Patent application number | Description | Published |
20090135954 | DYNAMIC THRESHOLD DETECTOR - A burst detector featuring a dynamic threshold that is calculated according to the detection efficiency while operating in a noisy environment. In one embodiment, signals from various directions are multiplied by appropriate weights, wherein the weights are a function of the FAR, the throughput, and/or various modem indications. | 05-28-2009 |
20090142051 | COHERENT OPTICAL DETECTOR AND COHERENT COMMUNICATION SYSTEM AND METHOD - An optical device is provided with first and second inputs. A first coupler coupled is coupled to the first input and produces at least a first and second output. A second coupler is coupled to the second input and produces at least a first and second output. A third coupler is coupled to the first output of the first coupler and to the first output of the second coupler. A fourth coupler is coupled to the second output of the first coupler and to the second output of the second coupler. First and second crossing waveguides are provided with an angle selected to minimize crosstalk and losses between the first and second cross waveguides. The first crossing waveguide connects one of the first or second outputs from the first coupler with an input of the fourth coupler. The second crossing waveguide connects one of the first or second outputs from the second coupler with an input of the third coupler. A first phase shifter is coupled to the first and second waveguides. The first and second waveguides connect one of the outputs of the first or second coupler and one of the inputs of the third or fourth couplers. The first, second, third and fourth couplers, the two crossing waveguides and the phase shifter are each formed as part of a single planar chip made of an electro-optical material. | 06-04-2009 |
20100028024 | Secure optical communications system and method with coherent detection - The invention provides a system and method for secure communication that involves encoding and transmitting an optical communications signal that is encoded based on a multi-dimensional encoding technique. This technique may include at least one or more of encoding a phase, a polarization, and a frequency of the signal. Light encoding is independent from its modulation with data. The data is modulated using any format; in the preferred embodiment the QPSK format is implemented. The encoded and modulated light is transmitted through free space or via a fiber optic network to a receiver, where the information is decoded. A coherent detection based on 90-degrees or 120-degrees optical hybrid is used to decode and recover the data from the received signal. Because the encoding of the transmitted light varies according to a specific pattern or sequence, one without knowledge of the transmission encoding sequence is prevented from decoding the transmitted information. | 02-04-2010 |
20110317587 | Methods and systems for time sensitive networks - A packet based switched multimedia network which consolidates networking of high throughput, time sensitive data, and control streams, with Ethernet data networking over home span. The multimedia network may support in parallel, over the same home span cabling infrastructure, high quality networking including time sensitive data streams, such as HDMI, USB, and Ethernet, transparent network attachment for legacy devices, multi stream, and low power modes. | 12-29-2011 |
20120117276 | USB device adaptor for initiating a USB connection over a non-USB network - Initiating, by USB device adaptors, USB connections over a non-USB network, including the steps of: Connecting non-collocated USB hosts with respective non-collocated USB host adaptors (USBHs), according to USB specification timings. Connecting non-collocated USB devices with respective non-collocated USB device adaptors (USBDs). Enabling the USBDs and the USBHs to communicate over the non-USB network that enables each USBD to discover the presence and capabilities of each USBH. Receiving, by the USBDs, information about the USB hosts. And then, initiating by the USBDs USB-over-network connections between the USB devices and the USB hosts. | 05-10-2012 |
20120117277 | Method and system for USB addressing by a network adaptor - Addressing, by USB host adaptors, packets conveying USB data over a non-USB network, including the steps of: Connecting USB hosts with respective USB host adaptors (USBHs). Connecting USB devices with respective USB device adaptors (USBDs). Enabling, by the non-USB network, each USBHs to discover the presence and capabilities of each USBDs. Initiating USB-over-network connections between the USB hosts and the USB devices. Receiving, by the USBHs, information about the USB devices and the USB-over-network connections. And adding, by the USBHs, network addresses of the USBDs to packets conveying USB data from the USB hosts to the USB devices. | 05-10-2012 |
20120117278 | Method and system for partial USB enumeration and edge initiation - Initiating USB-over-network connections based on partial USB enumeration, including the steps of: Discovering USB hosts by respective USB host adaptors (USBHs). Reading USB device descriptors of USB devices by respective USB device adaptors (USBDs) performing partial USB enumeration that stops prior to the configuration state of the USB devices. Forwarding the read USB device descriptors to the USBHs. And initiating, by the USBDs or the USBHs and based on the USB device descriptors, USB-over-network connections between the USB devices and the USB hosts. | 05-10-2012 |
20120117292 | Method and system for initiating distinct USB connections over a network - Connecting USB devices with USB hosts over distinct network paths, including the following steps: Connecting USB hosts with respective USB host adaptors (USBHs), essentially according to USB specification timings. Connecting USB devices with respective USB device adaptors (USBDs). Enabling the USBDs and the USBHs to communicate over a network that can connect each USBD with each USBH. Initiating USB connections over the network between the USB devices and the USB hosts. And operating at least two of the USB connections over the network essentially simultaneously and without any common network node. | 05-10-2012 |
20120117293 | USB host adaptor for initiating a USB connection over a non-USB network - Initiating, by USB host adaptors, USB connections over a non-USB network, including the steps of: Connecting non-collocated USB hosts with respective non-collocated USB host adaptors (USBHs), according to USB specification timings. Connecting non-collocated USB devices with respective non-collocated USB device adaptors (USBDs). Enabling the USBHs and the USBDs to communicate over the non-USB network that enables each USBD to discover the presence and capabilities of each USBH. Receiving, by the USBHs, information about the USB devices. And then initiating, by the USBHs, USB-over-network connections between the USB hosts and the USB devices. | 05-10-2012 |
20130019034 | Method and system for USB connections over distinct network paths - Connecting USB devices with USB hosts over distinct network data plane connections, including the following steps: USB hosts are connected with respective USB host adaptors (USBHs) according to USB specification timings. USB devices are connected with respective USB device adaptors (USBDs). Enabling the USBDs and the USBHs to communicate over a network that can connect each USBD with each USBH, wherein the network includes network control plane and network data plane. Initiating first, second, and third USB-over-network-data-plane connections from the USB hosts to the USB devices. And operating the at least two USB-over-network-data-plane connections essentially simultaneously and without any common network node. | 01-17-2013 |
20130024578 | Method and system for distributed initiation of USB over network data plane connections - Connecting USB devices with USB hosts over a network supporting distributed initiations of USB connections over the network, including the following steps: Connecting non-collocated USB hosts with respective non-collocated USB host adaptors (USBHs), according to USB specification timings. Connecting non-collocated USB devices with respective non-collocated USB device adaptors (USBDs). Enabling the USBDs and the USBHs to communicate over the network and to discover the presence and capabilities of one another. Initiating, by the USBDs or the USBHs, via the network control plane, USB-over-network-data-plane connections between the USB devices and the USB hosts. And operating at least two of the USB-over-network-data-plane connections essentially simultaneously and without any common network node. | 01-24-2013 |
20150055489 | All delivered network adaptor - Method and device for using or dropping erroneous packets, including the steps of: receiving, by a network adaptor, first and second packets having headers, payloads, error propagation fields, and error detection fields. The error propagation fields indicate reception errors while the error detection fields do not indicate reception errors. Determining that the first packet is addressed to a first application and dropping the first packet. And determining that the second packet is addressed to a second application and enabling an end-device coupled to the adaptor to use the erroneous data stored in the second payload. | 02-26-2015 |
20150063369 | All delivered network switch - Methods and systems for operating a packet switch that communicates packets with error indication, including the steps of: receiving a packet comprising an error detection field; utilizing the error detection field to identify an error in the packet; marking the occurrence of the error in an error propagation field in the packet; updating the value of the error detection field; and forwarding the modified packet, with the updated value of the error detection field and the error propagation field, according to information carried in the packet. | 03-05-2015 |
20150063474 | Slicer for dynamically modulated symbols - Receivers designed to reduce decision based filter error propagation by feedback from PCS to slicer. One embodiment includes a slicer, a physical coding sublayer (PCS), and a decision based filter (DBF). The frames include symbols of at least two different modulation orders. The slicer has slicing functions suitable for the different modulations and feeds the PCS with the slicing results. The PCS identifies frame boundaries and modulation information, which are modulated according to a predetermined modulation order, uses the identified modulation information to determine the modulation of a nonempty set of dynamically modulated symbols in each frame, and provides the slicer with an indication of which slicer function output to use to feed the DBF. | 03-05-2015 |
20150063475 | Receivers for dynamically modulated symbols - Receivers configured to handle dynamically modulated symbols. One receiver includes a slicer, a physical coding sublayer (PCS), and a decision based filter (DBF). Each of most of the received frames comprising (i) modulation information modulated according to a predetermined modulation order, and (ii) symbols of at least two different modulation orders that are dynamically modulated in accordance with the modulation information. The slicer configured to feed the PCS with essentially the minimal combination of slicing results that essentially covers all the predetermined modulation order. And the PCS configured to identify the modulation information, to use the identified modulation information to determine the modulation of the dynamically modulated symbols, and to provide the slicer with an indication of which slicer function output to use to feed the DBF. | 03-05-2015 |
20150222293 | Maintaining running disparity while utilizing different line-codes - Methods and systems for encoding a frame utilizing at least two line-codes having different minimal Hamming distances. The method includes maintaining over the frame absolute value of running disparity lower than or equal to K, while: encoding a first part of the frame utilizing a first line-code having a binary code word length N′ and a minimal Hamming distance D′; and encoding a second part of the frame utilizing a second line-code having a binary code word length N″ and a minimal Hamming distance D″ lower than D′. Where the value of K is lower than both N′/2 and N″/2. | 08-06-2015 |
20150222383 | Indicating end of idle sequence by replacing expected code words while maintaining running disparity - Methods and systems for indicating an end of an idle sequence residing between first and second frames, while maintaining bounded running disparity, including: encoding the first frame; encoding a basic idle sequence utilizing a first line-code; producing an idle sequence by replacing M code words of the basic idle sequence with M alternative code words; encoding the second frame; transmitting the first frame, the idle sequence, and the second frame; and receiving the second frame by a second communication node. Each one of the M alternative code words is equal to a code word of the basic idle sequence. And the second communication node is unable to determine a starting point of the second frame based only on the idle sequence and the second frame, but is able to determine the starting point of the second frame based on difference between the basic idle sequence and the idle sequence. | 08-06-2015 |
20150222384 | Changing receiver configuration by replacing certain idle words with bitwise complement words - Methods and systems for indicating a configuration change of a communication link by replacing certain idle code words with bitwise complement code words, including: Encoding a first frame, a basic idle sequence, and a second frame. Producing, by a transmitter, an idle sequence by replacing certain M code words of the basic idle sequence with M bitwise complement code words, wherein each bitwise complement code word appears in the basic idle sequence. Receiving, by a receiver, the first frame, the idle sequence, and the second frame, wherein the basic idle sequence is known to the receiver. And identifying a change in configuration of the communication link based on a difference between the idle sequence and the basic idle sequence. | 08-06-2015 |
20150222387 | Indicating end of idle sequence by replacing certain code words with alternative code words - Methods and systems for indicating an end of an idle sequence, including: encoding a first frame, encoding a basic idle sequence including code words, producing an idle sequence by replacing certain M code words of the idle sequence with M alternative code words, and encoding a second frame. Each one of the M alternative code words appears in the basic idle sequence. And a second communication node, which is unable to determine a starting point of the second frame based only on a received idle sequence, is able to determine a start of the second frame based on a difference between the received idle sequence and the basic idle sequence. | 08-06-2015 |
20150222388 | Encoding payloads according to data types while maintaining running disparity - Methods and systems for encoding frames while maintaining bounded running disparity, including: encoding the headers of the frames utilizing a first line-code; selecting the first line-code and a second line code for encoding first and second payloads of first and second frames, respectively, based on first and second data types of first and second data comprised in the first and second payloads, respectively; encoding the first and second payloads utilizing the first and second line-codes, respectively; and transmitting the first and second frames over a communication channel characterized by first and second channel conditions, respectively. The second line-code has a minimal Hamming distance lower than that of the first line-code, and the differences between the first and second channel conditions are not enough for selecting the second line-code instead of the first line-code for encoding the second payload. | 08-06-2015 |
20150222551 | Frequent flow control by replacing certain idle words with bitwise complement words - Implementing flow control without using unique symbols or designated packets, comprising: sending, from a first device to a second device, high throughput packet communication. Temporarily storing the high throughput packet communication in a buffer of the second device. Calculating, by the second device, a basic idle code word sequence known to the first device. Producing an idle sequence by replacing certain M code words of the basic idle sequence with M bitwise complement code words. Transmitting the idle sequence, wherein the M bitwise complement code words are indicative of the fullness of the buffer. Receiving the idle sequence by the first device, and determining, based on a difference between the idle sequence and the basic idle sequence, that the buffer is full or expected to get full, and thus the first device stop sending packets to the second device. | 08-06-2015 |
20150319060 | Admission control while maintaining latency variations of existing sessions within their limits - Methods and systems for admitting new streaming sessions while preventing latency variations of existing sessions from exceeding their respective limits, including the steps of: receiving a request to establish a new streaming session over a new path, in presence of an existing streaming session that is established over an existing path. Estimating, before the new streaming session is established, an estimated end-to-end latency variation of the existing streaming session, supposing the new streaming session is established over the new path. Determining, by comparing the estimated end-to-end latency variation with the limit, a determination that the estimated end-to-end latency variation exceeds the limit. And rejecting the request, based on the determination. | 11-05-2015 |
20150319065 | Method and system for assigning vulnerability levels to sessions - Methods and systems for indicating vulnerability of streaming sessions to additional latency variations, including the steps of: determining a threshold, based on a limit associated with an allowable end-to-end latency variation of a first session. Estimating the end-to-end latency variation of the first streaming session. Determining that the estimated end-to-end latency variation is higher than the threshold. Setting a first vulnerability indicator of the first streaming session at the first output port to a first level. Setting a second vulnerability indicator of a second existing streaming session at a second output port of a second switch to a second level, based on first level of the first vulnerability indicator. Receiving requests to establish new streaming sessions over first and second new paths passing through the first and second output ports. And rejecting the requests based on the first and second vulnerability indicators. | 11-05-2015 |
20150319066 | Methods and systems for distributed calculations of latency variation - Methods and systems for calculating latency variations in a distributed manner, including the steps of: calculating, by first and second switches, first and second local latency variations, of first and second streaming sessions, at first and second output ports of the first and second switches, respectively. Receiving, by the third switch, the first and second local latency variations; wherein a first and second paths of the first and second streaming sessions, respectively, are passing through a third output port of the third switch after passing through the first and second output ports, respectively. And calculating, by the third switch, a third local latency variation of the first streaming session at the third output port, based on the first and second local latency variations. | 11-05-2015 |
20150319067 | Methods and systems for incremental calculation of latency variation - Methods and systems for calculating local latency variations in an incremental manner, including the steps of updating a first local latency variation of a first streaming session at a first output port of a first switch; identifying a relationship that the first streaming session is passing through a second output port of a second switch after passing through the first output port; wherein a second streaming session is passing through the second output port; and updating a second local latency variation of the second streaming session at the second output port, based on the relationship. Wherein the updated second local latency variation is calculated based on the updated first local latency variation. | 11-05-2015 |
20150319209 | Increasing link throughput to enable admission without exceeding latency variation limits - Methods and systems for admitting streaming sessions while controlling links capacities, including the steps of: receiving a request to establish a new streaming session in presence of an existing streaming session; wherein the paths of the session and the new session pass through a link, which is currently set to have a first capacity. Estimating a first end-to-end latency variation of the existing streaming session, supposing that the new streaming session is established over the new path. Determining that the first end-to-end latency variation exceeds a maximum allowable end-to-end latency variation of the existing session. Estimating a second end-to-end latency variation of the existing streaming session, supposing that the link is set to have a second capacity higher than the first capacity. Determining that the second end-to-end latency variation does not exceed the limit. Setting the link to have the second capacity. And admitting the request. | 11-05-2015 |
20150319213 | Allocating limit to allowable end-to-end latency variation based on destination capability - Methods and systems for establishing new streaming sessions based on capabilities of their destinations, including the steps of: receiving a request to establish a new streaming session over a new path, in presence of an existing streaming session. Receiving capabilities of a destination of the new streaming session. Allocating for the new streaming session a limit for an allowable end-to-end latency variation thereof, based on the capabilities. Estimating, before the new streaming session is established, an estimated end-to-end latency variation of the new streaming session, supposing it is established over the first path. Determining, based on comparing the estimated end-to-end latency variation with the limit, that the estimated end-to-end latency variation exceeds the limit. And rejecting the request, based on the determination. | 11-05-2015 |
20150356052 | Seamless addition of high bandwidth lanes - Seamless addition of high bandwidth lanes, including the steps of: sending, by a master, an idle sequence using 7b/10b code words over new high bandwidth lanes in parallel to sending and receiving 8b/10b data with a fixed delay over master-to-slave (m2s) and slave-to-master (s2m) active high bandwidth lanes; sending in parallel a synchronization sequence and a known non-idle sequence during an inter packet gap; utilizing, by the slave, the known non-idle sequence for deskewing the new high bandwidth lanes; and sending, by the master, a transition sequence over both the m2s active high bandwidth lane and the new high bandwidth lanes, and immediately thereafter the master is ready to transmit high bandwidth data using 8b/10b code words over both the m2s active high bandwidth lane and the new high bandwidth lanes. | 12-10-2015 |
20160077992 | USB extension for lossy channel - Methods and systems for operating a USB extension over a lossy channel. The USB extension includes at least a state machine and packet loss inference mechanism. The state machine includes a first state in which the USB extension receives a USB data packet from a standard USB host, a second state, unsupported by the USB Specification, in which the packet loss inference mechanism may indicate the state machine to switch back to its first state, and a third state in which the USB extension switches the state machine back to its first state. | 03-17-2016 |
20160085704 | USB isochronous transfer over a non-USB network - Methods and systems for synchronizing USB 2.0 isochronous IN and OUT transfer clocks over a non-USB network. One method for synchronizing isochronous IN transfer clocks includes: receiving, by a USB host adaptor (USBH), packets from a USB host; writing in each packet an indication of the time in which the packet was received by the USBH; sending the packets from the USBH to a USB device adaptor (USBD) over the network; and synchronizing the USBD clock to the USBH clock based on a property related to the received packets. | 03-24-2016 |