Patent application number | Description | Published |
20080225740 | Detection of heavy users of network resources - A device includes a multistage filter and an elephant trap. The multistage filter has hash functions and an array. The multistage filter is operable to receive a packet associated with a candidate heavy network user and send the packet to the hash functions. The hash functions generate hash function output values corresponding to indices in the array. The elephant trap is connected to the multistage filter. The elephant trap includes a buffer and probabilistic sampling logic. The probabilistic sampling logic is operable to attempt to add information associated with the packet to the buffer a particular percentage of the time based in part on the result of the multistage filter lookup. The buffer is operable to hold information associated with the packet, counter information, and timestamp information. | 09-18-2008 |
20110064407 | Power save mode for lightpaths - A method for communicating optically between nodes of an optical network, including forming, between a first node and a second node of the network, a set of lightpaths, each of the set of lightpaths having a respective configuration, and transferring communication traffic between the first and second nodes via the set of lightpaths. The method also includes forming a determination for the set of lightpaths that a communication traffic level associated therewith is less than a predetermined threshold, and in response to the determination, removing a lightpath having a given configuration from the set of lightpaths to form a reduced set of lightpaths. The method further includes transferring the communication traffic between the first and second nodes via the reduced set of lightpaths, while reducing a level of power consumption in the removed lightpath and while maintaining the given configuration of the removed lightpath. | 03-17-2011 |
20110087779 | DETECTION OF HEAVY USERS OF NETWORK RESOURCES - A device includes a multistage filter and an elephant trap. The multistage filter has hash functions and an array. The multistage filter is operable to receive a packet associated with a candidate heavy network user and send the packet to the hash functions. The hash functions generate hash function output values corresponding to indices in the array. The elephant trap is connected to the multistage filter. The elephant trap includes a buffer and probabilistic sampling logic. The probabilistic sampling logic is operable to attempt to add information associated with the packet to the buffer a particular percentage of the time based in part on the result of the multistage filter lookup. The buffer is operable to hold information associated with the packet, counter information, and timestamp information. | 04-14-2011 |
20110131655 | DETECTION OF FREQUENT AND DISPERSED INVARIANTS - A scalable method and apparatus that detects frequent and dispersed invariants is disclosed. More particularly, the application discloses a system that can simultaneously track frequency rates and dispersion criteria of unknown invariants. In other words, the application discloses an invariant detection system implemented in hardware (and/or software) that allows detection of invariants (e.g., byte sequences) that are highly prevalent (e.g., repeating with a high frequency) and dispersed (e.g., originating from many sources and destined to many destinations). | 06-02-2011 |
20110222402 | ETHERNET EXTENSION FOR THE DATA CENTER - The present invention provides methods and devices for implementing a Low Latency Ethernet (“LLE”) solution, also referred to herein as a Data Center Ethernet (“DCE”) solution, which simplifies the connectivity of data centers and provides a high bandwidth, low latency network for carrying Ethernet and storage traffic. Some aspects of the invention involve transforming FC frames into a format suitable for transport on an Ethernet. Some preferred implementations of the invention implement multiple virtual lanes (“VLs”) in a single physical connection of a data center or similar network. Some VLs are “drop” VLs, with Ethernet-like behavior, and others are “no-drop” lanes with FC-like behavior. Some preferred implementations of the invention provide guaranteed bandwidth based on credits and VL. Active buffer management allows for both high reliability and low latency while using small frame buffers. Preferably, the rules for active buffer management are different for drop and no drop VLs. | 09-15-2011 |
20110273983 | METHODS AND DEVICES FOR BACKWARD CONGESTION NOTIFICATION - The present invention provides improved methods and devices for managing network congestion. Preferred implementations of the invention allow congestion to be pushed from congestion points in the core of a network to reaction points, which may be edge devices, host devices or components thereof. Preferably, rate limiters shape individual flows of the reaction points that are causing congestion. Parameters of these rate limiters are preferably tuned based on feedback from congestion points, e.g., in the form of backward congestion notification (“BCN”) messages. In some implementations, such BCN messages include congestion change information and at least one instantaneous measure of congestion. The instantaneous measure(s) of congestion may be relative to a threshold of a particular queue and/or relative to a threshold of a buffer that includes a plurality of queues. | 11-10-2011 |
20120047279 | Media-Aware and TCP-Compatible Bandwidth Sharing for Video Streaming - Media-aware and TCP-compatible bandwidth sharing may be provided. In various embodiments, a network node may periodically update a virtual congestion level for a transmission stream in a network. The transmission stream may comprise at least one video stream and at least one data stream. The network node may then calculate, based at least in part on the virtual congestion level, a random packet marking probability or a random packet drop probability. In turn, the network node may either drop or mark transmission packets according to the calculated marking and dropping probability. The network node may further calculate an optimal video transmission rate for the at least one video stream and adjust a video transmission rate for the at least one video stream accordingly. Rate-distortions parameters for the at least one video stream may influence the optimal video transmission rate calculation for the at least one video stream. | 02-23-2012 |
20130107728 | User Behavior Model and Statistical Transition Map to Assist Advanced WLAN Applications | 05-02-2013 |
20130151563 | NETWORK-BASED DYNAMIC DATA MANAGEMENT - In one embodiment, a router operating in a hierarchically routed computer network may receive collected data from one or more hierarchically lower devices in the network (e.g., hierarchically lower sensors or routers). The collected data may then be converted to aggregated metadata according to a dynamic schema, and the aggregated metadata is stored at the router. The aggregated metadata may also be transmitted to one or more hierarchically higher routers in the network. Queries may then be served by the router based on the aggregated metadata, accordingly. | 06-13-2013 |
20130212212 | APPLICATION CONTEXT TRANSFER FOR DISTRIBUTED COMPUTING RESOURCES - In one embodiment, a universal programming module on a first device collects context and state information from a local application executing on the first device, and provides the context and state information to a context mobility agent on the first device. The context mobility agent establishes a peer-to-peer connection with a second device, and transfers the context and state information to the second device, such that a remote application may be configured to execute according to the transferred context and state information from the first device. In another embodiment, the context mobility agent receives remote context and remote state information from the second device, wherein the remote application had been executing according to the remote context and remote state information, and provides the remote context and remote state information to the universal programming module to configure the local application to execute according to the remote context and remote state information. | 08-15-2013 |
20130215942 | APPLICATION-AWARE DYNAMIC BIT-LEVEL ERROR PROTECTION FOR MODULATION-BASED COMMUNICATION - In one embodiment, a device (e.g., a transmitter) determines a level of error protection of each bit position within symbols of a particular constellation map used for modulation-based communication, and also determines priority levels of application data bits to be placed into a communication frame. Application data bits may then be placed into symbols of the communication frame, where higher priority application data bits are placed into bit positions with greater or equal levels of protection than bit positions into which lower priority application data bits are placed. The communication frame may then be transmitted to one or more receivers with an indication of how to decode the placement of the application data bits within the symbols. In another embodiment, the particular constellation map may be dynamically selected from a plurality of available constellation maps, such as based on communication channel conditions and/or applications generating the data. | 08-22-2013 |
20130301584 | SYSTEM AND METHOD FOR ENABLING A VEHICULAR ACCESS NETWORK IN A VEHICULAR ENVIRONMENT - A method includes joining a vehicular access network (VAN) comprising cooperative communication between a plurality of on-board units (OBU) in respective vehicles, scanning the VAN to pick up a coverage of at least one infrastructure access point (IAP), which operates on a control channel in a radio access tree (RAT) comprising a plurality of cells, listening to a channel allocation information from the IAP that includes a request for a mobile cell gateway (MCG) at a nominal location in the RAT, and sending a candidacy message to the at least one IAP to become an MCG. Certain embodiments include establishing the VAN in a highway, and in urban areas, aggregating traffic in a cell and transmitting to the IAP via the MCG, and other features. | 11-14-2013 |
20130329577 | SYSTEM AND METHOD FOR DISTRIBUTED RESOURCE CONTROL OF SWITCHES IN A NETWORK ENVIRONMENT - An example method includes sending a virtual output queue (VOQ) length of a VOQ to an egress chip. The VOQ relates to a flow routed through an egress port associated with the egress chip. The method also includes receiving fair share information for the VOQ from the egress chip, and enforcing a control action on the incoming packets based on the fair share information. An ingress chip and the egress chip can be provided in a VOQ switch. The control action is a selected one of a group of actions, the group consisting of: (a) dropping packets, (b) pausing packets, and (c) marking packets. The method can further include receiving VOQ lengths of corresponding VOQs from respective ingress chips, where the VOQs relate to the flow. The method can also include calculating respective fair share information for each VOQ, and sending the fair share information to the respective ingress chips. | 12-12-2013 |
20140022901 | SMART PAUSE FOR DISTRIBUTED SWITCH FABRIC SYSTEM - Techniques for improving the performance of flow control mechanisms such as Pause are provided. The techniques provide for maintaining a fair distribution of available bandwidth while also allowing for fewer packet drops, and maximizing link utilization, in a distributed system. For example, in one embodiment, techniques are provided for achieving a fair share allocation of an egress port's bandwidth across a plurality of ingress ports contending for the same egress port. | 01-23-2014 |
20140211681 | SYSTEM AND METHOD FOR VIDEO DELIVERY OVER HETEROGENEOUS NETWORKS WITH SCALABLE VIDEO CODING FOR MULTIPLE SUBSCRIBER TIERS - A method is provided in one example and can include receiving a source data stream, generating a base layer sub-stream from the source data stream, and generating an enhancement layer sub-stream from the source data stream. The method further includes communicating the base layer sub-stream to a client device using a first communication protocol, and communicating the enhancement layer sub-stream to the client device using a second communication protocol. In a particular example, the one-to-many communication protocol is a multicast communication protocol and the second communication protocol is a unicast communication protocol. In another example, the base layer sub-stream is sent to the client device via a first network connection and the enhancement layer sub-stream is sent to the client device via a second network connection. | 07-31-2014 |
20140215491 | SYSTEM AND METHOD FOR INTERNAL NETWORKING, DATA OPTIMIZATION AND DYNAMIC FREQUENCY SELECTION IN A VEHICULAR ENVIRONMENT - A system includes an on-board unit (OBU) in communication with an internal subsystem in a vehicle on at least one Ethernet network and a node on a wireless network. A method in one embodiment includes receiving a message on the Ethernet network in the vehicle, encapsulating the message to facilitate translation to Ethernet protocol if the message is not in Ethernet protocol, and transmitting the message in Ethernet protocol to its destination. Certain embodiments include optimizing data transmission over the wireless network using redundancy caches, dictionaries, object contexts databases, speech templates and protocol header templates, and cross layer optimization of data flow from a receiver to a sender over a TCP connection. Certain embodiments also include dynamically identifying and selecting an operating frequency with least interference for data transmission over the wireless network. | 07-31-2014 |
20140248051 | Power Save Mode for Lightpaths - A method for communicating optically between nodes of an optical network, including forming, between a first node and a second node of the network, a set of lightpaths, each of the set of lightpaths having a respective configuration, and transferring communication traffic between the first and second nodes via the set of lightpaths. The method also includes forming a determination for the set of lightpaths that a communication traffic level associated therewith is less than a predetermined threshold, and in response to the determination, removing a lightpath having a given configuration from the set of lightpaths to form a reduced set of lightpaths. The method further includes transferring the communication traffic between the first and second nodes via the reduced set of lightpaths, while reducing a level of power consumption in the removed lightpath and while maintaining the given configuration of the removed lightpath. | 09-04-2014 |
20140269592 | APPLICATION-AWARE DYNAMIC BIT-LEVEL ERROR PROTECTION FOR MODULATION-BASED COMMUNICATION - In one embodiment, a device (e.g., a transmitter) determines a level of error protection of each bit position within symbols of a particular constellation map used for modulation-based communication, and also determines priority levels of application data bits to be placed into a communication frame. Application data bits may then be placed into symbols of the communication frame, where higher priority application data bits are placed into bit positions with greater or equal levels of protection than bit positions into which lower priority application data bits are placed. The communication frame may then be transmitted to one or more receivers with an indication of how to decode the placement of the application data bits within the symbols. In another embodiment, the particular constellation map may be dynamically selected from a plurality of available constellation maps, such as based on communication channel conditions and/or applications generating the data. | 09-18-2014 |
20140303807 | SYSTEM AND METHOD FOR REAL-TIME SYNTHESIS AND PERFORMANCE ENHANCEMENT OF AUDIO/VIDEO DATA, NOISE CANCELLATION, AND GESTURE BASED USER INTERFACES IN A VEHICULAR ENVIRONMENT - A method includes establishing communication channels between an on-board unit (OBU) of a vehicle and a plurality of nodes, tagging each of a plurality of data from the plurality of nodes with a priority level, storing the plurality of data in a priority queue according to respective priority levels, selecting a medium to present a first data of the plurality of data to a user, and presenting the first data to the user via the medium. In the method, the plurality of nodes includes a remote node and an in-vehicle device. Another method includes receiving a data from a remote node, generating a plurality of data streams from the data and transmitting the plurality of data streams across a plurality of wireless interfaces. Another method includes enhancing audio signals from a plurality of microphones and speakers. Yet another method includes various gesture based user interfaces coupled to the OBU. | 10-09-2014 |
20140380442 | SYSTEM AND METHOD FOR ENABLING SECURE TRANSACTIONS USING FLEXIBLE IDENTITY MANAGEMENT IN A VEHICULAR ENVIRONMENT - A method in one embodiment includes authenticating a first agent to an on board unit (OBU) of a vehicle if the first agent validates a first set of one or more authentication requirements and identifying a first identity profile corresponding to the first agent. The method also includes determining a role of the first agent in the vehicle and configuring the vehicle with the first identity profile, where the vehicle is configured based, at least in part, on the role of the first agent. In this embodiment, the first identity profile is one of a plurality of identity profiles provisioned on the OBU. In specific embodiments, each one of a plurality of agents corresponds to a respective one of the plurality of identity profiles, and includes one or more of a human agent, a machine device, a software agent, an authorized entity, and a mobile device. | 12-25-2014 |
20150029987 | SYSTEM AND METHOD FOR WIRELESS INTERFACE SELECTION AND FOR COMMUNICATION AND ACCESS CONTROL OF SUBSYSTEMS, DEVICES, AND DATA IN A VEHICULAR ENVIRONMENT - A method in one embodiment includes intercepting a message in an on-board unit (OBU) of a vehicular network environment between a source and a receiver in the vehicular network environment, verifying the message is sent from the source, verifying the message is not altered, evaluating a set of source flow control policies associated with the source, and blocking the message if the set of source flow control policies indicate the message is not permitted. In specific embodiments, the message is not permitted if a level of access assigned to the source in the set of source flow control policies does not match a level of access tagged on the message. In further embodiments, the method includes evaluating a set of receiver flow control policies associated with the receiver, and blocking the message if the set of receiver flow control policies indicates the message is not permitted. | 01-29-2015 |
20150124619 | METHODS AND DEVICES FOR BACKWARD CONGESTION NOTIFICATION - The present invention provides improved methods and devices for managing network congestion. Preferred implementations of the invention allow congestion to be pushed from congestion points in the core of a network to reaction points, which may be edge devices, host devices or components thereof. Preferably, rate limiters shape individual flows of the reaction points that are causing congestion. Parameters of these rate limiters are preferably tuned based on feedback from congestion points, e.g., in the form of backward congestion notification (“BCN”) messages. In some implementations, such BCN messages include congestion change information and at least one instantaneous measure of congestion. The instantaneous measure(s) of congestion may be relative to a threshold of a particular queue and/or relative to a threshold of a buffer that includes a plurality of queues. | 05-07-2015 |
20150163320 | SOCIAL-DRIVEN PRECACHING OF ACCESSIBLE OBJECTS - A precaching system identifies an object, such as a media file, that a user accesses and then analyzes a social graph of the user to identify social graph contacts that may be interested in the object. Based on the content of the object—and the interests and connections of contacts in the social graph—the precaching system determines whether a particular contact in the user's social graph is likely also to access the object. For example, the precaching system may determine a hit score corresponding to the object and a likelihood that the particular contact in the social graph will access the object. If the precaching system determines that the likelihood that the particular contact will access the object meets or exceeds a threshold probability level for precaching the object, the precaching system precaches the object near the contact in anticipation that the contact will access the object. | 06-11-2015 |
20150181460 | DYNAMIC CODING FOR NETWORK TRAFFIC BY FOG COMPUTING NODE - In one embodiment, a method comprises determining access network conditions by a network device in an access network, the access network providing communications between a client device and a destination reachable via a data network; selecting, by the network device based on the access network conditions, one of a plurality of coding methods for network traffic between the client device and the destination, including selecting coding parameters for the one coding method; and causing, by the network device, coding to be executed on the network traffic, on behalf of the client device, according to the one coding method and the selected coding parameters. | 06-25-2015 |
20150249586 | EMERGENCY NETWORK SERVICES BY AN ACCESS NETWORK COMPUTING NODE - In one embodiment, a method comprises detecting, by an access network computing node, a network service provided by a service provider for one or more identified endpoint devices via a wide area network connection, the access network computing node within an access network providing connections for the one or more identified endpoint devices to access the network service via the wide area network connection; detecting an unavailability of the network service via the wide area network connection; and supplying, by the access network computing node, at least a substitute of the network service for the one or more identified endpoint devices in response to the detected unavailability of the network service via the wide area network connection. | 09-03-2015 |