Patent application number | Description | Published |
20090086640 | UNCOVERING THE DIFFERENCES IN BACKBONE NETWORKS - The claimed subject matter provides systems and/or methods that discover comparative differences in performance of Internet Service Provider networks. The system can include devices, components, and/or processes that partitions measurement processes into cycles and measures at least one Internet Service Provider network every cycle, develops and distributes to interrogation nodes a list of destination Internet Protocol (IP) addresses to interrogate, and utilizes results delivered or retrieved from interrogation nodes to generate a report on the comparative performance of Internet Service Provider networks queried. | 04-02-2009 |
20090086741 | UNCOVERING THE DIFFERENCES IN BACKBONE NETWORKS - The claimed subject matter provides systems and/or methods that uncovers detailed differences in the performance of different Internet Service Provider ISP) networks. The system can include components, devices, and/or processes that utilize a list of target Internet Service Provider (ISP) networks to create a list of Internet Protocol (IP) addresses to interrogate, distribute the list of addresses to measurement nodes and obtains in return probing results from the measurement nodes, the probing results employed thereafter to provide comparative performance metrics associated with the target Internet Service Provider (ISP) networks. | 04-02-2009 |
20090088089 | CONTROL CHANNEL NEGOTIATED INTERMITTENT WIRELESS COMMUNICATION - A dual mode communication device utilizes a control channel to exploit diversity, history, and context in advance of establishing a broadband data exchange session on a broadband but shorter range wireless data channel, maximizing productive use of such a session. Appropriate diversity for the negotiated session further enhance data transfer, including path diversity, radio technology diversity (e.g., WiMax, Wi-Fi, ultra wideband, Bluetooth), antenna diversity (e.g., MIMO), modulation diversity (e.g., rate selection for 802.11, or symbol length selection to combat multi-path fading), and frequency diversity (e.g., 2.4 GHz versus 5 GHz). Historical information about channel characteristics optimize the selection of channel parameters with respect to the diversity choices. In addition, context information such as location and speed can be used to categorize the historical information that is collected to further optimize channel parameters. | 04-02-2009 |
20090286534 | INTER-CONTROLLER ROAM MANAGEMENT AND PREDICTION FOR VOICE COMMUNICATIONS - A mobile device roaming architecture for use with a mobile device, such as a cellular phone, roaming a WiFi network. In instances where the mobile device attempts to roam to a different wireless access point managed by a controller using a different authentication key, the roam process can be excessively long such that the voice signal is disrupted or fails entirely. A detection component detects the roaming attempt, and a connection component switches the call back to the original access point controller before the call has a chance to drop. In this way, a connection is maintained to the network. A mitigation component performs an operation to maintain a connection to the call as the mobile device moves out of range of the original access point. | 11-19-2009 |
20090323600 | ADAPTING CHANNEL WIDTH FOR IMPROVING THE PERFORMANCE OF WIRELESS NETWORKS - The subject invention relates to a system and/or methodology that provide improved wireless networking performance by dynamically adapting the channel width. A dynamic adaptation component adjust the channel width based on at least one characteristic of a wireless network, the characteristics can include but are not limited to range, power consumption, throughput, signal to noise ratio (SNR), resilience to delay spread, data rate, and capacity. Additionally, an optimization component can determine an optimum channel width. | 12-31-2009 |
20100020774 | INTERACTIVE WiFi CONNECTIVITY FOR MOVING VEHICLES - Systems and methods are provided to enable high-performance Internet access on board moving vehicles using WiFi data communication protocols. In an illustrative implementation, an exemplary wireless data communications environment comprises a ViFi module, an instruction set comprising at least one instruction set to process data for wireless communication between a cooperating component onboard a moving vehicle and other cooperating wireless components, and one or more wide-area wireless communications links. In an illustrative operation, the ViFi module can perform one or more wireless communications techniques to exploit macro-diversity and opportunistic receptions by cooperating WiFi base stations to minimize disruptions for mobile clients. The exemplary ViFi module can communicate data to and from one or more cooperating WiFI base stations such that the one or more base stations can operatively opportunistically overhear a packet, and can probabilistically relay the packet to the intended next hop. | 01-28-2010 |
20100027419 | INVERSE MULTIPLEXING HETEROGENEOUS WIRELESS LINKS FOR HIGH-PERFORMANCE VEHICULAR CONNECTIVITY - Systems and methods are provided that enable high-performance Internet access on board moving vehicles. In an illustrative implementation, an exemplary wireless data communications environment comprises a PluriBus module, an instruction set comprising at least one instruction set to process data for wireless communication between a cooperating component onboard a moving vehicle and other cooperating wireless components, and one or more multiple wide-area wireless communications links. In an illustrative operation, the PluriBus module can perform one more wireless communications techniques comprising opportunistic erasure coding such that coded packets can be sent in the event that there are openings in the one or more wireless communication links' capacity and transmitting the data packets along the one or more wireless communications links that is estimated (e.g., in real time) to offer efficient delivery of data packets. | 02-04-2010 |
20100027563 | EVOLUTION CODES (OPPORTUNISTIC ERASURE CODING) PLATFORM - Systems and methods are provided that allow for the opportunistic erasure coding of data packets by employing an exemplary evolution code. In an illustrative implementation an exemplary computing environment comprises an evolution code engine and an instruction set comprising at least one instruction to instruct the evolution code to process data for communication between two or more components of the exemplary computing environment. The use of evolution coding mitigates packet losses along one or more communication paths. In an illustrative operation, coded packets are created by XOR-ing data packets together such that a coded packet can recover a lost data packet using other received packets. | 02-04-2010 |
20110032833 | OPTIMIZATION OF TRAFFIC ROUTING FOR DATA CENTER SERVICES - Techniques and systems for providing optimization of traffic routing for data centers are disclosed herein. In some embodiments, a method may include identifying a plurality of available source sites and paths or routes between an online service provider (OSP) and a destination prefix. A traffic manager may measure a cost for each of the plurality of available paths. In some instances, the traffic manager may also measure a performance value for each of the available paths. The traffic manager may then select one of the available source sites and paths as a preferred source site and path that has a minimized cost for an instance of the performance value when compared to other paths of the plurality of available source sites and paths. In further embodiments, the traffic manager may rewrite a routing table and DNS mapping to implement the preferred source site and path as the default source site and path between the OSP and the destination prefix. | 02-10-2011 |
20110087924 | Diagnosing Abnormalities Without Application-Specific Knowledge - Methods, articles, and systems for determining a probable cause of a component's abnormal behavior are described. To determine the probable cause, a computing device computes, for one or more pairs of components having dependency relationships, a likelihood that behavior of one component of a pair is impacting behavior of the other component of the pair. This computing is based on joint historical behavior of the pair of components. The computing device then determines that one of a plurality of components is a probable cause of the abnormal behavior based on the computed likelihoods. | 04-14-2011 |
20110246897 | INTERACTIVE VISUALIZATION TO ENHANCE AUTOMATED FAULT DIAGNOSIS IN NETWORKS - Described is a visual analytics system for network diagnostics. The visual analytics system obtains network diagnostic-related information from a diagnostic system. The visual analytics system includes an interactive user interface that displays the representations of network components, including network machines and, zero or more links between those components, (e.g., as appropriate based upon selection or dynamic conditions). The user interface includes a main network view that displays representations of network components, a diagnostics view that displays suggested diagnosis results obtained from the diagnostic system, and a performance counter view that displays performance counter data. User interaction with one of the views correspondingly changes the displays in the other views. The system allows effective exploration of multiple levels of detail, e.g., variable, component, edge level and network levels, for example, via flexible navigation across these levels from the top, the bottom, or anywhere in the middle, while retaining context. | 10-06-2011 |
20120079507 | MANAGEMENT AND MARKETPLACE FOR DISTRIBUTED HOME DEVICES - A home device management technique is described that allows a user to manage a network of distributed home devices. Special application modules, driver modules, and service exchange ports are employed. Each application modules implements some functionality in the home, preferably using one or more devices in the home distributed system. Each driver module provides the logic for operating one or multiple distributed home devices and is capable of receiving commands from application modules and sending them to devices, detecting events for an associated type of home device, translating the detected event into a format usable by the application modules and notifying the application modules of the events. Events are communicated between the application modules and the driver modules by using one or more service exchange ports. Access control policies are employed to control access to the home devices. The application and driver modules can be obtained over a network from a home marketplace that can also determine their compatibility and interoperability with the home devices. | 03-29-2012 |
20120239596 | CLASSIFICATION OF STREAM-BASED DATA USING MACHINE LEARNING - The described implementations relate to data classification. One implementation includes identifying one or more likely classifications for an incoming data item using an algorithm. The implementation can also include providing the one or more identified classifications to a user. A selection of an individual identified classification for the incoming data item can be received from the user. The algorithm can be refined to reflect the selection by the user. | 09-20-2012 |
20120324228 | PLATFORM THAT FACILITATES PRESERVATION OF USER PRIVACY - Described herein are technologies pertaining to preserving privacy of users of mobile computing devices. Two users of two mobile computing devices share a quantization scheme for quantizing location data using a predefined quantization interval. The two users additionally share a private key that is utilized to encrypt locations obtained by the two computing devices that have been quantized using the shared quantization scheme. Encrypted, quantized locations are compared in a cloud computing service in connection with answering location-based queries, where the comparison is undertaken without the cloud computing service decrypting the encrypted, quantized locations. | 12-20-2012 |
20130042154 | Adaptive and Distributed Approach to Analyzing Program Behavior - An analysis management system (AMS) is described that analyzes the in-field behavior of a program resource installed on a collection of computing devices, such as mobile telephone devices or the like. In operation, the AMS can instruct different devices to collect data regarding different observation points associated with the program resource, thus spreading the reporting load among the devices. Based on the data that is collected, the AMS can update a dependency graph that describes dependencies among the observation points associated with the program resource. The AMS can then generate new directives based on the updated dependency graph. The AMS can also use the dependency graph and the collected data to infer information regarding observation points that is not directly supplied by the collected data. | 02-14-2013 |
20130158974 | MODELING AND PREDICTING CONTROL SYSTEM BEHAVIOR THROUGH FAST-FORWARDING - Methods and systems for modeling and predicting control system behavior through fast-forwarding are provided herein. The method includes obtaining sets of equivalent inputs, time zones, and a user-defined stop time. The method also includes taking a primary checkpoint of a main instance of a control system in response to a user input. The method includes fast-forwarding the control system by generating a secondary instance from the main instance at the primary checkpoint and subjecting the secondary instance to each combination of an input from each of the sets of equivalent inputs in each time zone. The method includes taking a secondary checkpoint from the primary checkpoint for each combination. For each secondary checkpoint, the method includes fast-forwarding the control system by generating a tertiary instance from the secondary instance and subjecting the tertiary instance to each combination as long as a time does not exceed the user-defined stop time. | 06-20-2013 |
20130254749 | DYNAMICALLY PROVIDING APPLICATION ANALYTIC INFORMATION - Methods and systems for dynamically providing application analytic information are provided herein. The method includes inserting instrumentation points into an application file via an application analytic service and dynamically determining desired instrumentation points from which to collect application analytic data. The method also includes receiving, at the application analytic service, the application analytic data corresponding to the desired instrumentation points and analyzing the application analytic data to generate application analytic information. The method further includes sending the application analytic information to a client computing device. | 09-26-2013 |
20140093079 | SECURELY JOINING A SECURE WIRELESS COMMUNICATIONS NETWORK - Securely joining a secure wireless communications network is described, for example, where a printer or other device is securely added to a home wireless network. In various embodiments, a temporary wireless network is established between a new joiner device and a second wireless communications device which is already a member of a secure home wireless network. In an example, the temporary wireless network is set up using a secret key known to the new joiner device and the second wireless communications device by virtue of physical proximity. In various examples, the secure, temporary wireless network is used to transfer credentials of the secure home network to the new joiner device which then joins the home network. In an example the temporary wireless network is cancelled once the new joiner device becomes a member of the secure home (or other) wireless network. | 04-03-2014 |
20140113623 | INTER-CONTROLLER ROAM MANAGEMENT AND PREDICTION FOR VOICE COMMUNICATIONS - A mobile device roaming architecture for use with a mobile device, such as a cellular phone, roaming a WiFi network. In instances where the mobile device attempts to roam to a different wireless access point managed by a controller using a different authentication key, the roam process can be excessively long such that the voice signal is disrupted or fails entirely. A detection component detects the roaming attempt, and a connection component switches the call back to the original access point controller before the call has a chance to drop. In this way, a connection is maintained to the network. A mitigation component performs an operation to maintain a connection to the call as the mobile device moves out of range of the original access point. | 04-24-2014 |
20140184803 | Secure and Private Tracking Across Multiple Cameras - A technique for multi-camera object tracking is disclosed that preserves privacy of imagery from each camera or group of cameras. This technique uses secure multi-party computation to compute a distance metric across data from multiple cameras without revealing any information to operators of the cameras except whether or not an object was observed by both cameras. This is achieved by a distance metric learning technique that reduces the computing complexity of secure computation while maintaining object identification accuracy. | 07-03-2014 |
20140195689 | SWAN: ACHIEVING HIGH UTILIZATION IN NETWORKS - Greater network utilization is implemented through dynamic network reconfiguration and allocation of network services and resources based on the data to be transferred and the consumer transferring it. A hierarchical system is utilized whereby requests from lower layers are aggregated before being provided to upper layers, and allocations received from upper layers are distributed to lower layers. To maximize network utilization, paths through the network are reconfigured by identifying specific types of packets that are to be flagged in a specific manner, and then by further identifying specific routing rules to be applied in the transmission of such packets. Network reconfiguration is performed on an incremental basis to avoid overloading a path, and capacity can be reserved along one or more paths to prevent such overloading. Background data is agnostic as to specific transmission times and is utilized to prevent overloading due to reconfiguration. | 07-10-2014 |
20140380282 | MONITORING MOBILE APPLICATION PERFORMANCE - Aspects of the subject disclosure are directed towards monitoring application performance during actual use, particularly mobile application performance. Described is instrumenting mobile application binaries to automatically identify a critical path in user transactions, including across asynchronous-call boundaries. Trace data is logged by the instrumented application to capture UI manipulations, thread execution, asynchronous calls and callbacks, UI updates and/or thread synchronization. The trace data is analyzed to assist developers in improving application performance. | 12-25-2014 |