - In one embodiment, a method includes identifying a failure of a service function at a service node in a service chain, receiving a packet at the service node, and processing the packet at the service node according to a flag associated with the service function and set based on a criticality of the service function. An apparatus is also disclosed herein. | 2016-04-07 |
20160099865 | REROUTING TUNNEL TRAFFIC IN COMMUNICATION NETWORKS - Methods, apparatus, systems and articles of manufacture (e.g., physical storage media) to reroute tunnel traffic in a network are disclosed. Example methods disclosed herein include, in response to detecting an event associated with routing first traffic in the network, determining a plurality of paths to carry respective traffic for a plurality of tunnels between pairs of routers in the network, the plurality of paths being determined based on a quality metric characterizing an aggregate tunnel bandwidth to be carried by the plurality of paths for the plurality of tunnels. Such disclosed example methods also include sending first routing information describing the plurality of paths to the routers in the network to cause the routers to route the respective traffic for the plurality of tunnels using the plurality of paths. | 2016-04-07 |
20160099866 | PRIORITY DATA TRANSMISSION THROUGH REDUNDANT NETWORK - A plurality of devices forms a communication network. The plurality of devices is networked via their respective primary link. The plurality of devices is configured to revert to a redundant network upon a primary link associated with a first device in the plurality of devices failing. A second device in the plurality of devices is configured to transmit a plurality of different types of data having different priorities to the first device through the primary link associated with the first device when the primary link associated with the first device is operational. The second device is further configured to reroute a subset of the plurality of different types of data based on the priorities of the plurality of different types of data through the redundant network in response to the primary link associated with the first device failing. | 2016-04-07 |
20160099867 | DATA PLANE LEARNING OF BI-DIRECTIONAL SERVICE CHAINS - Techniques are provided to decouple service chain structure from the underlying network forwarding state and allow for data plane learning of service chain forwarding requirements and any association between services function state requirements and the forward and reverse forwarding paths for a service chain. In a network comprising a plurality of network nodes each configured to apply a service function to traffic that passes through the respective network node, a packet is received at a network node. When the network node determines that the service function it applies is stateful, it updates context information in a network service header of the packet to indicate that the service function applied at the network node is stateful and that traffic for a reverse path matching the classification criteria is to be returned to the network node. | 2016-04-07 |
20160099868 | METHOD FOR PROCESSING PACKET AND FORWARDER - Embodiments of the present invention provide a method for processing a packet in a software-defined network (Software-Defined Network), where the method is performed by a forwarder, and the method includes: receiving an input packet; determining a flow to which the input packet belongs according to the input packet; determining a context identifier set corresponding to the flow to which the input packet belongs according to a first correspondence between flows and context identifier sets, where a context identifier set corresponding to each flow in the first correspondence includes at least one context identifier; determining a context corresponding to the context identifier set according to a second correspondence between context identifiers and contexts; and processing the input packet according to the context corresponding to the context identifier set. | 2016-04-07 |
20160099869 | SYSTEM AND METHOD FOR AGGREGATING PSEUDOWIRES - Systems, methods, architectures and/or apparatus for implementing Multi-Segment Pseudo Wire (MS-PW) arrangements in an efficient and scalable manner. | 2016-04-07 |
20160099870 | SYSTEMS AND METHODS FOR ROUTING INFORMATION IN AN INFORMATION HANDLING SYSTEM USING EXTENDED L3 LOOKUP TABLES - An information handling system is provided. The information handling system includes a plurality of forwarding processors, the plurality of forwarding processors each including a memory having a forwarding host table and a forwarding route table. The information handling system also includes at least one switching device coupled to the plurality of forwarding processors, the at least one switching device including a memory having a destination module and port table, a switching device host table and a switching device route table, wherein the at least one switching device is configured to perform an extended lookup in at least one of the switching device host table and switching device route table based on values included in a fabric header of information routed to the switching device to determine a destination of the information. A method for extending lookup tables is also provided that adds lookup tables in a switching device. | 2016-04-07 |
20160099871 | SIP LOAD BALANCING - An Interrogating Call Session Control Function (“I-CSCF”) server load balances Session Initiation Protocol (“SIP”) users over an Internet Protocol Multimedia Subsystem (“IMS”) network. The I-CSCF server establishes a Diameter connection between a first Serving Call Session Control Function (“S-CSCF”) server and receives a dynamically adjusted capacity and a status information from the first S-CSCF server. The I-CSCF server further receives from user equipment a request to initiate a SIP communication session over the IMS network. The I-CSCF server then selects an assigned S-CSCF server for the SIP communication session based at least on the dynamically adjusted capacity and the status information | 2016-04-07 |
20160099872 | FAST ADJUSTING LOAD BALANCER - Some embodiments of the invention provide a load balancer for distributing packet flows that are addressed to a group of data compute nodes (DCNs) amongst the DCNs of the group. In some embodiments, the load balancer includes a connection data storage comprising several different destination network address translation (DNAT) tables. Each particular DNAT table is defined at a particular instance in time and stores the identity of a plurality DCNs that are part of the group at the particular instance in time. Each time a DCN is added to the group, the load balancer of some embodiments creates a new DNAT table in the connection data storage for processing new packet flows, while using previously created DNAT tables to process packets that are part of previously processed packet flows. | 2016-04-07 |
20160099873 | Technique of Operating a Network Node for Load Balancing - According to one aspect of the present disclosure, a method of operating a network node of a communication network is provided, the network node being connected to a downstream network node, and to a non-downstream loop free alternate (LFA) network node comprising a load balancing identifier indicating whether it is allowed to load balance the data packet via a non-downstream LFA net-work node or not; changing, if the load balancing identifier indicates that it is allowed to load balance the data packet via a non-downstream LFA network node, and if the network node decides to load balance the data packet via the non-downstream LFA network node, the load balancing identifier of the data packet such that it indicates that a further load balancing of the data packet via a further non-downstream LFA network node is not allowed; and forwarding the thus modified data packet to the non-downstream LFA network node. | 2016-04-07 |
20160099874 | DATA PACKET ROUTING METHOD AND DEVICE - The present invention provides a data packet routing method and device. When a Switch receives, form an SE, a traffic flow on which service processing is performed, the Switch can determine a forwarding rule of a corresponding service chain according to the traffic flow received from the SE, and route, according to the forwarding rule, a data packet received from the SE. Compared with a case in the prior art in which an SPC needs to deliver a forwarding rule corresponding to each traffic flow to a Switch, the embodiments of the present invention adopt the technical solutions in which the SPC only needs to deliver a forwarding rule corresponding to each service chain to the Switch, thereby reducing signaling interaction between the SPC and the Switch and saving a network overhead. | 2016-04-07 |
20160099875 | SYSTEMS AND METHODS FOR PROVIDING QUALITY OF SERVICE TO RFID - Embodiments of the present invention include systems and methods for providing Quality of service to RFID. In one embodiment the present invention includes a method of providing quality of service in an RFID network comprising storing RFID priority information corresponding to the RFID network, wherein the RFID network comprises one or more tags and one or more readers mapping the RFID priority information into priority information corresponding to a second network. | 2016-04-07 |
20160099876 | TRANSFERRING DIGITAL DATA TO AND FROM MOBILE CLIENT DEVICES - The disclosure includes a system and method for communicating digital data to a mobile client device. The system includes a processor and a memory storing instructions that, when executed, cause the system to: determine an operation state of a mobile client device; determine digital data to transmit to the mobile client device based on the operation state; determine a location associated with the mobile client device; determine a data transfer capacity associated with the mobile client device at the location; determine a data consumption rate associated with the mobile client device; determine a data transfer rate for the mobile client device based on the data transfer capacity and the data consumption rate; and transfer the digital data to the mobile client device based on the operation state and the data transfer rate. | 2016-04-07 |
20160099877 | INTERCONNECT FLOW CONTROL - A communication technique which includes determining, at least in part by comparing data associated with a packet that has been pulled from a received packet queue with a highest sequence number among packets that have been placed in the received packet queue, that the received packet queue has space available to receive a further packet. A receiver with which the received packet queue is associated is sent, based at least in part on the determination, a next packet. | 2016-04-07 |
20160099878 | INSTANTANEOUS RANDOM EARLY DETECTION PACKET DROPPING WITH DROP PRECEDENCE - A circuit that receives queue number that indicates a queue stored within a memory unit and a packet descriptor that includes a drop precedence value, and in response determines an instantaneous queue depth of the queue. The instantaneous queue depth and drop precedence value are used to determine a drop probability. The drop probability is used to randomly determine if the packet descriptor should be stored in the queue. When a packet descriptor is not stored in a queue the packet associated with the packet descriptor is dropped. The queue has a first queue depth range. A first drop probability is used when the queue depth is within the first queue depth range and the drop precedence is equal to the first value. A second drop probability is used when the queue depth is within the first queue depth range and the drop precedence equal to a second value. | 2016-04-07 |
20160099879 | SYSTEM AND METHOD FOR MANAGING BITRATE ON NETWORKS - A method and system for managing bitrate of network traffic are provided. The method for managing bitrate of network traffic includes: receiving a packet; retrieving metadata from the packet and associating the packet with at least one traffic aggregate; determining a drop rate for the at least one traffic aggregate based on network flow data; and determining, based on the drop rate and the metadata, to forward or drop the packet. The system includes a packet processing module configured to receive a packet; a deep packet inspection module configured to retrieve metadata from the packet and associate at least on traffic aggregate with the packet; a control module configured to determine a drop rate for the at least one traffic aggregate based on network flow data; and a policy decision module configure to determine whether to forward or drop the packet based on the drop rate and the metadata of the packet. | 2016-04-07 |
20160099880 | GLOBAL RANDOM EARLY DETECTION PACKET DROPPING BASED ON AVAILABLE MEMORY - An apparatus and method for receiving a packet descriptor and a queue number that indicates a queue stored within a memory unit, determining a first amount of free memory in a group of packet descriptor queues, determining if the first amount of free memory is within a first range, applying a first drop probability to determine if the packet associated with the packet descriptor should be dropped when the first amount of free memory is within the first range, and applying a second drop probability to determine if the packet should be dropped when the first amount of free memory is within a second range. When it is determined that the packet is to be dropped, the packet descriptor is not stored in the queue. When it is determined that the packet is not to be dropped, the packet descriptor is stored in the queue. | 2016-04-07 |
20160099881 | PACKET STORAGE DISTRIBUTION BASED ON AVAILABLE MEMORY - A method for receiving a packet descriptor including a priority indicator and a queue number indicating a queue stored within a first memory unit, storing a packet associated with the packet descriptor in a second memory, determining a first amount of free memory in the first memory unit, determining if the first amount of free memory is above a threshold value, writing the packet from the second memory to a third memory when the first amount of memory is above the threshold value and the priority indicator is equal to a first value, not writing the packet from the second memory unit to the third memory unit if the first amount of memory is below the threshold value or when the priority indicator is equal to a second value. The priority indicator is equal to a first value for high priority packets and a second value for low priority packets. | 2016-04-07 |
20160099882 | SIMULTANEOUS QUEUE RANDOM EARLY DETECTION DROPPING AND GLOBAL RANDOM EARLY DETECTION DROPPING SYSTEM - A method for receiving a packet descriptor associated with a packet and a queue number indicating a queue stored within a memory unit, determining a priority level of the packet and an amount of free memory available in the memory unit. Applying a global drop probability to generate a global drop indicator and applying a queue drop probability to generate a queue drop indicator. The global drop probability is a function of the amount of free memory. The queue drop probability is a function of instantaneous queue depth or drop precedence value. The packet is transmitted whenever the priority level is high. When the priority level is low, the packet is transmitted when both the global drop indicator and the queue drop indicator are a logic low value. When the priority level is low, the packet is not transmitted when either drop indicator is a logic low value. | 2016-04-07 |
20160099883 | CONFLICT AVOIDANT TRAFFIC ROUTING IN A NETWORK ENVIRONMENT - An example method for facilitating conflict avoidant traffic routing in a network environment is provided and includes detecting, at a network element, an intent conflict at a peer network element in a network, and changing a forwarding decision at the network element to steer traffic around the conflicted peer network element. The intent conflict refers to an incompatibility between an asserted intent associated with the traffic and an implemented intent associated with the traffic. In specific embodiments, the detecting includes mounting rules from the peer network element into the network element, and analyzing the mounted rules to determine intent conflict. In some embodiments, a central controller in the network deploys one or more intentlets on a plurality of network elements in the network according to corresponding intent deployment parameters. | 2016-04-07 |
20160099884 | RESOURCE SUBSTITUTION AND REALLOCATION IN A VIRTUAL COMPUTING ENVIRONMENT - A host system reallocates resources in a virtual computing environment by first receiving a request to reallocate a first quantity of a first resource type. Next, potential trade-off groups are evaluated and a trade-off group is selected based on the evaluation. The selected trade-off group includes a set of applications running in the virtual computing environment that can use one or more alternate resource types as a substitute for the first quantity of the first resource type. After the selection, the host system reallocates the first quantity of the first resource type from the trade-off group. This reallocation may be made from the trade-off group to either a first application running in the virtual computing environment or the host system itself. If the reallocation is to the host system, then the total quantity of the first resource type allocated to applications running in the virtual computing environment is thereby reduced. | 2016-04-07 |
20160099885 | METHOD AND APPARATUS FOR ALLOCATING NETWORK MEDIUM RESOURCES - A method for estimating allocatable network medium data resources is disclosed. The method is performed at an apparatus having one or more processors and memory for storing programs to be executed by the one or more processors. The method includes receiving a screening condition that includes at least one dimension from a set of dimensions of the network medium data resources. The method also includes obtaining allocation data of the network medium data resources, where the allocation data includes at least allocatable network medium data resources within a predefined geographical region, allocatable network medium data resources associated with a predefined content, a total volume of the allocatable network medium data resources, and a set of ratios associated with the set of dimensions. The method further includes calculating an estimated allocatable resource volume of the network medium data resources for the screening condition using the obtained allocation data. | 2016-04-07 |
20160099886 | MASTER BASEBOARD MANAGEMENT CONTROLLER ELECTION AND REPLACEMENT SUB-SYSTEM ENABLING DECENTRALIZED RESOURCE MANAGEMENT CONTROL - An information handling system and method of a master baseboard management controller election and replacement sub-system (MBMCERS) enables decentralized resource management control via the elected master baseboard management controller (BMC). The information handling system includes a plurality of server nodes, each having a BMC capable of controlling a plurality of shared common resources among the plurality of server nodes. Each BMC has a unique BMC identification. A master register stores BMC identification that has been elected as the master BMC to control the shared common resources. The master BMC relinquishes control of the shared common resources when the master register is placed in the reset state. When the master register is in the reset state, any one of the BMCs can elect to become a replacement master BMC. | 2016-04-07 |