Cisco Technology, Inc. Patent applications |
Patent application number | Title | Published |
20160142999 | SYSTEM AND METHOD FOR REDUCING PAGING IN UTRAN/GERAN/E-UTRAN NETWORKS WHEN IDLE SIGNALING REDUCTION IS ACTIVE - Systems and methods are provided for avoiding excessive paging through messaging-based solutions on a mobile network that supports multiple radio access technologies (RATs), such as both Long Term Evolution (LTE) and Global System for Mobile Communications (GSM)/Enhanced Data Rates for GSM Evolution (EDGE)/Universal Mobile Communications System (UMTS) technology, even in situations where the present location of the UE is not known. Preventing paging in access networks where the UE is not present ensures efficient use of radio resources in the paging channel and reduces signaling load on other interfaces. In one embodiment, a user equipment (UE) is simultaneously connected to a Serving General Packet Radio System (GPRS) Support Node (SGSN) and a Mobility Management Entity (MME). By using signaling between the SGSN and MME, the location of the UE may be tracked without requiring unnecessary paging, even when the UE is in IDLE mode or is inactive. | 05-19-2016 |
20160142336 | PERIODIC ADVERTISEMENTS OF HOST CAPABILITIES IN VIRTUAL CLOUD COMPUTING INFRASTRUCTURE - The present disclosure describes a distributed, advertisement-based, solution for scheduling virtual resources in cloud infrastructures such as the OpenStack. The scheduling algorithm distributes the scheduling requirements and host state feasibility checks to the individual hosts in the datacenter, which can periodically send a summarized advertisement to the scheduler controller listing the number of instances of different type(s) of virtual resources that a particular host can support. The scheduler controller, thus no longer has to compute and maintain individual host states, and the scheduling problem is reduced to selecting the feasible advertisements that satisfy a given request. The solution can be extended to a scenario of multiple scheduler controllers using the same distributed, advertisement-based, approach. | 05-19-2016 |
20160142257 | PERIODIC ADVERTISEMENTS OF HOST CAPABILITIES IN VIRTUAL CLOUD COMPUTING INFRASTRUCTURE - The present disclosure describes a distributed, advertisement-based, solution for scheduling virtual resources in cloud infrastructures such as the OpenStack. The scheduling algorithm distributes the scheduling requirements and host state feasibility checks to the individual hosts in the datacenter, which can periodically send a summarized advertisement to the scheduler controller listing the number of instances of different type(s) of virtual resources that a particular host can support. The scheduler controller, thus no longer has to compute and maintain individual host states, and the scheduling problem is reduced to selecting the feasible advertisements that satisfy a given request. The solution can be extended to a scenario of multiple scheduler controllers using the same distributed, advertisement-based, approach. | 05-19-2016 |
20160142179 | Optimization of Optical Transmission Capacity - A method for transmitting a coherent optical data signal includes receiving a data signal from an interface, and encoding the data signal with a forward error correcting (FEC) encoder according to a mix of modulation formats. The FEC encoder generates an FEC encoded signal which is used to generate modulation symbols according to the modulation formats. The FEC encoded signal of modulation symbols is spectrally shaped to generate a shaped signal, and pre-distorted before transmission. The shaped signal is pre-distorted by adding a predetermined amount of chromatic dispersion to generate a smoothed signal, and the smoothed signal is transmitted according to the modulation formats. | 05-19-2016 |
20160140001 | ADAPTIVE DATACENTER TOPOLOGY FOR DISTRIBUTED FRAMEWORKS JOB CONTROL THROUGH NETWORK AWARENESS - Systems, methods, and computer program products to perform an operation comprising receiving a priority of a distributed computing job, an intermediate traffic type of the distributed computing job, and a set of candidate compute nodes available to process the distributed computing job, the candidate compute nodes each available to process at least one input split of the distributed computing job, and selecting a mapper node from the candidate compute nodes, for one of the input splits, wherein the mapper node is selected based on the priority and the intermediate traffic type of the distributed computing job, wherein the mapper compute node is further selected upon determining that the mapper node is not affected by an error, and a resource utilization score for the mapper node does not exceed a utilization threshold. | 05-19-2016 |
20160139939 | SYSTEM AND METHOD TO CHAIN DISTRIBUTED APPLICATIONS IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and may include communicating information between a plurality of network function virtualized (NFV) based applications; and creating at least one service chain using at least two of the plurality of NFV-based applications based on the information communicated between the plurality NFV based applications. In some instances, the information can be communicated using border gateway protocol (BGP) exchanges between the NFV-based applications. In some instances, the information can include at least one of: next-hop address information for one or more ingress points of a particular NFV-based application; one or more capabilities by which a particular NFV-based application can receive data on one or more ingress points; and a method by which one or more egress points of a previous NFV-based application in a particular service chain is to perform load balancing for a subsequent NFV-based application in the particular service chain. | 05-19-2016 |
20160135222 | SYSTEM AND METHOD FOR PROVIDING INTERNET PROTOCOL FLOW MOBILITY IN A NETWORK ENVIRONMENT - An example method is provided in one example embodiment and may include receiving an indication of a radio access technology (RAT) change for a user equipment (UE); determining availability of a preferred RAT type for a policy related rule associated with the UE, wherein the policy related rule includes, at least in part, the preferred RAT type for one or more service data flows for the UE; and configuring the one or more service data flows for the UE based, at least in part, on a change in availability of the preferred RAT type following the RAT change. In at least one case, the method can include routing downlink packets to the UE using the one or more service data flows for the preferred RAT type if the preferred RAT type is available. | 05-12-2016 |
20160135219 | SYSTEM AND METHOD FOR PROVIDING INTERNET PROTOCOL FLOW MOBILITY IN A NETWORK ENVIRONMENT - An example method is provided in one example embodiment and may include receiving an indication of a radio access technology (RAT) change for a user equipment (UE); determining availability of a preferred RAT type for a policy related rule associated with the UE, wherein the policy related rule includes, at least in part, the preferred RAT type for one or more service data flows for the UE; and configuring the one or more service data flows for the UE based, at least in part, on a change in availability of the preferred RAT type following the RAT change. In at least one case, the method can include routing downlink packets to the UE using the one or more service data flows for the preferred RAT type if the preferred RAT type is available. | 05-12-2016 |
20160134761 | SYSTEM AND METHOD FOR RADIO AWARE TRAFFIC MANAGEMENT BASED WIRELESS AUTHORIZATION - An example method is provided in one example embodiment and may include receiving a request from a user equipment (UE) to access a wireless access network, wherein the UE is currently accessing one or more other wireless networks; determining by a Policy and Charging Rules Function (PCRF) whether a subscriber associated with the UE is authorized to access the wireless access network based, at least in part, on a profile for the subscriber; and communicating one of a wireless access rejection and a wireless access acceptance to the UE based on the determination. In some instances, the determining can include recovering the profile for the subscriber associated with the UE from a Subscriber Profile Repository (SPR) using an International Mobile Subscriber Identity (IMSI) for the subscriber. | 05-12-2016 |
20160134646 | METHOD AND APPARATUS FOR DETECTING MALICIOUS SOFTWARE USING HANDSHAKE INFORMATION - In one embodiment, a method includes identifying unusual behavior with respect to a handshake between a first endpoint and a second endpoint that are included in a network, and determining whether the unusual behavior with respect to the handshake indicates presence of malicious software. The method also includes identifying at least one of the first endpoint and the second endpoint as potentially being infected by the malicious software if it is determined that the unusual behavior with respect to the handshake indicates the presence of malicious software. | 05-12-2016 |
20160134520 | OPTIMIZED INTER-VRF (VIRTUAL ROUTING AND FORWARDING) ROUTE LEAKING IN NETWORK OVERLAY BASED ENVIRONMENTS - In one embodiment, a method includes importing a route target for a remote Virtual Routing and Forwarding instance (VRF) at a leaf node in an overlay network, the leaf node comprising at least one local VRF configured thereon, processing routes received for the route target at the leaf node, and installing the routes for the remote VRF at the local VRF at the leaf node to enable inter-VRF communication via the leaf node. An apparatus and logic are also disclosed herein. | 05-12-2016 |
20160134468 | OPTIMIZING INTER-PAN TRAFFIC - In one embodiment, a device identifies inter-personal area network (PAN) traffic between a first PAN and a second PAN. The device identifies a network node in the first PAN associated with the inter-PAN traffic and determines that the network node should join the second PAN. The device causes the network node to join the second PAN, in response to determining that the network node should join the second PAN. | 05-12-2016 |
20160134161 | FAST NETWORK FORMATION USING A BATTERY-BACKED NETWORK BACKBONE - In one embodiment, a device in a network detects a power outage event in the network. The device causes an unprotected node in the network to use a first routing topology that includes a power-protected backbone, in response to detecting the power outage event. The power-protected backbone includes one or more nodes that are protected against the power outage event and the unprotected node is not protected against the power outage event. The device routes data for the unprotected node using the first routing topology. The device causes the unprotected node to use a second routing topology that optimizes a path from the unprotected node to a root node of the network based on one or more performance criteria. | 05-12-2016 |
20160128230 | DOUBLE-ANGLED FACEPLATE FOR AIR FLOW SYSTEM - A faceplate of a line card is provided, and in one example embodiment, includes a top panel including a portion angled downward towards a front side of the faceplate, the angled portion having a plurality of holes, and a front panel disposed on the front side of the faceplate, attached to the angled portion of the top panel on its top side and having a beveled edge at its bottom side, the angled portion of the top panel and the beveled edge of the front panel facilitating an intake area for air flow between the line card and other parallel line cards assembled on a chassis. In specific embodiments, the plurality of holes are arranged in a honeycomb pattern with each hole comprising a Reuleaux hexagon having rounded corners. | 05-05-2016 |
20160127944 | ADAPTIVE QUALITY OF SERVICE FOR WIDE AREA NETWORK TRANSPORT - An example method is provided and includes determining a time shift comprising a difference in time between a packet count observation at a transmit element and a corresponding packet count observation at a receive element connected to the transmit element via a link; obtaining a first packet count from the transmit element and a second packet count from the receive element; and adjusting at least one of the first packet count and the second packet count to compensate for the time shift. The method further includes comparing the adjusted first and second packet counts to determine whether there is a discrepancy between the counts and if a discrepancy is detected between the counts, adjusting a rate at which the transmit element sends packets to the receive element. | 05-05-2016 |
20160127749 | GENERATING A RESPONSE TO VIDEO CONTENT REQUEST INCLUDING DYNAMICALLY PROCESSED VIDEO CONTENT - In one embodiment, a video processing server including a memory capable of storing data and a processor is disclosed. The processor is configured for using the data such that the video processing server can receive a request redirected from a gateway for a video content, wherein the request is redirected by the gateway based on information contained in the request and wherein the information contained in the request includes control data used for an optimal delivery of the video content. The processor is further configured for using the data such that the video processing server can send the redirected request to a content provider identified in the request, receive the requested video content from the content provider, and generate a response to the request by modifying the video content based on the control data. | 05-05-2016 |
20160127415 | SYSTEM AND METHOD FOR PROVIDING ERROR HANDLING IN AN UNTRUSTED NETWORK ENVIRONMENT - An example method is provided and may include receiving a DIAMETER-based error over an SWm interface by a first evolved packet data gateway (ePDG) for a user equipment (UE) attempting to connect to the first ePDG; determining an Internet Key Exchange version two (IKEv2) error type corresponding to the DIAMETER-based error; and communicating the IKEv2 error type to the UE over an SWu interface. In some cases, the IKEv2 error type can be included in a notify payload or in a vendor ID payload for an IKE authentication response (IKE_AUTH_RESP) message. By distinguishing the IKEv2 error type, the UE can determine whether the error is a temporary or a permanent type and can determine whether to attempt to connect again to the first ePDG after a period of time or attempt to connect to another ePDG, which can help to reduce unnecessary signaling and provide better connectivity and user experience. | 05-05-2016 |
20160127371 | SYSTEM AND METHOD FOR PROVIDING ERROR HANDLING IN AN UNTRUSTED NETWORK ENVIRONMENT - An example method is provided and may include receiving a DIAMETER-based error over an SWm interface by a first evolved packet data gateway (ePDG) for a user equipment (UE) attempting to connect to the first ePDG; determining an Internet Key Exchange version two (IKEv2) error type corresponding to the DIAMETER-based error; and communicating the IKEv2 error type to the UE over an SWu interface. In some cases, the IKEv2 error type can be included in a notify payload or in a vendor ID payload for an IKE authentication response (IKE_AUTH_RESP) message. By distinguishing the IKEv2 error type, the UE can determine whether the error is a temporary or a permanent type and can determine whether to attempt to connect again to the first ePDG after a period of time or attempt to connect to another ePDG, which can help to reduce unnecessary signaling and provide better connectivity and user experience. | 05-05-2016 |
20160127192 | LOOP-FREE CONVERGENCE IN COMMUNICATION NETWORKS - In one embodiment, a method includes identifying a change in network topology at a network device, transmitting a test packet from the network device to determine if an adjacent network device located in a backup path has converged following the network topology change, and updating a forwarding information base at the network device in response to the network topology change if a response to the test packet indicates that the adjacent network device has converged. An apparatus and logic are also disclosed herein. | 05-05-2016 |
20160127169 | SYSTEM AND METHOD FOR PROVIDING DYNAMIC RADIO ACCESS NETWORK ORCHESTRATION - A method is provided in one example embodiment and may include monitoring, by a radio access network (RAN) orchestration function, impairments between a plurality of candidate locations interconnected by a transport network, wherein one or more network elements capable of performing one or more operations associated with a RAN are located at the plurality of candidate locations; determining a decomposition of one or more operations associated with the RAN into a plurality of sets of virtualized network functions (VNFs) to execute the operations; determining a distribution of the plurality of sets of VNFs among the one or more network elements associated with the RAN for one or more optimal locations of the plurality of candidate locations based, at least in part, on the monitored impairments; and instantiating the plurality of sets of VNFs at each of the one or more optimal locations. | 05-05-2016 |
20160119777 | LOCALIZING A MOBILE DATA PATH IN A RADIO ACCESS NETWORK UNDER CONTROL OF A MOBILE PACKET CORE IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes establishing a control channel between a first entity associated with an access network and a second entity associated with a core network. The control channel is associated with a session identifier identifying a user session. The method further includes receiving policy information associated with the user session from the second entity using the first control channel. The policy information is indicative of one or more policies to be applied in the access network to user data associated with the user session. | 04-28-2016 |
20160112323 | SCALABILITY OF PROVIDING PACKET FLOW MANAGEMENT - Systems and methods for managing packet flows in a communication network are provided. Packet information can be cached on different levels and used to avoid external queries. The cache information can also be correlated with other types of information, such as location information, to be able to serve that information quicker than if one or more external queries were to be made. A demux manager can provide routing and session setup, by routing packets that already have a session to the session manager and assigning packets to a session manager if they are not already assigned to a session. The tiered architecture also provides scalability to many users and minimizes delays even during high call volumes because the load can be distributed well across the gateway's resources. | 04-21-2016 |
20160112314 | USING SEGMENTATION IDENTIFICATION TO IDENTIFY DESTINATION NODE WITHIN NETWORK ENVIRONMENT - Packet transmission techniques are disclosed herein. An exemplary method includes receiving a packet that identifies an internet protocol (IP) address assigned to more than one destination node; selecting a virtual routing and forwarding table based, at least in part, on a segmentation identification in the packet; identifying a designated destination node in the packet based, at least in part, on the selected virtual routing and forwarding table; and transmitting the packet to the designated destination node. | 04-21-2016 |
20160112270 | DISCOVERING AND GROUPING APPLICATION ENDPOINTS IN A NETWORK ENVIRONMENT - An example method for discovering and grouping application endpoints in a network environment is provided and includes discovering endpoints communicating in a network environment, calculating affinity between the discovered endpoints, and grouping the endpoints into separate endpoint groups (EPGs) according to the calculated affinity, each EPG comprising a logical grouping of similar endpoints for applying common forwarding and policy logic according to logical application boundaries. In specific embodiments, the affinity includes a weighted average of network affinity, compute affinity and user specified affinity. | 04-21-2016 |
20160112252 | DEPLOYMENT AND UPGRADE OF NETWORK DEVICES IN A NETWORK ENVIRONMENT - A method for deployment and upgrade of network devices in a network environment includes comparing configuration settings executing on a switch with settings in a configuration file downloaded to the switch from a central configuration server in the network, identifying a difference between the configuration settings executing on the switch and the settings in the configuration file, synchronizing the difference by updating the configuration file at the configuration server if a sync up operation is selected, and synchronizing the difference by updating the configuration settings executing on the switch if a sync down operation is selected. The sync up operation can comprise updating the configuration file in its entirety; updating a template derived output appended to the configuration file; updating template instance variables feeding into the configuration file; and updating a template used to generate the configuration file. | 04-21-2016 |
20160105865 | SYSTEMS, METHODS AND MEDIA FOR SMALL CELL IDLE MODE MOBILITY - Systems and methods for small cell idle mode mobility include receiving, at a first small cell of a preconfigured cluster of small cells, a mobility area update request from a user equipment (UE). The method can also include registering location information of the UE with a small cell gateway, and retrieving a core network periodic timer for the UE from a mobility server. If certain conditions are met, the first small cell forwards the mobility area update request to a core network via the small cell gateway. Otherwise, the method can include the first small cell updating the location information of the UE with the mobility server, generating a locally-generated mobility area update accept message, and sending a locally generated mobility area update accept message to the UE along with a local periodic timer instructing the UE to send another mobility area update request when the local periodic timer expires. | 04-14-2016 |
20160105346 | SCALABLE FEDERATED POLICY FOR NETWORK-PROVIDED FLOW-BASED PERFORMANCE METRICS - The present disclosure describes methods and systems for providing and enforcing scalable federated policies for network-provided flow-based performance metrics. Due to different security concerns related to different domains, varying group policies can be applied to different domains to ensure proper sharing and receipt of flow-based performance metrics. Some policies can limit the type of performance metric being shared among the nodes in the domain. Some policies allow less information to be exposed by specifying aggregated performance metrics to be shared among the nodes in the domain. A group key management infrastructure can be provided to enforce these group policies in the network in a scalable manner. | 04-14-2016 |
20160105320 | AUTOMATED NETWORK CONFIGURATION IN A CLOSED NETWORK TOPOLOGY - In one embodiment, a method includes discovering at a master network device, a plurality of slave network devices and locations of the slave network devices in a closed network topology, storing at the master network device, a location, address, and status for each of the slave network devices, synchronizing the status of each of the slave network devices at the master network device, and transmitting from the master network device, a configuration for application at each of the slave network devices. An apparatus and logic are also disclosed herein. | 04-14-2016 |
20160103995 | OUT OF BAND MANAGEMENT OF BASIC INPUT/OUTPUT SYSTEM SECURE BOOT VARIABLES - A method is provided in one example embodiment and includes storing secure boot variables in a baseboard management controller; and sending the secure boot variables to a basic input/output system (BIOS) during a power on self-test, where the BIOS utilizes the secure boot variables during runtime to authenticate drivers and an operating system loader execution. In particular embodiments, the secure boot variables may be included in a white list, a black list, or a key list and, further, stored in erasable programmable read only memory. | 04-14-2016 |
20160103696 | TOUCHLESS MULTI-DOMAIN VLAN BASED ORCHESTRATION IN A NETWORK ENVIRONMENT - An example method for touchless multi-domain VLAN based orchestration in a network environment is provided and includes receiving mobility domain information for a virtual machine associated with a processor executing the method in a network environment, the mobility domain information comprising a mobility domain identifier (ID) indicating a scope within which the virtual machine can be moved between servers, generating a virtual station interface (VSI) discovery protocol (VDP) message in a type-length-value (TLV) format with the mobility domain information, and transmitting the VDP message to a leaf switch directly attached to the server, wherein the leaf switch provisions a port according to the mobility domain information. | 04-14-2016 |
20160103695 | OPTIMIZED ASSIGNMENTS AND/OR GENERATION VIRTUAL MACHINE FOR REDUCER TASKS - The present disclosure relates to assignment or generation of reducer virtual machines after the “map” phase is substantially complete in MapReduce. Instead of a priori placement, distribution of keys after the “map” phase over the mapper virtual machines can be used to efficiently reducer tasks in virtualized cloud infrastructure like OpenStack. By solving a constraint optimization problem, reducer VMs can be optimally assigned to process keys subject to certain constraints. In particular, the present disclosure describes a special variable matrix. Furthermore, the present disclosure describes several possible cost matrices for representing the costs determined based on the key distribution over the mapper VMs (and other suitable factors). | 04-14-2016 |
20160102951 | METHODS AND SYSTEMS FOR PROVIDING PROTECTION FROM PROJECTILES - The systems and methods disclosed herein relate to shielding electronic devices with respect to, among other things, projectiles. In some embodiments, an apparatus comprises a plurality of projectile-resistant panels corresponding to exterior surfaces of an electronic device. The apparatus wraps the electronic device, wherein each of the plurality of projectile-resistant panels covers a solid surface of the exterior surfaces of the electronic device and does not cover a perforated surface of the exterior surfaces of the electronic device. In further examples, the apparatus further comprises at least one fabric sheet forming a plurality of pockets in which to receive the plurality of projectile-resistant panels; and an articulation located between a pair of adjacent pockets of the plurality of pockets. The articulation facilitates the apparatus wrapping the electronic device by enabling rotation, relative to one another and about the articulation, between a first projectile-resistant panel and a second projectile-resistant panel. | 04-14-2016 |
20160100377 | INDEPENDENTLY VERIFYING A TRANSIT POINT IN A NETWORK ENVIRONMENT - An example method for independently verifying a transit point in a network environment is provided and includes receiving, at a transit point in a packet network, at least two radio signals from corresponding different radio sources, receiving, at the transit point, a sampling request in an packet message, and transmitting in another packet message a sample of the at least two radio signals such that by comparing the sample with an expected sample, a location of the transit point is determined. The expected sample can comprise another sample of the at least two radio signals that would have been received by the transit point at an expected location at a time of receipt of the sampling request, and if the expected sample matches the sample, the transit point is determined to be at the expected location. | 04-07-2016 |
20160099883 | CONFLICT AVOIDANT TRAFFIC ROUTING IN A NETWORK ENVIRONMENT - An example method for facilitating conflict avoidant traffic routing in a network environment is provided and includes detecting, at a network element, an intent conflict at a peer network element in a network, and changing a forwarding decision at the network element to steer traffic around the conflicted peer network element. The intent conflict refers to an incompatibility between an asserted intent associated with the traffic and an implemented intent associated with the traffic. In specific embodiments, the detecting includes mounting rules from the peer network element into the network element, and analyzing the mounted rules to determine intent conflict. In some embodiments, a central controller in the network deploys one or more intentlets on a plurality of network elements in the network according to corresponding intent deployment parameters. | 04-07-2016 |
20160099864 | SELECTIVE SERVICE BYPASS IN SERVICE FUNCTION CHAINING - In one embodiment, a method includes identifying a failure of a service function at a service node in a service chain, receiving a packet at the service node, and processing the packet at the service node according to a flag associated with the service function and set based on a criticality of the service function. An apparatus is also disclosed herein. | 04-07-2016 |
20160099853 | ACTIVE AND PASSIVE DATAPLANE PERFORMANCE MONITORING OF SERVICE FUNCTION CHAINING - The present disclosure describes a technique for performing performance monitoring of service chains. Variations on performance monitoring can include: passive monitoring, active monitoring, or hybrid monitoring. To provide performance monitoring, the Network Service Header (NSH) is modified to include telemetry information usable for monitoring the performance of a particular traffic flow being transported over a service path. | 04-07-2016 |
20160095141 | SYSTEM, METHOD, AND LOGIC FOR IDENTIFYING DEVICES FOR A VIRTUAL MEETING SESSION - Example systems, methods, and logic are provided herein for detecting a numerical identifier of an endpoint. In one example, a connectivity manager establishes a wireless communication session with a fixed endpoint using a wireless communication protocol. The connectivity manager module then generates a Phone Book Access Profile (PBAP) request to download a phone number associated with the fixed endpoint. The connectivity manager module receives, via the wireless communication session, a PBAP response comprising a phone number identifying the fixed endpoint and inputs the phone number identifying the fixed endpoint into a field used for initiating a call to the fixed endpoint. | 03-31-2016 |
20160094480 | DISTRIBUTED APPLICATION FRAMEWORK FOR PRIORITIZING NETWORK TRAFFIC USING APPLICATION PRIORITY AWARENESS - A system and a method for prioritizing network traffic using application awareness and network awareness in a network environment is disclosed. An exemplary method can include receiving a network traffic priority for network traffic associated with a job performed by a distributed application; and based on the network traffic priority, assigning the network traffic to a network classification model, such as an access control list, associated with a network element for directing the network traffic in a network. The network classification model is associated with a network traffic priority class having defined quality of service (QoS) features, such that the network traffic traverses the network according to the defined QoS features. | 03-31-2016 |
20160094394 | ZERO TOUCH CONFIGURATION AND SYNCHRONIZATION OF A SERVICE APPLIANCE IN A NETWORK ENVIRONMENT - An example method for zero touch configuration and synchronization of a service appliance in a network environment includes receiving, at an appliance port on a service appliance, an indication that a switch port on a switch changed from an inactive status to an active status, the appliance port being connected over a network to the switch port, starting a bootstrap protocol, including by receiving at the service appliance from the switch, a bootstrap message from a service executing in the switch, creating, by the service appliance, an empty port channel at the service appliance, adding, by the service appliance, the appliance port to the port channel, and associating, by the service appliance, the service to the port channel in a cache. | 03-31-2016 |
20160088083 | PERFORMANCE MONITORING AND TROUBLESHOOTING IN A STORAGE AREA NETWORK ENVIRONMENT - An example method for performance monitoring and troubleshooting in a storage area network (SAN) environment is provided and includes receiving, at a network element in the SAN, a plurality of frames of an exchange between an initiator and a target in the SAN, identifying a beginning frame and an ending frame of the exchange in the plurality of frames, copying the beginning frame and an ending frame of the exchange to a network processor in the network element, extracting, by the network processor, values of a portion of fields in respective headers of the beginning frame and the ending frame, and calculating, by the network processor, a normalized exchange completion time (ECT) based on the values. | 03-24-2016 |
20160087910 | COMPUTING MIGRATION SPHERE OF WORKLOADS IN A NETWORK ENVIRONMENT - An example method for computing migration sphere of workloads in a network environment is provided and includes receiving, at a virtual appliance in a network, network information from a plurality of remote networks, analyzing a service profile associated with a workload to be deployed in one of the remote networks and indicating compute requirements and storage requirements associated with the workload, and generating a migration sphere comprising compute resources in the plurality of networks that meet at least the compute requirements and storage requirements associated with the workload, the workload being successfully deployable on any one of the compute resources in the migration sphere. | 03-24-2016 |
20160087756 | APPARATUS, SYSTEM, AND METHOD FOR PROVIDING ENERGY MANAGEMENT, PROFILES, AND MESSAGE BLOCKS IN A CABLE SERVICE ENVIRONMENT - A method is provided in one example and includes creating a plurality of profiles that describe one or more downstream modulations for each data-subcarrier in a channel to be used by a plurality of cable modems; receiving at least one testing measurement from the plurality of cable modems; and assigning a selected one of the plurality of profiles to each of the plurality of cable modems based, at least in part, on the one testing measurement that was received. | 03-24-2016 |
20160085684 | MULTI-LEVEL PAGING AND ADDRESS TRANSLATION IN A NETWORK ENVIRONMENT - An example method for facilitating multi-level paging and address translation in a network environment is provided and includes receiving a request for memory in a physical memory of a network element, associating the request with a first virtual address space, mapping a memory region located in the physical memory to a first window in the first virtual address space, the memory region being also mapped to a second window in a different, second virtual address space, remapping the first window in the first virtual address space to the second window in the second virtual address space, and responding to the request with addresses of the second window in the second virtual address space. | 03-24-2016 |
20160073426 | SYSTEM AND METHOD FOR DECOUPLING LONG TERM EVOLUTION MEDIA ACCESS CONTROL SCHEDULING FROM SUBFRAME RATE PROCEDURES - A method is provided in one example embodiment and may include receiving data associated with a user equipment (UE) at a central baseband unit; determining one or more block time scheduling decisions for a plurality of subframes associated with the data; communicating the data to a remote radio unit; communicating the one or more block time scheduling decisions to the remote radio unit; and communicating the data to the UE from the remote radio unit based, at least in part, on the one or more block time scheduling decisions. In some cases, the method can include communicating the one or more block time scheduling decisions to the remote radio unit at a first rate and communicating the data to the remote radio unit at a second rate. | 03-10-2016 |
20160073423 | LEVERAGING MULTIPLE ACCESS TECHNOLOGIES SIMULTANEOUSLY - Systems and method are provided that allow a mobile device to communicate over multiple access technologies at the same time, including a cellular access technology, such as LTE, and via an untrusted WLAN access. The untrusted access is initiated via internet key exchange. The mobile device uses the same IP address over both access technologies. | 03-10-2016 |
20160073285 | SYSTEM AND METHOD FOR SUPPORTING CELL UPDATES WITHIN A SMALL CELL CLUSTER FOR IDLE MOBILITY IN CELL PAGING CHANNEL MODE - An example method is provided in one example embodiment and may include assigning an identifier to each of a plurality of Home Node Bs (HNBs); receiving a cell update for a user equipment (UE) transitioning from a first HNB to a second HNB, wherein the cell update for the UE includes a first identifier associated with the first HNB and wherein the UE is in a cell paging channel (PCH) mode; determining based, at least in part, on the first identifier associated with the first HNB, whether the first HNB is operating within a cluster of HNBs including the second HNB; and withholding registration of the cell update for the UE with an HNB gateway (HNB-GW) if the first HNB is operating within the cluster of HNBs including the second HNB until packet switched (PS) traffic for the UE is received by the second HNB. | 03-10-2016 |
20160073283 | SYSTEM AND METHOD FOR INTERNET PROTOCOL VERSION-BASED MULTIPLE ACCESS POINT NAME SUPPORT IN A NETWORK ENVIRONMENT - An example method is provided in one example embodiment and may include receiving an attach trigger for a user equipment (UE) within a trusted access network; configuring a first signaling path for the UE for a first Internet protocol (IP) connection; and configuring a second signaling path for the UE for a second IP connection, wherein the first and second IP connections are associated with different IP version types. The method can include switching traffic for the UE between the first signaling path for the first IP connection and the second signaling path for the second IP connection based on IP version type of the traffic. | 03-10-2016 |
20160073274 | OPERATION OF BASE STATION IN A CELLULAR COMMUNICATIONS NETWORK - In one embodiment, a method of forming a neighbor cell list in a base station of a cellular communications network comprises, at periodic intervals, and for specified durations: requesting the or each wireless device that is in connected mode with the base station to report a unique identifier for each other base station that it is able to detect; receiving reports from the or each wireless device that is in connected mode with the base station; and operating with a neighbor cell list compiled on the basis of the received reports. | 03-10-2016 |
20160065531 | SOURCE-AWARE TECHNIQUE FOR FACILITATING LISP HOST MOBILITY - A method is provided in one example embodiment and includes detecting by a first network element at a first data center site a local connection of an endpoint identifier (“EID”), in which the EID was previously locally connected to a second network element at a second data center site and notifying a mapping server of the local connection of the EID to the first network element. The method further includes receiving from the mapping server identifying information for the second network element and communicating with the second network element using the identifying information to obtain service information for traffic associated with the EID. The method may also include applying a service identified by the service information to outgoing traffic from the EID as well as applying a service identified by the service information to incoming traffic for the EID. | 03-03-2016 |
20160065476 | ACCESS NETWORK CAPACITY MONITORING AND PLANNING BASED ON FLOW CHARACTERISTICS IN A NETWORK ENVIRONMENT - An example method for access network capacity monitoring and planning based on flow characteristics in a network environment is provided and includes receiving, at a server in a first network, a request from a client at a second network for accommodating flow characteristics for a flow through the first network between the client and a remote destination, accommodating the flow characteristics if the request can be fulfilled with available network resources allocated to the client by the first network, measuring the flow at the first network between the client and the remote destination, exporting flow details including flow measurements and the requested flow characteristics to a flow collector, and denying the request if the flow collector determines that the flow measurements do not match the requested flow characteristics. In some embodiments, the flow measurements include fine-grain flow measurements, wherein the method further comprises receiving a request for the fine-grain flow measurements. | 03-03-2016 |
20160062866 | INDEX FILTER FOR VISUAL MONITORING - In one embodiment, a method includes receiving a plurality of measurements, each measurement associated with a different parameter, calculating an index based on the measurements, and generating a visual index display indicating the index, the visual index display comprising a first portion and a second portion, each portion configured for selection by a user. A first set of measurements is displayed when the first portion is selected and a second set of measurements is displayed when the second portion is selected. The first set of measurements is a subset of the second set of measurements. An apparatus and logic are also disclosed herein. | 03-03-2016 |
20160058188 | SYSTEMS AND METHODS FOR DAMPING A STORAGE SYSTEM - In an embodiment, an apparatus (e.g., for damping a motion of a drawer in a storage system) comprises a plate to pivotally attach to a first wall of a drawer, the plate comprising a pivot point about which the plate can pivot; a damped gear coupled to the plate, the damped gear having a plurality of gear teeth; and a spring to facilitate pivoting the plate about the pivot point to engage at least one of the plurality of gear teeth with at least one tooth on a rack. In some embodiments, the spring is to pivot the plate from a first configuration to an angular position relative the wall in a second configuration, wherein the at least one of the plurality of gear teeth and the at least one tooth on the rack are fully engaged with one another in both the first configuration and the second configuration. | 03-03-2016 |
20160057728 | SYSTEM AND METHOD FOR LOCATION REPORTING IN AN UNTRUSTED NETWORK ENVIRONMENT - An example method is provided and may include retrieving by a user equipment (UE) an access point (AP) Media Access Control (MAC) address for an AP to which the UE is connected; reporting location information for the UE to an evolved Packet Data Gateway over an SWu interface using Internet Key Exchange version 2 (IKEv2) protocol, wherein the location information includes, at least in part, a UE location in GPS coordinates, a service set identifier, the retrieved AP MAC address and cell identity information for the UE; and populating a location database with the location information. The method can include embedding the location information in an identity initiator (Idi) of an IKE Authentication Request (IKE_AUTH_REQ) message using a Network Access Identifier (NAI) and communicating the location information from the ePDG to a PGW over an S2b interface using a private extension information element of GPRS Tunneling Protocol version 2 (GTPv2). | 02-25-2016 |
20160050580 | SYSTEM AND METHOD FOR DISTRIBUTION OF RADIO CHANNEL STATE AND BASE STATION CONGESTION STATE IN A NETWORK ENVIRONMENT - An example method is provided in one example embodiment and can include obtaining, within a radio access network, a channel state for a data channel associated with a mobile terminal; including the channel state in a differentiated services (diffserv) marking within an Internet Protocol (IP) header of at least one IP packet associated with the mobile terminal; and transmitting the at least one IP packet including the IP header having the diffserv marking toward a packet data network. | 02-18-2016 |
20160050161 | DYNAMIC CASCADED CLUSTERING FOR DYNAMIC VNF - In an example, a server architecture is described for a dynamic cascaded node chain providing a resource cluster. The cascaded node chain may include one or more resource instances provisioned as a head node, zero or more middle nodes, and a tail node. Each node may include a discrete number of available resource entries in a flow table. As traffic enters the head node, each node attempts to match the traffic to an entry in its flow table. If no match is found, the packet is downlinked to the next node in the chain. If the packet reaches the tail node without a match, it is punted to the controller. The controller may then provision a matching entry if an entry is available. If not, the controller may spawn a new resource instance. When the full capacity of the cluster is reached, non-matching entries may be dropped. | 02-18-2016 |
20160044593 | SELECTIVE ACCESS POINT NAME ASSIGNMENT BASED ON MACHINE-TO-MACHINE TRAFFIC ANALYSIS - A method is provided in one example embodiment and includes analyzing characteristics of traffic associated with an application in a data communications network; defining each of a plurality of Access Point Names (“APNs”) for terminating traffic in the data communications network; comparing the application traffic characteristics with the APNs; and selecting one of the APNs based on results of the comparing, in which the selected one of the APNs is assigned to terminate the application traffic. In some embodiments, the application traffic characteristics include at least one of average data packet size, average uplink traffic volume, average downlink traffic volume, triggering traffic data generation, and session frequency. The method may further include periodically re-comparing the application traffic characteristics with the APNs and selecting a different one of the APNs based on results of the recomparing to terminate the application traffic. | 02-11-2016 |
20160044544 | CALL PRESERVATION ON HANDOVER - In an example, a wireless communication system and apparatuses thereof are described. In an example long-term evolution (LTE) network, a first base station hands over a connection to a second base station. The first base station may be a (femto) home eNodeB (HeNB) or (macro) eNodeB. The second base station may also be a HeNB or eNodeB connected to a different gateway. The first base station may send “Handover Request” on an X2 connection, identifying the gateway that the second base station is connected to as the correct gateway. After sending a “Handover Request Acknowledgement,” the second base station correctly establishes a tunnel to a connected gateway device. | 02-11-2016 |
20160037490 | SYSTEM AND METHOD FOR A MEDIA ACCESS CONTROL SCHEDULER FOR A LONG TERM EVOLUTION UNLICENSED NETWORK ENVIRONMENT - An example method is provided in one example embodiment and may determining, by a first communication device, whether one or more other communication devices are communicating wireless signals in a particular channel of an unlicensed band of the communication network; scheduling one or more Long Term Evolution Unlicensed (LTE-U) sub-frames within a frame schedule for a user equipment (UE) based, at least in part, on determining that one or more communication devices are communicating wireless signals in the particular channel; and communicating the one or more LTE-U sub-frames to the UE according to the frame schedule. | 02-04-2016 |
20160036922 | SYSTEM AND METHOD FOR EXTENDED WIRELESS ACCESS GATEWAY SERVICE PROVIDER WI-FI OFFLOAD - A method is provided in one example embodiment and includes receiving a dynamic host configuration protocol (DHCP) discovery signal at a wireless network element from a customer premise equipment; requesting that a data session be established at a gateway; receiving an Internet protocol (IP) address; and communicating the IP address to the customer premise equipment. | 02-04-2016 |
20160036708 | RF-AWARE PACKET FILTERING IN RADIO ACCESS NETWORKS - Methods and systems are provided for filtering packets in a wireless communication system in the to-subscriber direction. This filtering is at least in part based on RF circuit state information. For example, a packet filter is used that either permits or denies packets from reaching a mobile subscriber based on whether there is already an established RF circuit to provide packets to the mobile subscriber. Alternatively, or in addition, the packet filter may consider the history of circuit state transitions associated with a particular mobile subscriber, the percentage (or aggregate number) of available airlink resources that are currently in use, and/or the length of time associated with the dormancy of a mobile subscriber's RF connection. In various embodiments, the packet filter may cause one or more packets to be sent to a mobile subscriber using a special data channel that does not require the establishment of an RF circuit. | 02-04-2016 |
20160028755 | TRAFFIC SEGREGATION IN DDOS ATTACK ARCHITECTURE - In one embodiment, a particular node in a network determines information relating to network attack detection and mitigation from a local machine learning attack detection and mitigation system. The particular node sends a message to an address in the network indicating capabilities of the local machine learning attack detection and mitigation system based on the information. In response to the sent message, the particular node receives an indication that it is a member of a collaborative group of nodes based on the capabilities of the local machine learning attack detection and mitigation system being complementary to capabilities of other machine learning attack detection and mitigation systems. Then, in response to an attack being detected by the local machine learning attack detection and mitigation system, the particular node provides to the collaborative group of nodes an indication of attack data flows identified as corresponding to the attack. | 01-28-2016 |
20160028557 | DYNAMIC INSTANTIATION OF REMOTE VIRTUAL EXTENSIBLE LOCAL AREA NETWORK TUNNEL END POINTS ACQUIRED THROUGH A CONTROL PROTOCOL - A method is provided in one example embodiment and includes acquiring at a local network element information regarding a remote network element via a control protocol distribution method and refraining from instantiating the remote VTEP for the remote network element on the local network element until unicast traffic from the local network element to the remote network element via an overlay network has begun. The method may further include detecting unicast traffic from the local network element to the remote network element and subsequent to the detecting, instantiating the remote VTEP for the remote network element on the local network element. Some embodiments may include detecting cessation of the unicast traffic from the local network element to the remote network element and subsequent to the detecting cessation, uninstantiating the remote VTEP for the remote network element from the local network element. | 01-28-2016 |
20160028516 | SYSTEM, METHOD, AND PROGRAM FOR ROBUST INTERFERENCE REJECTION COMBINING - An apparatus includes an interference rejection combining module, at least partially implemented in hardware. The interference rejection combining module determines a covariance based on a Hermitian transpose of a signal received on a subcarrier of a symbol that is not a pilot symbol. | 01-28-2016 |
20160026983 | SYSTEM AND METHOD FOR BROKERING ELECTRONIC DATA IN A NETWORK ENVIRONMENT - Technologies are disclosed herein that include an embodiment for determining attributes associated with an instrumented entity, determining contract terms for access rights to instrument data associated with the instrumented entity, and creating a data offering for the access rights, where the access rights are based, at least in part, on the attributes and the contract terms. The embodiment further includes publishing the data offering, and providing evidence of rights to a primary data consumer system if a purchased request for the access rights is accepted, where the evidence of rights indicates the access rights are purchased. In more specific embodiments, the access rights include allowing an endpoint to receive the instrument data in real-time when the endpoint presents the evidence of rights. | 01-28-2016 |
20160026631 | NETWORK CONTROL AND MANAGEMENT USING SEMANTIC REASONERS IN A NETWORK ENVIRONMENT - An example method for facilitating network control and management using semantic reasoners in a network environment is provided and includes generating a fully populated semantics model of the network from network data according to a base network ontology of the network, mapping the fully populated semantics model to a network knowledge base, feeding contents of the network knowledge base to a semantic reasoner, and controlling and managing the network using the semantic reasoner. In specific embodiments, generating the model includes receiving the network data from the network, parsing the network data, loading the parsed network data into in-memory data structures, accessing a manifest specifying binding between a network data definition format and ontology components of the base network ontology, identifying ontology components associated with the network data based on the manifest, and populating the identified ontology components with individuals and properties from the corresponding data structures. | 01-28-2016 |
20160021583 | INTERFREQUENCY AND INTER-TECHNOLOGY NEIGHBOR PLANNING ON A SELF-ORGANIZING NETWORK - In an example, a self-organizing network (SON) provides automated interfrequency load balancing for a base station such as a NodeB. The NodeB may provide a plurality of carriers, such as in a plurality of UARFCN frequencies, and the SON may provide configuration directives for increasing efficiency. For example, when one carrier becomes loaded, the SON may update neighbor associations to take advantage of relatively unloaded frequency carriers. A plurality of scenarios S may be provided, and a policy P may be defined for each. When the NodeB encounters a scenario S, SON may send configuration directives to implement policy P. Similar concept and policy could be applied in conjunction with INTER Technology Neighbor Definitions between LTE and UMTS and UMTS and GSM. Example if GSM Frequency Neighbors needs to be replaced with different Frequency Neighbors from UMTS based on Load or RF conditions. | 01-21-2016 |
20160021571 | INTERFREQUENCY AND INTER-TECHNOLOGY NEIGHBOR PLANNING ON A SELF-ORGANIZING NETWORK - In an example, a self-organizing network (SON) provides automated interfrequency load balancing for a base station such as a NodeB. The NodeB may provide a plurality of carriers, such as in a plurality of UARFCN frequencies, and the SON may provide configuration directives for increasing efficiency. For example, when one carrier becomes loaded, the SON may update neighbor associations to take advantage of relatively unloaded frequency carriers. A plurality of scenarios S may be provided, and a policy P may be defined for each. When the NodeB encounters a scenario S, SON may send configuration directives to implement policy P. Similar concept and policy could be applied in conjunction with INTER Technology Neighbor Definitions between LTE and UMTS and UMTS and GSM. Example if GSM Frequency Neighbors needs to be replaced with different Frequency Neighbors from UMTS based on Load or RF conditions. | 01-21-2016 |
20160021400 | SEGMENT ROUTING SUPPORT IN MPEG DASH - According to one aspect, a method includes identifying a request for a piece of content, and obtaining a Moving Picture Expert Group (MPEG) Dynamic Adaptive Streaming over HTTP (DASH) manifest after identifying the request for the piece of content. The method also includes identifying at least one location at which the piece of content is located using the DASH manifest, wherein the at least one location at which the piece of content is located is a location from which the piece of content is arranged to be fetched. | 01-21-2016 |
20160021162 | USING SEGMENT ROUTING TO ACCESS CHUNKS OF CONTENT - According to one aspect, a method includes obtaining a packet at a network endpoint from a client via a first segment. The packet has a segment routing header that includes a list of addresses attached to a chunk entry, and is configured to identify at least a first chunk requested by the client. The method also includes identifying, at the network endpoint, the at least first chunk using the packet, and determining at the network endpoint if the network endpoint has the first chunk. If it is determined that the network endpoint has the first chunk, the first chunk is provided from the network endpoint to the client. Alternatively, if it is determined that the network endpoint does not have the first chunk, the packet is provided to a second segment. | 01-21-2016 |
20160021015 | REDUCING TRANSIENT PACKET DUPLICATION AND IMPROVING SPLIT-HORIZON FILTERING - In one embodiment, a method includes obtaining, at a first provider edge (PE) included a plurality of PEs multi-homed to a first customer edge (CE), traffic intended for the first CE, wherein the traffic includes a first indication, the first indication being configured to identify the traffic as flood traffic. A forwarding PE included in the plurality of PEs suitable to use to forward the traffic to the first CE is identified based on identifying traffic as the flood traffic. The method also includes determining whether the first PE is the forwarding PE, and providing the traffic to the first CE using the first PE when it is determined that the first PE is the forwarding PE. When it is determined that the first PE is not the forwarding PE, the traffic is filtered using the first PE. | 01-21-2016 |
20160021014 | LIGHTWEIGHT FLOW REPORTING IN CONSTRAINED NETWORKS - In one embodiment, a device in a network receives one or more packets that are part of a traffic flow. The device provides a sample packet to a path computation element (PCE) that includes a signature that uniquely identifies the traffic flow. The device receives a traffic flow policy for the traffic flow from a policy engine and enforces the traffic flow policy for the traffic flow. | 01-21-2016 |
20160020987 | DETERMINISTIC CONTROL LOOP SCHEDULING - In one embodiment, a scheduling device in a network receives routing metrics regarding a network path between a device controller and a networked device. The scheduling device also receives controller metrics for the device controller. The scheduling device determines time costs associated with the network path and one or more control operations performed by the device controller, based on the routing and controller metrics. The scheduling device generates a communication schedule based on the time costs and instructs the device controller and the networked device to use the communication schedule. | 01-21-2016 |
20160020967 | SYNCHRONIZED ROUTING UPDATES FOR TSCH NETWORKS - In one embodiment, a network node provides a time slotted channel hopping (TSCH) schedule to one or more child nodes of the network node. The TSCH schedule includes one or more mandatory routing protocol report time slots. The network node receives routing protocol reports from the one or more child nodes according to the TSCH schedule. The network node aggregates the received routing protocol reports into an aggregated routing protocol report. The network node provides the aggregated routing protocol report to a parent of the network node during a time slot that is subsequent to the one or more mandatory time slots for the one or more child nodes. | 01-21-2016 |
20160020921 | MULTIPLE MOBILITY DOMAINS WITH VLAN TRANSLATION IN A MULTI-TENANT NETWORK ENVIRONMENT - An example method for facilitating multiple mobility domains with VLAN translation in a multi-tenant network environment is provided and includes detecting attachment of a first virtual machine on a first port and a second virtual machine on a second port of a network element, the first port and the second port being configured with a first mobility domain and a second mobility domain, respectively, and the first and second virtual machines being configured on a same original VLAN, determining whether the original VLAN falls within a pre-configured VLAN range, translating the original VLAN to a first VLAN on the first port corresponding to the first mobility domain and to a second VLAN on the second port corresponding to the second mobility domain, and segregating traffic on the original VLAN into the first VLAN and the second VLAN according to the respective mobility domains for per-port VLAN significance. | 01-21-2016 |
20160007316 | SYSTEM AND METHOD FOR PROVIDING MESSAGE DELIVERY AND PAGING TO A GROUP OF USERS IN A NETWORK ENVIRONMENT - An example method is provided in one example embodiment and may include communicating a message for a group of one or more user equipment (UE) from a machine type communication-interworking function (MTC-IWF) to a packet data network gateway (PGW), wherein the message includes a group identity (ID) associated with the group of one or more UE; communicating the message from the PGW to one or more serving gateways (SGWs); and communicating the message from each of the one or more SGWs to each of the one or more UE of the group of the one via a tunnel for each of the one or more UE. | 01-07-2016 |
20160007170 | SYSTEM AND METHOD FOR PROVIDING MESSAGE DELIVERY AND PAGING TO A GROUP OF USERS IN A NETWORK ENVIRONMENT - An example method is provided in one example embodiment and may include configuring paging parameters for a group of one or more user equipment (UE) based, at least in part, on a group identifier (ID) for the group of one or more UE; communicating the paging parameters to each of the one or more UE of the group; and paging one or more idle mode UE of the group according to the paging parameters to transition the idle mode UE to a connected mode for receiving a group message. In some instances, configuring the paging parameters can include configuring a paging frame and paging occasion for the group of one or more UE based on the group ID; configuring extended paging cycle radio frames for the group of one or more UE; and/or configuring a paging group Radio Network Temporary Identifier for the group of one or more UE. | 01-07-2016 |
20160006654 | BI-DIRECTIONAL FLOW STICKINESS IN A NETWORK ENVIRONMENT - An example method for bi-directional flow stickiness in a network environment is provided and includes receiving a packet of a flow from a source address in a network, and destined to a destination address outside the network, looking up a flow table for an entry corresponding to the flow, and caching a forward flow entry and a reverse flow entry in the flow table if the look up results in a miss, the forward flow entry indicating a routing lookup, and the reverse flow entry indicating a previous hop from which the packet was received to maintain a bi-directional flow stickiness. Some embodiments also include receiving another packet from the destination address outside the network destined to the source address in the network, and forwarding it to the previous hop listed in the reverse flow entry. | 01-07-2016 |
20150382367 | METHOD AND SYSTEM FOR DYNAMIC ALLOCATION OF RESOURCES IN A CELLULAR NETWORK - One example method is provided for dynamic allocation of air interface resources in a cellular network. The method can include at least three wireless cells located within a geographical proximity of each other. The method can include determining, by a central managing entity, one or more classification rules for classifying each of said plurality of mobile devices according to the one or more classification rules. The method can also include providing, by the central management entity, to a group of base stations associated with the at least three cells, information that can include, at least in part, information that relates to the determined one or more classification rules and information that relates to semi-static allocation of blocks of air interface resources for use by one or more specific members of the group of base stations. | 12-31-2015 |
20150382259 | SYSTEM AND METHOD FOR PROVIDING SMALL CELL GATEWAY REDUNDANCY IN A NETWORK ENVIRONMENT - An example method is provided in one example embodiment and may include configuring a Home eNode B (HeNB) with plurality of tracking area identities (TAIs), wherein each TAI is served by one of a plurality of HeNB gateways (HeNB-GWs); configuring a TAI list for a Mobility Management Entity (MME), wherein the TAI list includes each of the plurality of TAIs; broadcasting a first TAI by the HeNB, wherein the first TAI is served by a first HeNB-GW; and switching the broadcasting from the first TAI to a second TAI served by a second HeNB-GW and re-parenting the HeNB from the first HeNB-GW to the second HeNB-GW if the HeNB loses connectivity with the first HeNB-GW. | 12-31-2015 |
20150382229 | SYSTEM AND METHOD FOR LAYER 3 RING PROTECTION WITH ADAPTIVE BANDWIDTH MICROWAVE LINKS IN A NETWORK ENVIRONMENT - A method is provided in one example and includes receiving a current bandwidth characteristic for a link, where the current bandwidth characteristic is determined under fading conditions associated with signal propagation on the link. The method can also include calculating a new cost for the link that is different from a nominal cost associated with a nominal bandwidth of the link without the fading conditions. The method could also include routing at least a portion of a plurality of flows that are to traverse the link away from the link based, at least in part, on the new cost. Another example method includes receiving the current bandwidth characteristic for the link, comparing the current bandwidth characteristic with a preconfigured low watermark corresponding to a class-specific MTR topology associated with a class of traffic traversing the link, and removing the link from the MTR topology based on the current bandwidth characteristic. | 12-31-2015 |
20150381444 | PATH VALIDATION IN SEGMENT ROUTING NETWORKS - In one embodiment, a method includes generating a path validation packet at a network device, the path validation packet including a plurality of segment identifiers for use in segment routing and an operations, administration, and management (OAM) segment identifier for use in path validation, transmitting from the network device the path validation packet on a path having a plurality of routers associated with the segment identifiers, one of the routers associated with the OAM segment identifier, and validating the path if a return path validation packet is received. An apparatus is also disclosed herein. | 12-31-2015 |
20150372913 | TRANSITIONING BETWEEN COMMUNICATION PROTOCOLS BETWEEN NETWORKS - A method is provided in one particular example and may include obtaining routing information for a plurality of Internet Protocol (IP) addresses in a first network that natively supports a first Internet protocol, the routing information for the plurality of IP addresses in the first network further comprising an additional IP address in the first network and an indication that the additional IP address in the first network is to be used as a tunnel endpoint within the first network for receiving data destined to any of the plurality of IP addresses in the first network; and sending data destined to any one of the plurality of IP addresses in the first network to the additional IP address in the first network. | 12-24-2015 |
20150372874 | SYSTEM, METHOD, AND APPARATUS FOR INCORPORATING A CENTRALIZED SELF ORGANIZING NETWORK (SON) IN A NETWORK - In one example embodiment, a Self Organizing Network (SON) element is provided to communicate with at least one Long-Term Evolution (LTE) wireless network and at least one transport communication network. The SON element is operative to obtain information that relates to updated Neighbor Lists from a plurality of enodeBs (eNBs) belonging to the at least one LTE wireless network, and to convey information that relates to the updated Neighbor Lists obtained, to at least one managing entity belonging to the transport communication network. | 12-24-2015 |
20150365855 | METHOD FOR MANAGING HETEROGENEOUS CELLULAR NETWORKS - A method is provided for managing heterogeneous cellular networks. The method comprises obtaining measurement reports from wireless entities relating to the intensity at which signals are received by each wireless entity; based on these measurement reports, and/or on geographical information of HetNet elements, identifying a macro cell located at the vicinity of the small cells; selecting one of the small cells to be a gateway cell, and other small cells to be inner cells. The gateway cell is a small cell that receives, or mobile terminals connected thereto receive, signals transmitted by the macro cell at an intensity being at least similar to intensity at which these signals are received at the inner cells; identifying physical layer identifiers (PLIs) used at the macro cell; and determining PLIs for the gateway cell which are not currently used by the macro cell, and PLIs available for use by the inner cells. | 12-17-2015 |
20150365829 | MULTI-OPERATOR CORE NETWORK SHARED SMALL CELL DEPLOYMENT IN A NON-MULTI-OPERATOR MACRO NETWORK ENVIRONMENT - A method provided in one embodiment includes receiving a resource list including a first core network identifier identifying a first core network, at least a first resource identifier identifying a first subset of network resources from a plurality of network resources associated with the first core network, and a first priority value associated with each of the identified resources of the first core network. The method further includes receiving a first device identifier associated with a first user equipment, determining whether a portion of the first device identifier matches the first core network identifier, and modifying the resource list to include at least a second resource identifier identifying a second subset of the network resources from the plurality of network resources associated with the first core network when the portion of the first device identifier is determined to match the first core network identifier. | 12-17-2015 |
20150365789 | LOCATION REPORTING OF USER EQUIPMENT IN A CELLULAR NETWORK ENVIRONMENT - An example method is provided in one example embodiment and includes receiving, by a user equipment device, a list including at least one location identifier associated with an area for location reporting and an area identifier identifying the area for location reporting. The method further includes receiving a location identifier broadcast by a wireless network element, and determining whether the broadcast location identifier matches the at least one location identifier associated with the area for location reporting. The method further includes sending a location reporting message by the user equipment device to a first network node when it is determined that the broadcast location identifier matches the at least one location identifier associated with the area for location reporting. The location reporting message is indicative of the user equipment device either entering or exiting the area for location reporting. | 12-17-2015 |
20150365382 | METHOD AND APPARATUS FOR ENFORCING STORAGE ENCRYPTION FOR DATA STORED IN A CLOUD - In one embodiment, a method includes providing a request to store at least a first piece of data. The request to store the first piece of data is a request to store the first piece of data in a first encrypted form on a cloud associated with the cloud application provider. The method also includes determining whether the cloud application provider is capable of encrypting the first piece of data, and providing the first piece of data to the cloud application provider if it is determined that the cloud application provider is capable of encrypting the first piece of data. If it is determined that the cloud application provider is not capable of encrypting the first piece of data, the method further includes encrypting the first piece of data to create the first encrypted form and providing the first encrypted form to the cloud application provider. | 12-17-2015 |
20150365341 | CLOUD-BASED RESOURCE AVAILABILITY CALCULATION OF A NETWORK ENVIRONMENT - An example method for cloud-based resource availability calculation of a network environment is provided and includes receiving a plurality of system error log (SEL) data in real time at a virtual appliance executing in a first network. The SEL data is received from a remote second network indicating system events associated with corresponding resources in the second network. The method further includes calculating a resource availability (RA) index indicative of availability of resources for workload deployment in the second network, and sending the RA index to a management application executing in the second network for appropriate management and allocation of resources in the second network. In specific embodiments, the method further includes receiving a SEL inventory associated with a specific resource in the second network, and updating the RA index based on the SEL inventory. | 12-17-2015 |
20150365324 | HIGH-EFFICIENCY SERVICE CHAINING WITH AGENTLESS SERVICE NODES - An example method for distributed service chaining is provided and includes receiving a packet belonging to a service chain in a distributed virtual switch (DVS) network environment, the packet includes a network service header (NSH) indicating a service path identifier identifying the service chain. The packet is provided to a virtual Ethernet module (VEM) connected to an agentless service node (SN) providing an edge service such as a server load balancer (SLB). The VEM associates a service path identifier corresponding to the service chain with a local identifier such as a virtual local area network (VLAN). The agentless SN returns the packet to the VEM for forwarding on the VLAN. Because the VLAN corresponds exactly to the service path and service chain, the packet is forwarded directly to the next node in the service chain. This can enable agentless SNs to efficiently provide a service chain for network traffic. | 12-17-2015 |
20150365323 | DISTRIBUTED NETWORK ADDRESS AND PORT TRANSLATION FOR MIGRATING FLOWS BETWEEN SERVICE CHAINS IN A NETWORK ENVIRONMENT - An example method for distributed network address and port translation (NAPT) for migrating flows between service chains in a network environment is provided and includes distributing translation state for a flow traversing the network across a plurality of NAPT service nodes in the network, with packets belonging to the flow being translated according to the translation state, associating the flow with a first service chain at a flow classifier in the network, and updating the association when the flow migrates from the first service chain to a second service chain, with packets belonging to the migrated flow also being translated according to the translation state. The method may be executed at a pool manager in the network. In specific embodiments, the pool manager may include a distributed storage located across the plurality of NAPT service nodes. | 12-17-2015 |
20150365322 | PROVIDING VIRTUAL PRIVATE SERVICE CHAINS IN A NETWORK ENVIRONMENT - A method provided in one embodiment includes receiving a first data packet of a data flow at a first classifier in which the first data packet includes a first identifier. The method further includes determining a second classifier associated with the first identifier in which the second classifier is further associated with at least one service chain of a service chain environment. The method still further includes forwarding the first data packet to the second classifier. The second classifier is configured to receive the first data packet, determine a particular service chain of the at least one service chain to which the first data packet is to be forwarded, and forward the first data packet to the particular service chain. | 12-17-2015 |
20150365312 | EFFICIENTLY UTILIZING PROBE PACKETS WITHIN A NETWORK - According to one aspect, a method includes monitoring traffic between a first network element and a second network element, and determining when no packets have been sent from the first network element towards the second network element within a predetermined amount of time. When it is determined that no packets have been sent from the first network element towards the second network element within the predetermined amount of time, the method includes sending at least one smart probe packet from the first network element to the second network element | 12-17-2015 |
20150365245 | SYSTEM AND METHOD FOR PROVIDING SMART GRID COMMUNICATIONS AND MANAGEMENT - A method is provided in one example embodiment and includes receiving a request for a service that involves phasor measurement unit (PMU) data; identifying a service device in a network to perform the service; and multicasting one or more results of the service to a group of subscribers identified by a multicast group address. In more particular embodiments, particular PMU data is redirected to the service device via a service insertion architecture (SIA) protocol. In addition, the service can include replicating packets and masking a subset of traffic for forwarding to a first hop router of the network. In certain example instances, metadata is used in order to apply the service to certain traffic propagating in the network. | 12-17-2015 |
20150363328 | METHODS AND APPARATUS FOR DATA PROCESSING - Data processing methods and apparatus for efficiently storing and retrieving data, e.g., blocks of data, to and from memory. The data processing including, e.g., techniques such as using linked lists and/or tables for tracking duplicate data blocks received for storage, the use of lossless data compression, and de-duplication based on comparing hash values, compressed data block sizes, and/or bit by bit comparisons of the block of data to be stored and previously stored blocks of data. For example, one embodiment of a method in accordance with the present invention includes generating a hash value from a block of data to be stored and a hash function; compressing the block of data to be stored to generate a compressed block of data, said compressed block of data being of a first size; comparing said generated hash value to hash values corresponding to previously stored blocks of data; and when said generated hash value matches a hash value of a previously stored block of data, determining if the block of data to be stored matches the previously stored block of data with the matching hash value. In some embodiments of the present invention, the aforementioned determining step includes comparing said first size to the size of said previously stored block of data with the matching hash value; and determining that said block of data to be stored does not match said previously stored block of data when said first size does not match the size of said stored block of data. | 12-17-2015 |
20150358872 | SYSTEM AND METHOD FOR PROVIDING HANDOVER TO AN AMBIGUOUS SMALL CELL ACCESS POINT IN A NETWORK ENVIRONMENT - An example method is provided in one example embodiment and includes receiving a request to relocate a user equipment (UE) from a source macro radio to an ambiguous small cell access point (AP), wherein the request includes a target cell identity (ID) encoded with a source macro cell identifier for the source macro radio and a target sub-carrier identifier for the ambiguous small cell AP; determining potential target small cell APs for relocation of the first UE using the using the first target cell ID, wherein each of the potential target small cell APs are within a coverage area of the source macro radio and operate using the target sub-carrier identifier; and preparing, for each of the potential target small cell APs, a common channel to receive relocation of the first UE. The first UE can relocate to a particular target small cell access point using the common channel. | 12-10-2015 |
20150358871 | SYSTEM AND METHOD FOR PROVIDING HANDOVER TO AN AMBIGUOUS SMALL CELL ACCESS POINT IN A NETWORK ENVIRONMENT - An example method is provided in one example embodiment and includes receiving a request to relocate a user equipment (UE) from a source macro radio to an ambiguous small cell access point (AP), wherein the request includes a target cell identity (ID) encoded with a source macro cell identifier for the source macro radio and a target sub-carrier identifier for the ambiguous small cell AP; determining potential target small cell APs for relocation of the first UE using the using the first target cell ID, wherein each of the potential target small cell APs are within a coverage area of the source macro radio and operate using the target sub-carrier identifier; and preparing, for each of the potential target small cell APs, a common channel to receive relocation of the first UE. The first UE can relocate to a particular target small cell access point using the common channel. | 12-10-2015 |
20150358850 | CONVEYING SUBSCRIBER INFORMATION TO SERVICE CHAIN SERVICES USING TUNNEL PROTOCOL HEADER ENCAPSULATION FOR MOBILE NETWORK APPLICATIONS IN A NETWORK ENVIRONMENT - A method provided in one embodiment includes receiving, at a first network element, a first data packet of a data flow, wherein the data flow is associated with a subscriber. The method further includes receiving subscriber information associated with the subscriber, and encapsulating the subscriber information with the first data packet to form an encapsulated data packet. The method still further includes determining a service chain including one or more services to which the encapsulated data packet is to be forwarded, and forwarding the encapsulated data packet to the service chain. | 12-10-2015 |
20150358807 | SYSTEM AND METHOD FOR SMALL CELL GATEWAY CORE NETWORK SELECTION IN A MULTI-OPERATOR CORE NETWORK ENVIRONMENT - An example method is provided in one example embodiment and includes receiving a first communication from a user equipment (UE) for a subscriber associated with the first UE to a small cell network, wherein a plurality core networks (CNs) share resources for the small cell network; selecting a first CN from the plurality of CNs to provide services to the first subscriber via the small cell network based, at least in part, on a first Mobile Country Code (MCC) and a first Mobile Network Code (MNC) for the first subscriber; and storing, in at least one memory element, at least one association of the MCC and the MNC to the CN for use in subsequent requests from other UEs for subscribers to attach to the small cell network. | 12-10-2015 |
20150358435 | FLOW MATCHING OPTIMIZATION IN SCALED ENVIRONMENTS - In one embodiment, a method includes identifying at a network device, a number of items for matching at a hash table, the number of items exceeding matching available with ternary content addressable memory (TCAM) at the network device, defining at the network device, an optimal cyclic redundancy check (CRC) polynomial based on the number of items for matching at the hash table, and generating at the network device, an optimal hash function based on the optimal CRC polynomial to extend packet classification capability at the network device. An apparatus is also disclosed herein. | 12-10-2015 |
20150358410 | TRANSFER OF SESSION FROM INTERACTIVE DIGITAL SIGN TO MOBILE DEVICE - In one embodiment, a method includes creating at a network device, a user session with an interactive digital sign, generating a session tag for the user session, wherein the session tag is configured for input at a mobile device, transmitting the session tag to the interactive digital sign, and continuing at the network device, the user session with the mobile device. An apparatus and logic are also disclosed herein. | 12-10-2015 |
20150355911 | MECHANISM FOR OBVIATING THE NEED FOR HOST-SIDE BASIC INPUT/OUTPUT SYSTEM (BIOS) OR BOOT SERIAL PERIPHERAL INTERFACE (SPI) DEVICE(S) - The present disclosure describes several embodiments, e.g., a method, a baseboard management controller (BMC) system, a computer-readable non-transitory medium, for managing boot images for a computer system. These embodiments may include obtaining, by a BMC of the BMC system, a first boot image for the processor-based system, storing, by the BMC of the BMC system, the first boot image at a first location in a memory element of BMC system, and informing, by the BMC of the BMC system to a bus-to-memory bridge, first location information indicating a first location at which the first boot image is stored. The present disclosure also describes the bus-to-memory bridge which interfaces between a bus of the processor-based system and the memory element of the BMC system to allow one or more processors of the processor-based system to access the memory element of the BMC system to obtain boot image(s). | 12-10-2015 |
20150351147 | SYSTEMS AND METHODS FOR IMPLEMENTING BEARER CALL-BACK SERVICES - The present disclosure is directed at systems, methods and media for providing bearer call-back services for bearers that have been rejected or pre-empted by a network apparatus in a core network. In some embodiments, if a network apparatus enters a state in which it becomes necessary to reject or pre-empt a bearer associated with a user equipment (UE) (e.g., due to load conditions in a radio access network, the core network, or an application server), the network apparatus can send to the UE a call-back message when the network apparatus exits the state that precipitated the bearer rejection or pre-emption. By sending a call-back message, the network apparatus can save the UE from multiple unsuccessful attempts to establish a bearer, or from waiting an unnecessarily long time before establishing a bearer. | 12-03-2015 |
20150351072 | SYSTEM AND METHOD FOR HAND-IN DISAMBIGUATION USING USER EQUIPMENT WIFI LOCATION IN A NETWORK ENVIRONMENT - An example method is provided in one example embodiment and includes receiving a handover request from a first radio network to handover a user equipment (UE) to a second radio network, wherein the handover request includes an international mobile subscriber identity (IMSI) for a user associated with the UE and a pseudo cell identifier (ID); determining a target channel configuration for the UE using the pseudo cell ID; querying a third radio network using the user IMSI to determine a location of the UE, wherein at least one access point in the third radio network is in communication with the UE; and selecting a particular target access point in the second radio network for handover of the UE based, at least in part, on the location of the UE, the target channel configuration for the UE and a location of the particular target access point. | 12-03-2015 |
20150351071 | Location Classification Accuracy for Devices Inside and Outside of a Deployment Area - Techniques are presented to optimize location classification accuracy for wireless devices. A controller in communication with one or more wireless access points receives measurement data associated with signals received at one or more wireless access points from a plurality of wireless clients. The controller classifies each of the measurement data associated with a corresponding client as indicative a location inside of a particular region or outside of the particular region. The controller determines information of an actual location for each of the clients and classifies the information of the actual location as indicating a location inside of the particular region or outside of the particular region. For a given client whose classification of the information of the actual location does not match the classification of the corresponding measurement data, the controller modifies the information of the actual location of the given client. | 12-03-2015 |
20150350769 | Determination, Display, and Adjustment of Best Sound Source Placement Region Relative to Microphone - A video conference endpoint determines a position of a best audio pick-up region for placement of a sound source relative to a microphone having a receive pattern configured to capture sound signals from the best region. The endpoint captures an image of a scene that encompasses the best region and displays the image of the scene. The endpoint generates an image representative of the best region and displays the generated image representative of the best region as an overlay of the scene image. | 12-03-2015 |
20150350377 | PROVIDING ON-DEMAND SERVICES - A service system receives a request for a service from a computing device of a user. In response to receiving the service request, the service system determines the content of the request and communicates a data collection module to the user device. Based on the content of the request, the service system determines a data collection instruction. The service system communicates the data collection instruction to the data collection module, which executes the instruction, thus resulting in collection of data from the user device and/or devices associated with the user device. The service system then receives the collected data. Based on an analysis of the received data, for example, the service system determines a response to the service request. For example, the service system determines a service product that is responsive to the request. The service system then communicates the response to the user device. | 12-03-2015 |
20150350258 | Real-Time Agent for Actionable Ad-Hoc Collaboration in an Existing Collaboration Session - A method is provided for use in connection with a communication session between two or more participants. The communication session may be an online/web-based meeting, voice call, video call, instant messaging session, etc. Interactions between two or more participants of the communication session are monitored in order to identify an additional participant for the communication session based on a topical context of the interactions. A request is sent to the additional participant to join the communication session. Before the request is sent to the additional participant, the participants in the existing communication session may be notified with a prompt inquiring as to whether the additional participant should be contacted to join the existing communication session. | 12-03-2015 |
20150350125 | Photo Avatars - In one implementation, endpoint computing devices communicate using one or more instant messages. A user interface of an endpoint receives text input from a user for an instant message. The endpoint generates a trigger command in response to the instant message. A camera captures an image in response to the trigger command. The image may depict the user that entered the text input but other images are possible. The endpoint sends the image with the instant message to a recipient of the instant message. | 12-03-2015 |
20150350018 | CENTRALIZED ADJUSTMENT OF DATA RATES IN MESH NETWORKS - In one embodiment, a method is disclosed in which a device receives data regarding a topology of a network. Traffic data for one or more data links in the network and performance data for the one or more data links are also received. A data rate change is simulated for the one or more data links using the topology data, traffic data, and performance data. Based on the simulated data rate change, a data rate change command is provided to one or more nodes associated with the one or more data links. | 12-03-2015 |
20150350015 | AUTOMATING MONITORING USING CONFIGURATION EVENT TRIGGERS IN A NETWORK ENVIRONMENT - An example method for automating monitoring using configuration event triggers in a network environment is provided and includes receiving a change request for a configuration change, creating a change impact monitor according to a profile associated with the configuration change, taking a first snapshot of performance indicators when the configuration change is applied, taking a second snapshot of the performance indicators a predetermined duration after applying the configuration change, and generating a change impact notification describing the first snapshot and the second snapshot. The profile can specify the performance indicators for the configuration change. A change agent that creates the change impact monitor may also be invoked. In some embodiments, the method can further include receiving a soak command, and taking a third snapshot of the performance indicators before applying the configuration change. | 12-03-2015 |
20150349881 | CONTROL SYSTEM FOR MULTI-BEAM FREE SPACE OPTICAL ENDPOINT - Free space optics (FSO) is a wireless technology that utilizes optical frequencies. Previously available FSO transceivers are restricted to point-to-point links because of the high directivity of laser light used to transmit data. By contrast, various implementations disclosed herein include a multi-beam FSO apparatus that is less reliant on point-to-point links, and includes a lens assembly and a planar array of optical communication devices. The lens assembly includes at least one surface shaped to direct ingress light received substantially within a first angular range towards a focal plane, and to direct egress light away from the focal plane into the first angular range. The planar array includes a plurality of optical communication devices arranged in association with the focal plane of the lens assembly, wherein each of the plurality of optical communication devices characterizes at least one of a plurality of optical communication link endpoints. | 12-03-2015 |
20150347989 | Payment Gateway Interface - Techniques and apparatus are described that enable electronic payment transactions over a network, such as the Internet. A technique, in a web re-direction embodiment, includes receiving a generic payment request from an electronic commerce web application, the generic payment request including at least an indication of a type of payment to be completed, preparing a payment gateway-specific web request that is supportive of the type of payment to be completed, passing the payment gateway-specific web request to the electronic commerce web application for delivery to a payment gateway for which the payment gateway-specific web request was prepared, receiving a payment gateway-specific web response from the payment gateway via the electronic commerce web application, processing the payment gateway-specific web response, and returning, to the electronic web application, a generic payment response including, at least, an Internet Protocol (IP) address of the payment gateway. | 12-03-2015 |
20150346463 | Spherical Lens Redirected Imaging - Wide angled image generation may be facilitated by directing light rays of a field of view through a partial spherical ball lens along an original axis. The light rays may be redirected off of a flat surface of the partial spherical ball lens along a different axis to at least one image sensor. The at least one image sensor is operable converts the light rays into digital data representing the redirected light rays. Wide angled images may be generated from the digital data. | 12-03-2015 |
20150341899 | REDUCING PAGING DELAYS USING LOCATION ANALYTICS IN COMMUNICATIONS NETWORKS - A method is provided in one example embodiment and includes querying by a first communications network a database maintained by a second communications network for location data comprising a path typically taken by a mobile device; using the location data to identify network elements of the first communications network located proximate the path; and sending a page request for the mobile device only to the identified network elements. The method may further include mapping a first identifier for the mobile device to the second identifier for the mobile device; and using the second identifier to perform the querying. In certain embodiments, the mapping is initiated responsive to a call received for the mobile device. | 11-26-2015 |
20150341719 | Precise Tracking of Sound Angle of Arrival at a Microphone Array under Air Temperature Variation - A video conference endpoint detects a face and determines a face angle of the detected face relative to a reference direction based on images captured with a camera. The endpoint determines an angle of arrival of sound (i.e., a sound angle) received at a microphone array that transduces the sound relative to the reference direction based on the transduced sound and a sound speed parameter indicative of a speed of sound in air. The endpoint compares the face angle against the sound angle, and adjusts the sound speed parameter so as to reduce the angle difference if the compare indicates an angle difference greater than zero between the face and sound angles. | 11-26-2015 |
20150341309 | PORT CHUNK ALLOCATION IN NETWORK ADDRESS TRANSLATION - A system and method for providing network and port address translation is provided. A global IP address and a block (chunk) of ports are allocated for each mobile subscriber (MS) on first data connection. Subsequent data connections from the same MS are assigned the same IP address and a new port from this block. The mapping information is communicated, processed, and stored once for the complete block, instead of for every new data connection. This process reduces processing, communication, and storage requirements. | 11-26-2015 |
20150341275 | DYNAMIC TRAFFIC SHAPING BASED ON PATH SELF-INTERFERENCE - In one embodiment, a method is disclosed in which a device in a network receives self-interference information from one or more nodes in the network. A degree of self-interference along a communication path in the network is determined based on the received self-interference information. A packet to be sent along the communication path is also identified and traffic shaping is performed on the communication path based on the degree of self-interference along the path. | 11-26-2015 |
20150341220 | TOUCHLESS ORCHESTRATION FOR LAYER 3 DATA CENTER INTERCONNECT IN COMMUNICATIONS NETWORKS - A method is provided in one example embodiment and includes receiving from an orchestrator element for a new Virtual Routing and Forwarding element (“VRF”) created in a communications network a name of the VRF and interconnect identification; selecting a border element for the VRF; and creating in a database a VRF entry for the selected border element, the entry identifying a configuration profile for the selected border element. The method further includes forwarding a VRF create notification to the selected border element; and providing the configuration profile from the corresponding entry to the selected border element in response to a query to the database from the selected border element. The selected border element applies the configuration profile automatically to configure the selected border element. | 11-26-2015 |
20150341187 | USER-EQUIPMENT-INITIATED FRAMED ROUTES ON CUSTOMER-PREMISES EQUIPMENT FOR WIRELESS WIDE AREA NETWORKS - Systems and methods are disclosed for processing framed routes initiated by user equipment (UE) at customer-premises equipment (CPE) and gateways using protocol configuration options (PCO). The PCO can include encoding and decoding framed route information using a PCO information element (IE). The framed route information can include a framed route and a virtual private networking routing and forwarding (VRF) name. The framed route information can also include a tunnel identifier and a packet data protocol (PDP) address. The gateway can include a packet data network gateway (PGW) and a gateway general packet radio service support node (GGSN). When the gateway receives an attach request message from the UE with the encoded PCO, the gateway decodes the PCO to extract the framed route and VRF name, associates a tunnel identifier and PDP address with the extracted framed route and VRF name, and installs the framed route in a corresponding VRF. | 11-26-2015 |
20150341140 | DYNAMICALLY ADJUSTING ROUTE OR LINK TOPOLOGY TO MINIMIZE SELF-INTERFERENCE - In one embodiment, a method is disclosed in which physical layer information is received from one or more nodes along a path in a network. Self-interference information is also received from the one or more network nodes. The presence of self-interference along the path is identified and a transmission strategy of the one or more nodes is altered based on the identified self-interference and the received physical layer information. | 11-26-2015 |
20150334716 | MANAGING COMPUTATIONAL RESOURCES IN A NETWORK ENVIRONMENT - The present disclosure describes approaches for managing computational resources in a network environment. A computational resource may include any resource consumable over a network and available in finite supply. One example is a method comprising receiving a request associated with initiating a communication session in a network. The request may identify a source endpoint and a destination endpoint of the communication session and a value of a computational resource associated with the communication session. A measure of the computational resource may be determined for at least one network element in a path from the source endpoint to the destination endpoint. At least one rule may be applied to determine whether to allow the communication session to be initiated at the value. The at least one rule may identify alternative values for the computational resource. An instruction to initiate the communication session is generated based on the at least one rule. | 11-19-2015 |
20150334676 | Managing Wireless Beacon Devices - Wireless transmissions from beacon devices are received at a plurality of receiver devices. The wireless transmissions comprise packets that carry information used for location-based services for mobile wireless devices. Content of one or more fields of the beacon packets received by one or more of the plurality of receiver devices is obtained. Measurement data associated with the transmissions received at the plurality of receiver devices is generated. Locations of the respective beacon devices are computed from the measurement data obtained by the plurality of receiver devices. Information identifying detected beacon devices and their locations are stored to maintain a location history of beacon devices over time locations. Changes from information contained in the location history are detected based on the locations computed for respective beacon devices from the measurement data and content of one or more fields of detected beacon packets. | 11-19-2015 |
20150334615 | SYSTEM AND METHOD FOR IDENTIFYING A SUBSCRIBER IN A NETWORK ENVIRONMENT - An example method is provided in one example embodiment and includes receiving, by a first Home eNodeB (HeNB), a first attach request from a user equipment (UE) for attaching a subscriber associated with the UE to a small cell network; determining whether the subscriber has transitioned into the small cell network from a macro cell network; exchanging, based on the determination, a first pair of messages between the first HeNB and the UE to determine an International Mobile Subscriber Identity (IMSI) of the subscriber; and exchanging, based on the determination, one or more second pairs of messages between the first HeNB and the UE to advance a sequence number for Non-Access Stratum (NAS) messages for the UE to a value corresponding to a received sequence number for the first attach request from the UE. | 11-19-2015 |
20150334595 | SYSTEM AND METHOD FOR TRANSPORTING INFORMATION TO SERVICES IN A NETWORK ENVIRONMENT - An example method is provided in one example embodiment and may include receiving a packet for a subscriber at a gateway, wherein the gateway includes a local policy anchor for interfacing with one or more policy servers and one or more classifiers for interfacing with one or more service chains, each service chain including one or more services accessible by the gateway; determining a service chain to receive the subscriber's packet; appending the subscriber's packet with a header, wherein the header includes, at least in part, identification information for the subscriber and an Internet Protocol (IP) address for the local policy anchor; and injecting the packet including the header into the service chain determined for the subscriber. | 11-19-2015 |
20150334569 | Rogue Wireless Beacon Device Detection - Techniques are presented for detecting rogue wireless beacon devices. Wireless transmissions from beacon devices are received at a plurality of receiver devices. The wireless transmissions of the beacon devices comprise packets that carry information used for location-based services for mobile wireless devices. Content of one or more fields of the packets transmitted by the beacon devices and received by one or more of the receiver devices is obtained. The content of one or more fields of the packets is analyzed to detect an unauthorized beacon device. The analyzing operation may involve comparing the content of the one or more fields of the packets against a list that contains one or more identifiers for authorized beacon devices. In another form, analyzing may involve analyzing the content of the one or more fields of the packets with pattern information related to advertising content or advertising source. | 11-19-2015 |
20150334123 | GROUND TRUTH EVALUATION FOR VOTING OPTIMIZATION - In one embodiment, attack observations by a first node are provided to a user interface device regarding an attack detected by the node. Input from the user interface device is received that confirms that a particular attack observation by the first node indicates that the attack was detected correctly by the first node. Attack observations by one or more other nodes are provided to the user interface device. Input is received from the user interface device that confirms whether the attack observations by the first node and the attack observations by the one or more other nodes are both related to the attack. The one or more other nodes are identified as potential voters for the first node in a voting-based attack detection mechanism based on the attack observations from the first node and the one or more other nodes being related. | 11-19-2015 |
20150334030 | PROBING AVAILABLE BANDWIDTH ALONG A NETWORK PATH - In one embodiment, a time period is identified in which probe packets are to be sent along a path in a network based on predicted user traffic along the path. The probe packets are then sent during the identified time period along the path. Conditions of the network path are monitored during the time period. The rate at which the packets are sent during the time period is dynamically adjusted based on the monitored conditions. Results of the monitored conditions are collected, to determine an available bandwidth limit along the path. | 11-19-2015 |
20150334029 | DIFFERENTIATED QUALITY OF SERVICE USING SECURITY AS A SERVICE - Various embodiments are disclosed for prioritizing network flows and providing differentiated quality of service in a telecommunications network. In some embodiments, a SecaaS can be utilized to signal flow characteristics of one or more network flows to a connector in a network so that the network can install differentiated quality of service against the one or more network flows based upon the received flow characteristics. Some embodiments enable a connector in a network to act as a PCP client to signal received flow characteristics to an upstream PCP server hosted by an adjacent access network. | 11-19-2015 |
20150334027 | SYSTEM AND METHOD FOR TRANSPORTING INFORMATION TO SERVICES IN A NETWORK ENVIRONMENT - An example method is provided in one example embodiment and may include receiving a packet for a subscriber at a gateway, wherein the gateway includes a local policy anchor for interfacing with one or more policy servers and one or more classifiers for interfacing with one or more service chains, each service chain including one or more services accessible by the gateway; determining a service chain to receive the subscriber's packet; appending the subscriber's packet with a header, wherein the header includes, at least in part, identification information for the subscriber and an Internet Protocol (IP) address for the local policy anchor; and injecting the packet including the header into the service chain determined for the subscriber. | 11-19-2015 |
20150333999 | PERFORMANCE MONITORING IN A MULTI-SITE ENVIRONMENT - In one embodiment, a method includes monitoring traffic at a network device at a receiving network site to determine if a performance threshold is violated, transmitting an alert to a sending network site if the performance threshold is violated at a path at the network device, and transmitting traffic information for the path from the network device to the sending network site. The receiving network site comprises a plurality of paths for receiving traffic from the sending network site and traffic information is transmitted to the sending network site for each of the paths if the performance threshold is violated. An apparatus and logic are also disclosed herein. | 11-19-2015 |
20150333997 | PROBING TECHNIQUE FOR PREDICTIVE ROUTING IN COMPUTER NETWORKS - In one embodiment, network information associated with a plurality of nodes in a network is received at a device in a network. From the plurality of nodes, a node is selected based on a determination that the selected node is an outlier among the plurality of nodes according to the received network information. Then, a probe is sent to the selected node, and in response to the probe, a performance metric is received from the selected node at the device. | 11-19-2015 |
20150333992 | DYNAMIC COLLECTION OF NETWORK METRICS FOR PREDICTIVE ANALYTICS - In one embodiment, data is received at a device regarding a network-monitoring process in which one or more nodes in a network export network metrics to one or more collector nodes. A change to the network-monitoring process is determined based on the received data. The device also adjusts the network-monitoring process to implement the determined change. | 11-19-2015 |
20150333969 | PREDICTIVE NETWORKING ARCHITECTURE FOR NEXT-GENERATION MULTISERVICE, MULTICARRIER WANS - In one embodiment, network traffic data is received regarding traffic flowing through one or more routers in a network. A future traffic profile through the one or more routers is predicted by modeling the network traffic data. Network condition data for the network is received and future network performance is predicted by modeling the network condition data. A behavior of the network is adjusted based on the predicted future traffic profile and on the predicted network performance. | 11-19-2015 |
20150333953 | SOFT REROUTING IN A NETWORK USING PREDICTIVE RELIABILITY METRICS - In one embodiment, a plurality of paths in a network from a source device to a destination device is identified. A predicted performance for packet delivery along a primary path from the plurality of paths is determined. The predicted performance for packet delivery along the primary path is then compared to a performance threshold. Traffic sent along the primary path may be duplicated onto a backup path selected from the plurality of paths based on a determination that the predicted performance along the primary path is below the performance threshold. | 11-19-2015 |
20150333929 | DYNAMIC TERNARY CONTENT-ADDRESSABLE MEMORY CARVING - Example embodiments of the present disclosure describe mechanisms for dynamic carving (i.e., applying a revised template for ternary content addressable memory (TCAM) in a network switch while the TCAM remains operational). The TCAM comprises a plurality of TCAM allocation units (TAUs) and entries of data in the TCAM corresponding to forwarding modes are arranged according to an original template mapping each forwarding mode to a subset of TAU(s). An important characteristic of such methods and systems is the ability to avoid rebooting the network switch. The mechanisms include a “compression” step involving relocating entries of data in the TCAM according to an intermediate template, wherein the intermediate template comprises at least one unallocated TAU(s) for accommodating the revised template. Furthermore, the mechanisms include, a “decompression” step (after the “compression” step), involving relocating the entries of data in the TCAM according to the revised template. | 11-19-2015 |
20150333857 | HIERARCHICAL SCHEDULER FOR DETERMINISTIC NETWORKING - In one embodiment, a method is disclosed in which a device identifies a set of data stream rates for a plurality of data streams. A Huffman tree is constructed for data transmission time slots based on the set of data stream rates. A number of time slots assigned to a parent node in the tree are determined and evenly distributed to child nodes of the parent node, to assign the time slots to the data streams. | 11-19-2015 |
20150332219 | MERGER AND ACQUISITION FOR ACCEPTING AND DECLINING PARTS OF A MEETING - Presented herein are techniques for receiving, from each participant of a plurality of participants of a meeting, scheduling information indicating availability of each participant for each of a plurality of meeting segments corresponding to intervals of time spanning the duration of the meeting. The received scheduling information is aggregated for the plurality of participants. One or more status indicators that indicate the availability of each participant of the plurality of participants for each meeting segment are displayed. | 11-19-2015 |
20150332165 | Hierarchical hybrid batch-incremental learning - In one embodiment, a machine learning model for predicting one or more metrics is run in a network which includes a centralized controller device interconnected with a plurality of edge devices. A batch version of the machine learning model that operates in batch mode is hosted at the centralized controller device. Then, an incremental version of the machine learning model that operates in incremental mode is pushed to an edge device of the plurality of edge devices, such that the incremental version of the machine learning model is hosted at the edge device. As a result, the batch version and the incremental version of the machine learning model run in parallel with one another. | 11-19-2015 |
20150332155 | PREDICTIVE PATH CHARACTERISTICS BASED ON NON-GREEDY PROBING - In one embodiment, a network device receives metrics regarding a path in the network. A predictive model is generated using the received metrics and is operable to predict available bandwidth along the path for a particular type of traffic. A determination is made as to whether a confidence score for the predictive model is below a confidence threshold associated with the particular type of traffic. The device obtains additional data regarding the path based on a determination that the confidence score is below the confidence threshold. The predictive model is updated using the additional data regarding the path. | 11-19-2015 |
20150332145 | TRAFFIC SHAPING BASED ON PREDICTED NETWORK RESOURCES - In one embodiment, a committed information rate (CR) prediction is received from a machine learning model that corresponds to a predicted average traffic rate supported by a network connection. A traffic shaping strategy is adjusted based on the CR prediction. A rate at which data is communicated over the network connection may be based on the traffic shaping policy. The effects of the adjusted traffic shaping strategy are also monitored. Feedback is further provided to the machine learning model based on the monitored effects of the adjusted traffic shaping strategy. | 11-19-2015 |
20150327261 | TIMESLOT DISTRIBUTION IN A DISTRIBUTED ROUTING PROTOCOL FOR DETERMINISTIC WIRELESS NETWORKS - In one embodiment, a particular node operates a distributed routing protocol in a shared-media communication network, and distributes timeslot allocations using the routing protocol, where the particular node as a parent node allocates a pool of timeslots available to child nodes of the parent node. The parent node specifically allocates particular timeslots from the pool to particular child nodes according to particular flows from a source to a target in the shared-media communication network in order to meet a defined time budget for a resultant time-synchronized path from the source to the target. | 11-12-2015 |
20150327260 | DATA RATE HOPPING SCHEDULING - In one embodiment, a plurality of data rates available for communication is identified at a first device in a network. Slots of a channel hopping schedule are also identified and the data rates are assigned to the slots of the channel hopping schedule to generate a data rate hopping schedule. The generated data rate hopping schedule is further provided to a second device in the network. | 11-12-2015 |
20150326632 | METHODS AND SYSTEMS TO FACILITATE SYNCHRONIZATION OF MULTIPLE MEDIA STREAMS - A method can include receiving, at a given node, a continuous stream of input media from a media source. A value can be computed as a function of each of a plurality of data blocks of the continuous stream of input media received by the given node. The method can also include receiving, at the given node, values computed for a plurality of data blocks of the continuous stream received by another node. A set of the received values from the other node can be correlated with a set of the computed values for the given node to determine an offset between the blocks of the continuous stream of input media that are received by the given node and the blocks of the continuous stream of input media that are received by the other node. | 11-12-2015 |
20150326609 | DESIGNATING A VOTING CLASSIFIER USING DISTRIBUTED LEARNING MACHINES - In one embodiment, possible voting nodes in a network are identified. The possible voting nodes each execute a classifier that is configured to select a label from among a plurality of labels based on a set of input features. A set of one or more eligible voting nodes is selected from among the possible voting nodes based on a network policy. Voting requests are then provided to the one or more eligible voting nodes that cause the one or more eligible voting nodes to select labels from among the plurality of labels. Votes are received from the eligible voting nodes that include the selected labels and are used to determine a voting result. | 11-12-2015 |
20150326598 | PREDICTED ATTACK DETECTION RATES ALONG A NETWORK PATH - In one embodiment, attack detectability metrics are received from nodes along a path in a network. The attack detectability metrics from the nodes along the path are used to compute a path attack detectability value. A determination is made as to whether the path attack detectability value satisfies a network policy and one or more routing paths in the network are adjusted based on the path attack detectability value not satisfying the network policy. | 11-12-2015 |
20150326486 | APPLICATION IDENTIFICATION IN RECORDS OF NETWORK FLOWS - In one embodiment, a method is provided for improving data center and endpoint network visibility and security. The method comprises detecting a communication flow of a plurality of packets over a network, and generating a flow identifier that uniquely identifies the communication flow. After determining an application associated with the communication flow, a flow record is generated. The flow record includes the flow identifier and an indication of the application associated with the communication flow. The indication of the application may be, for example, a hash of the application binary file. | 11-12-2015 |
20150326471 | ACTIVATING MOBILE BACKUP LINK BASED ON WIRED CUSTOMER EDGE-PROVIDER EDGE (CE-PE) LINK STATUS - A method is provided in one embodiment and includes establishing a primary wired access link between a first routing device and a second routing device, and establishing a backup wireless access link between the first routing device and the second routing device. The method further includes determining a status of the primary wired access link indicative of whether the primary wired access link between the first routing device and the second routing device has failed. The method still further include activating the backup wireless access link between the first routing device and the second routing device when it is determined that the status of the primary wired access link is indicative that the primary wired access link has failed. | 11-12-2015 |
20150326450 | VOTING STRATEGY OPTIMIZATION USING DISTRIBUTED CLASSIFIERS - In one embodiment, voting optimization requests that identify a validation data set are sent to a plurality of network nodes. Voting optimization data is received from the plurality of network nodes that was generated by executing classifiers using the validation data set. A set of one or more voting classifiers is then selected from among the classifiers based on the voting optimization data. One or more network nodes that host a voting classifier in the set of one or more selected voting classifiers is then notified of the selection. | 11-12-2015 |
20150326449 | COLLABORATIVE INTER-SERVICE SCHEDULING OF LOGICAL RESOURCES IN CLOUD PLATFORMS - The subject disclosure relates to a method for scheduling logical resources in cloud platforms. A cloud platform system identifies resource candidates for hosting a logical resource of a cloud service. The system filters the resource candidates by running them through a filter chain, a collection of serially connected filters. The filter chain may contain one or more reference filters that reference other filter chains. When the resource candidates encounter one of the reference filters, the other filter chains can be triggered and processed. The system selects one or more resources for hosting the logical resource from the filtered resource candidates. | 11-12-2015 |
20150326427 | Fast Protection Switchover in a Transport Network - Presented herein are techniques that enable fast switchover or reversion between label switched paths. In accordance with examples presented herein, a working label switched path is added to a fast switchover protection group that is configured to carry traffic from an ingress network device to an egress network device through a transport network. A restoration label switched path associated with the working label switched path is also added to the fast switchover protection group. The fast switchover protection group is stored at the ingress network device. After storing the fast switchover protection group at the ingress network device, at least the working label switched path is used to carry traffic through the transport network. | 11-12-2015 |
20150324582 | DISTRIBUTED VOTING MECHANISM FOR ATTACK DETECTION - In one embodiment, a network node receives a voting request from a neighboring node that indicates a potential network attack. The network node determines a set of feature values to be used as input to a classifier based on the voting request. The network node also determines whether the potential network attack is present by using the set of feature values as input to the classifier. The network node further sends a vote to the neighboring node that indicates whether the potential network attack was determined to be present. | 11-12-2015 |
20150319077 | DISTRIBUTED PREDICTIVE ROUTING USING DELAY PREDICTABILITY MEASUREMENTS - In one embodiment, a method is disclosed in which a device receives delay information for a communication segment in a network. The device determines a predictability measurement for delays along the segment using the received delay information. The predictability measurement is advertised to one or more devices in the network and used as a routing constraint to select a routing path in the network. | 11-05-2015 |
20150319076 | CENTRALIZED PREDICTIVE ROUTING USING DELAY PREDICTABILITY MEASUREMENTS - In one embodiment, a central device receives a routing strategy instruction that specifies a predictability threshold for communication delays in the network. The device estimates communication delays for a plurality of paths in the network and determines predictability measurements for the estimated delays. The device also selects, from among the plurality of paths, a particular path that has a predictability measurement that satisfies the predictability threshold and has a minimal estimated delay. The central device further installs the particular path at one or more other devices in the network. | 11-05-2015 |
20150318892 | PATH DIVERSITY WITH POLY-PHASE LINKS IN A POWER LINE COMMUNICATION NETWORK - In one embodiment, a node in a network receives communication channel data regarding one or more communication channels available between a particular device in the network and a neighboring device. Each communication channel corresponds to one or more electrical phases over which the particular device can communicate with the neighboring device. The node also receives crosstalk data regarding an amount of crosstalk between the electrical phases over which the particular device can communicate with the neighboring device. The node then generates a routing path for the network based on the received crosstalk and communication channel data. | 11-05-2015 |
20150318891 | COMMUNICATION CHANNEL IDENTIFICATION IN A POWER LINE COMMUNICATION NETWORK - In one embodiment, a device in a network receives a message from a neighboring device that identifies the electrical phase on which the message was sent. Crosstalk is identified between the device and the neighboring device by determining that the message was received on a different electrical phase than the phase on which the message was sent. One or more distinct communication channels between the device and the neighboring device are identified based on the identified crosstalk with each communication channel including or more electrical phases. | 11-05-2015 |
20150317835 | AUTOMATED PATRON GUIDANCE - In one embodiment, a method comprises determining, by a first access network computing node at a venue, a position of a person based on an image of the person captured with at least one camera at the venue; controlling rendering, by the first access network computing node, of an icon moving toward a destination in response to a determined movement of the person; and handing-off, by the first access network computing node, the controlling rendering of the icon to a second access network computing node in response to the position of the person moving from a first domain zone associated with the first access network computing node to a second domain zone associated with the second access network computing node. | 11-05-2015 |
20150317123 | Techniques to Handle Multimedia Questions from Attendees in an Online Meeting - An attendee device in an online meeting displays content from a presenter device in a shared area of an attendee device display. The attendee device detects that the shared area is pressed continuously at a press point therein for a predetermined time and, in response, records a location of the press point in the shared area, records an image snapshot of the shared area, and records audio sensed by a local microphone. The attendee device also detects when the press point is released and, in response, ends the audio recording. The attendee device displays a dialog box that presents user selectable options to store locally, upload to the meeting server, and not retain any of the recorded snapshot and the recorded audio. | 11-05-2015 |
20150312902 | ALMOST BLANK SUBFRAME BASED ORTHOGONAL RESOURCE ALLOCATION IN A WIRELESS NETWORK ENVIRONMENT - An example method for facilitating almost blank sub-frame (ABS) based orthogonal resource allocation in a wireless network environment is provided and includes receiving at a serving Evolved Universal Terrestrial Radio Access Network (E-UTRAN) nodeB (eNB), ABS patterns from a plurality of neighboring eNBs in a orthogonal frequency-division multiplexing based network, each neighboring eNB transmitting a separate ABS pattern, setting a maximum duty cycle of physical downlink control channel in a frame to be transmitted by the serving eNB within its serving cell, and computing an optimal ABS pattern at the serving eNB subject to the maximum duty cycle and based on the ABS patterns received from the plurality of neighboring eNBs. In specific embodiments, computing the optimal ABS pattern includes identifying neighboring eNBs transmitting at each sub-frame of the frame, identifying sub-frames transmitted by a least number of neighboring eNBs, and selecting each identified sub-frame for configuring as an ABS. | 10-29-2015 |
20150312901 | ALMOST BLANK SUBFRAME BASED ORTHOGONAL RESOURCE ALLOCATION IN A WIRELESS NETWORK ENVIRONMENT - An example method for facilitating almost blank sub-frame (ABS) based orthogonal resource allocation in a wireless network environment is provided and includes receiving at a serving Evolved Universal Terrestrial Radio Access Network (E-UTRAN) nodeB (eNB), ABS patterns from a plurality of neighboring eNBs in a orthogonal frequency-division multiplexing based network, each neighboring eNB transmitting a separate ABS pattern, setting a maximum duty cycle of physical downlink control channel in a frame to be transmitted by the serving eNB within its serving cell, and computing an optimal ABS pattern at the serving eNB subject to the maximum duty cycle and based on the ABS patterns received from the plurality of neighboring eNBs. In specific embodiments, computing the optimal ABS pattern includes identifying neighboring eNBs transmitting at each sub-frame of the frame, identifying sub-frames transmitted by a least number of neighboring eNBs, and selecting each identified sub-frame for configuring as an ABS. | 10-29-2015 |
20150312834 | HANDLING CONNECTED MODE MOBILITY FROM AREAS BOUNDING MULTI-OPERATOR CORE NETWORK AND NON-MULTI-OPERATOR CORE NETWORK SHARED INFRASTRUCTURE - A method provided in one embodiment includes receiving, at a first network element, a first message including a first network identifier associated with a first network. The first message further includes an indication of an association of the first network identifier with a first user equipment. The method further includes receiving, by the first network element, a second message indicative of an initiated handover of the first user equipment to a second network. The second message includes a second network identifier associated with the second network. The method further includes determining, by the first network element, whether the second network identifier matches the first network identifier, and terminating the initiated handover by the first network element when the second network identifier does not match the first network identifier. | 10-29-2015 |
20150312801 | MOBILE SERVICE ROUTING IN A NETWORK ENVIRONMENT - A data flow is received from a mobile network relating to a mobile subscriber. Subscriber data is received for the subscriber identifying a service path corresponding to the subscriber and at least one service policy corresponding to the subscriber, the service path including a set of network service nodes in a plurality of network service nodes. Packets of the data flow are routed according to the service path, the packets corresponding to a request for a resource. At least one packet is appended with service header data identifying the service policy. Each service node performs at least one service based on received request data, each service node in the set of service nodes performing a service defined in a service subscription of the subscriber. At least one particular service node in the set of network service nodes performs a particular service based at least in part on the service policy. | 10-29-2015 |
20150312294 | Content Message for Video Conferencing - In one embodiment, a decoder or transcoder of a video conference network receives the first video stream and an indication of the ratio of the spatial-to-temporal resolution of the tuning of the encoding. The behavior of the decoder or transcoder is set based on the indication of the ratio. The behavior is for use of the first video stream. | 10-29-2015 |
20150312287 | Compacting Content in a Desktop Sharing Session - Techniques to enable an attendee device in an online conference session to view display content different from display content displayed on a host device. In one embodiment a method is provided in which display content that is to be shared with at least one attendee device in an online conference session is captured from a host device. An area containing blank space in the display content is identified. The display content is compacted by removing the area containing the blank space from the display content to obtain compacted content. The compacted content is composed to obtain a composed image configured to be shared with the attendee device, and the composed image is thereafter shared with the attendee device. | 10-29-2015 |
20150312134 | SYSTEM AND METHOD FOR ENABLING CONVERSATIONAL LEARNING IN A NETWORK ENVIRONMENT - A system and a method for providing conversational learning is implemented in a network environment. An exemplary method includes receiving a subnet route advertisement that includes an attribute that triggers glean behavior for routing decisions; and installing a subnet entry in a Forwarding Information Base/Adjacency (FIB/ADJ) table. The subnet entry includes a subnet associated with the subnet route advertisement and a corresponding glean adjacency. The corresponding glean adjacency is configured to trigger installation of a host entry associated with a host in an active conversation in a network. | 10-29-2015 |
20150309894 | Fast Failover for Application Performance Based WAN Path Optimization with Multiple Border Routers - According to one aspect, a control entity (such as a policy server) in communication with a plurality of border routers in a network, generates failover entries for one or more traffic flows. Each failover entry specifies a backup path to be used by a border router when the border router determines that a wide area network interface of the border router has failed. The control entity sends the failover entries to each of the border routers. A border router operating in a network stores failover entries for one or more traffic flows. For packets received at the border router either from a local area network interface or via a tunnel from another border router, when the border router detects that the wide area network interface has failed, the border router determines how to handle the packets based on the stored failover entries. | 10-29-2015 |
20150309766 | Displaying Regions of User Interest in Sharing Sessions - A meeting server facilitates an online conference session among a presenter device and a plurality of attendee devices, including a display of shared image data from the presenter device. The meeting server receives more than indication, with each indication associated with a corresponding portion of the shared image data displayed on each of the attendee devices. The indications are combined into a message representing user interest in areas of the shared image data, and the message representing interest is transmitted to the presenter device. | 10-29-2015 |
20150304886 | WIRELESS NETWORK CONTROLLER LOAD BALANCING - In one embodiment, a method includes selecting at a network device, seed access points from a plurality of access points and assigning each of the seed access points to a wireless network controller. The seed access points join the assigned wireless network controllers before the remaining access points join the wireless network controllers. Each of the remaining access points is associated with one of the seed access points and joins the same wireless network controller as the seed access point. An apparatus and logic are also disclosed herein. | 10-22-2015 |
20150304814 | CLIENT DEVICE LOCATION USING SYNCHRONIZED WIRELESS RECEIVERS - A wireless receiver (e.g., access point (AP)) is a member of a group of a plurality of receivers in a wireless local area network and time synchronized with other receivers in the group. A channel scan list is generated from a plurality of wireless channels available in one or more frequency bands. A channel is selected for the receiver to monitor from the channel scan list based on a current time at the receiver such that each of the plurality of receivers in the group are scanning the same channel at the same time. The selected channel is scanned and signal characteristic information (e.g., received signal strength (RSS)) is generated for the signals received during a given scan duration. | 10-22-2015 |
20150304355 | Automated Synchronized Domain Wide Transient Policy - Techniques are provided for, at an administrative device in a network domain, monitoring a network traffic flow parameter to determine whether a presently applied domain wide policy configured to control a network traffic flow should be removed. In response to determining that the domain wide policy should be removed, a command is generated which causes removal of the domain wide policy at each one of the plurality of network devices, and the command is sent to each one of the plurality of network devices to cause the domain wide policy to be removed at substantially the same time at each network device. Alternatively, the domain wide policy can be automatically removed by the expiry of a timer or in accordance with a timestamp so that the policy is revoked across the network domain without a need for an explicit network wide control message instructing removal of the policy. | 10-22-2015 |
20150304282 | Nested Independent Virtual Private Networks With Shared Rekey And Consistency Services - First and second nested virtual private networks share a common rekey service. A first key server generates first cryptographic keys and policies for use by gateways of the VPN to encrypt and decrypt data packets. The key server establishes a connection with a second key server to generate second cryptographic keys and policies independently of the first key server for use by encryption units of a second VPN that is nested with and operates independently of the first VPN. The first key server refreshes the first cryptographic keys in the first VPN gateways using a common rekey service, and cooperates with the second key server to refresh the second cryptographic keys in the second VPN encryption units using the common rekey service. | 10-22-2015 |
20150304233 | EFFICIENT MANAGEMENT AND CONFIGURATION OF IN-BAND RESOURCES - There is disclosed herein, by way of example, an enterprise server computing platform configured to provide stateless computing, wherein each node has no set configuration, including for example, MAC addresses, UUIDs, firmware, and BIOS by way of non-limiting example. Certain devices or peripherals may be considered “out-of-band,” meaning that they are discoverable and configurable in standby power by a baseboard management controller (BMC) without need for an OS. Certain other peripherals are considered “in-band,” meaning that they may need an OS for discovery and configuration. According to one or more example embodiments of this Specification, a system and method are disclosed for automatically discovering and configuring out-of-band devices on a server. Out-of-band devices may then be disabled, and the server is booted with minimal resources and a bootstrap OS to discover and configure in-band devices. | 10-22-2015 |
20150304206 | SEGMENT ROUTING - EGRESS PEER ENGINEERING (SP-EPE) - In one embodiment, a controller device in a computer network domain learns border gateway protocol (BGP) egress peering segments from one or more border routers of the domain, and determines a selected flow to segment route via a particular egress peering segment, the selected flow from a given routing device within the domain to a given destination of a remote domain. As such, the controller device may then instruct the given routing device to segment route the selected flow via the particular egress peering segment. In another embodiment, an egress border router shares its BGP egress peering segments, and receives a flow to segment route. The egress border router may determine, from a segment route contained within the flow, to which particular egress peering segment of the border router to segment route the flow, and forwards the flow out of the domain via the particular egress peering segment. | 10-22-2015 |
20150304121 | Binding Nearby Device to Online Conference Session - A meeting server receives a request to join an online conference session from a first device at a first location. The first device is associated with a user account. The meeting server then determines at least one second location corresponding to at least one second device also associated with the user account. Responsive to a determination that the second location is within a predetermined distance of the first location, the meeting server transmits a command to mute the second device. | 10-22-2015 |
20150304117 | AUTOMATIC FABRIC MULTICAST GROUP SELECTION IN A DYNAMIC FABRIC AUTOMATION NETWORK ARCHITECTURE - A method is provided in one example embodiment and includes establishing a pool of multicast group addresses reserved for assignment to Layer 2 (“L2”) and Layer 3 (“L3”) segment IDs of a network comprising an Internet protocol (“IP”) fabric, and assigning a first multicast group address from the pool to an L3 segment ID of a Virtual Routing and Forwarding element (“VRF”) associated with a new partition established in the network. The method further includes pushing the first multicast group address assignment to a database to provide arguments for configuration profiles, and configuring a new tenant detected on a leaf node of the network using the configuration profiles, in which the configuring comprises specifying multicast group to segment ID assignments for the tenant as specified in the configuration profiles. | 10-22-2015 |
20150304053 | Compact Multiple Channel Optical Receiver Assembly Package - An optical assembly package is provided for the optical receive components of an optical transceiver. The optical assembly package includes a receptacle subassembly configured to receive an end of an optical fiber. A housing is provided having an opening at one end configured to receive the receptacle assembly. Optical routing and wavelength demultiplexing elements are mounted to a bottom wall of the housing. An electrical subassembly comprising a support plate, a circuit board mounted on the support plate, an integrated circuit mounted to the circuit board, and a plurality of photodetectors mounted to the support plate proximate an edge of the circuit board. The electrical subassembly is positioned a stacked arrangement beneath the housing to minimize an overall length of the optical assembly package. | 10-22-2015 |
20150301914 | Dynamically Limiting Bios Post For Effective Power Management - Presented herein are methods for budgeting power during a power-on self-test (POST) sequence. A determination is made for one or more stages of a power-on-self-test sequence of a system, whether a power profile of a particular stage is greater than a power budget for that stage. The power profile specifies a maximum power consumption as determined by the characteristics of the system and the power budget specifies a power consumption currently allocated to the system. When the power profile is greater than the power budget for that stage, power consumption of the system during the power-on-self-test sequence is limited such that the system does not consume more power than specified by the power budget. | 10-22-2015 |
20150301544 | CONTROLLING INTELLIGENT POWERED DEVICES - Intelligent powered device (PD) control system including a switch system, state detector (SD), intelligent control device (ICD), and a PD. The switch system includes one or more conventional electrical switches. Each switch includes an interface to receive selection of a switch system state change between conductive and non-conductive states. The switch system includes a conductor pair(s) indicative of switch system state based on the selection. The SD signals the detected state to the ICD. The switch system output is in electrical connection with the detector such that, in the conductive state a loopback is formed in the switch system and SD, and in the non-conductive state no loopback is formed. The ICD receive the message from the state detector and transmits a fixture control command based on the message. The PD receives the command from the ICD via the data communications network, and controls its state based on the command. | 10-22-2015 |
20150296178 | Use of Face and Motion Detection for Best View Framing in Video Conference Endpoint - A video conference endpoint detects faces at associated face positions in video frames capturing a scene. The endpoint frames the video frames to a view of the scene encompassing all of the detected faces. The endpoint detects that a previously detected face is no longer detected. In response, a timeout period is started and independently of detecting faces, motion is detected across the view. It is determined if any detected motion (i) coincides with the face position of the previously detected face that is no longer detected, and (ii) occurs before the timeout period expires. If conditions (i) and (ii) are met, the endpoint restarts the timeout period and repeats the independently detecting motion and the determining. Otherwise, the endpoint reframes the view to encompass the remaining detected faces. | 10-15-2015 |
20150295899 | Group Member Recovery Techniques - Techniques are presented for optimizing secure communications in a network. A first router receives from a second router an encrypted packet with an unknown security association. The first router examines the packet to determine whether the counter value is in a range of predicted counter values. Additionally, a key server is configured to provision routers that are part of a virtual private network. The key server selects a counter value that is part of a security association and calculates a key value. The key server sends the key value together with the security association to enable routers to exchange encrypted packets with each other in the virtual private network using the key value and the security association. The key server increments the counter value to a value within a range of counter values capable of being predicted by the routers. | 10-15-2015 |
20150295862 | HIERARCHICAL PROGRAMMING OF DUAL-STACK SWITCHES IN A NETWORK ENVIRONMENT - An example method for hierarchical programming of dual-stack switches in a network environment is provided and includes receiving packets from the network at a line card in the modular switch, a first portion of the packets being destined to Internet Protocol version 6 (IPv6) destination IP (DIP) addresses and a second portion of the packets being destined to IPv4 DIP addresses, and performing hierarchical lookups of the IPv6 DIP addresses and the IPv4 DIP addresses. Layer 3 (L3) lookups for the IPv6 DIP addresses are performed at the line card, and L3 lookups for IPv4 DIP addresses are performed at a fabric module in the modular switch. The line card and the fabric module are interconnected inside a chassis of the modular switch. In specific embodiments, the method further comprises inspecting the packets' destination Media Access Control (DMAC) addresses comprising router MAC addresses indicative of IPv6 or IPv4 address families. | 10-15-2015 |
20150295838 | UPSTREAM CONTENTION MEASURMENT REPORTING AND MITIGATION IN DOCSIS REMOTE PHY NETWORK ENVIRONMENTS - An example method for upstream contention measurement and reporting in Data Over Cable Service Interface Specification (DOCSIS) remote physical layer (R-PHY) network environments is provided and includes receiving, at a Converged Cable Access Platform (CCAP) core from a R-PHY node over a converged interconnect network (CIN) in the DOCSIS R-PHY network environment, an indication of a collision level in an upstream network between the R-PHY node and a plurality of cable modems (CMs), calculating a congestion level in the upstream network based on the collision level indicated by the R-PHY node, adjusting back-off window parameters for cable modem retransmissions based on the calculated congestion level, and adjusting a contention transmission opportunity density in a downstream Media Access Protocol (MAP) message based on the adjusted back-off window parameters. | 10-15-2015 |
20150295831 | NETWORK ADDRESS TRANSLATION OFFLOAD TO NETWORK INFRASTRUCTURE FOR SERVICE CHAINS IN A NETWORK ENVIRONMENT - An example method for network address translation (NAT) offload to network infrastructure for service chains in a network environment is provided and includes receiving a packet at a network infrastructure in a network comprising a plurality of service nodes interconnected through the network infrastructure, each service node executing at least one service function, identifying the packet as belonging to a first flow based on a cookie in a network service header of the packet that indicates a service chain that includes a sequence of service functions to be executed on the packet at the service nodes, determining that a service function in the service chain is to be offloaded from one of the service nodes to the network infrastructure for subsequent packets of the first flow, and executing the offloaded service function at the network infrastructure for subsequent packets of the first flow. | 10-15-2015 |
20150295827 | UNIFIED CONGESTION CONTROL FOR REAL-TIME MEDIA SUPPORT - Various implementations disclosed herein enable congestion control systems and methods that are agnostic of the availability of congestion notification types, and are simultaneously responsive to multiple types of network congestion indicators—including both implicit (e.g., loss and delay) and explicit (e.g., marking) congestion indicators. For example, some implementations include a congestion control method that includes obtaining a composite congestion indicator value associated with multiple types of network congestion indicators, and determining a reference rate value based on a function of the composite congestion indicator value. The composite congestion indicator value represents a combination of one or more delay values associated with respective types of network congestion indicators. The reference rate value is representative of a baseline transmission rate from the first device that at least partially mitigates network congestion signaled by the network congestion indicators. | 10-15-2015 |
20150295746 | DOWNSTREAM EXTERNAL PHYSICAL INTERFACE TRANSPORT IN DOCSIS 3.1 NETWORK ENVIRONMENTS - An example method for Downstream External Physical Interface (DEPI) in Data Over Cable Service Interface Specification (DOCSIS) 3.1 network environments is provided and includes generating, at a Converged Cable Access Platform (CCAP) core, a DEPI-Packet Streaming Protocol (PSP) pseudo-wire (PW) packet including a PSP sub-layer header having a same length for a Quadrature Amplitude Modulation (QAM) channel and an Orthogonal Frequency-Division Multiplexing (OFDM) channel in the DOCSIS network environment, and transmitting the DEPI-PSP PW packet over a DEPI interface to a remote physical layer (R-PHY) entity. | 10-15-2015 |
20150295731 | PROGRAMMABLE INFRASTRUCTURE GATEWAY FOR ENABLING HYBRID CLOUD SERVICES IN A NETWORK ENVIRONMENT - An example method for a programmable infrastructure gateway for enabling hybrid cloud services in a network environment is provided and includes receiving an instruction from a hybrid cloud application executing in a private cloud, interpreting the instruction according to a hybrid cloud application programming interface, and executing the interpreted instruction in a public cloud using a cloud adapter. The method is generally executed in the infrastructure gateway including a programmable integration framework allowing generation of various cloud adapters using a cloud adapter software development kit, the cloud adapter being generated and programmed to be compatible with a specific public cloud platform of the public cloud. In specific embodiments, identical copies of the infrastructure gateway can be provided to different cloud service providers who manage disparate public cloud platforms; each copy of the infrastructure gateway can be programmed differently to generate corresponding cloud adapters compatible with the respective public cloud platforms. | 10-15-2015 |
20150295684 | DETERMINING AND MANAGING UPSTREAM PROFILES IN DOCSIS 3.1 NETWORK ENVIRONMENTS - An example method for determining and managing upstream profiles in Data Over Cable Service Interface Specification (DOCSIS) 3.1 network environments is provided and includes determining, at a Converged Cable Access Platform (CCAP) core, channel conditions independent of any channel effect over a hybrid fiber coaxial (HFC) network between a remote physical layer (R-PHY) entity coupled to the CCAP core and a cable modem (CM) in the DOCSIS 3.1 network environment, and assigning an upstream profile to the CM based on the channel conditions. In specific embodiments, the channel conditions include signal to noise ratio (SNR), modulation error ratio (MER) or group delay. In some embodiments, assigning the upstream profile includes determining a quadrature amplitude modulation (QAM) order based on the SNR or MER, and determining a pilot pattern based on the group delay, the combination of the QAM order and the pilot pattern identifying the upstream profile. | 10-15-2015 |
20150295669 | MANAGING TIME OFFSET AND FREQUENCY DRIFT IN ASYNCHRONOUS DOCSIS REMOTE PHY NETWORK ENVIRONMENTS - An example method for managing time offset and frequency drift in asynchronous Data Over Cable Service Interface Specification (DOCSIS) Remote Physical layer (R-PHY) network environments is provided and includes receiving, at a first hardware device, time synchronization message from a remote second hardware device in the DOCSIS R-PHY network, determining a time difference between a first clock at the first hardware device and a second clock at the second hardware device from the time synchronization message; and re-stamping an event message based on the time difference. | 10-15-2015 |
20150295353 | LOCKING MECHANISM FOR CABLES AND CONNECTORS IN HAZARDOUS LOCATIONS - This technology includes a device designed to retain a cable or cable connector when connected to a receptacle. The device is composed of a base bracket that interfaces with a receptacle or receptacle housing and cable bracket that interfaces with a cable or cable connector. A tool may be required to disconnect the brackets or free the cable from the receptacle. | 10-15-2015 |
20150289167 | SYSTEM AND METHOD FOR ORCHESTRATING POLICY IN A MOBILE ENVIRONMENT - A method is provided in one example and includes receiving at least one first input indicating at least one network condition associated with a first user device having a user associated therewith. The first user device has a first bearer channel established between the first user device and a gateway, and the first bearer channel has a first quality of service level. The method further includes determining whether to modify the first user device to a second quality of service level based upon the received at least one first input, and sending a first request to a first network element instructing the first network element to modify the first user device to the second quality of service level. | 10-08-2015 |
20150289123 | SYSTEM AND METHOD FOR ORCHESTRATING MOBILE DATA NETWORKS IN A MACHINE-TO-MACHINE ENVIRONMENT - A method is provided in one example and includes receiving network utilization data associated with an access network, determining an expected network utilization for a predetermined time period based upon the network utilization data, and determining pricing information for the predetermined time period based upon the expected network utilization. The pricing information includes at least one price rate for communication between at least one application and at least one client device utilizing the access network. The method further includes sending the pricing information to the at least one application. | 10-08-2015 |
20150289010 | PERSISTENT REVIEW BUFFER - A method of content recording and playback is carried out in a receiving device by selecting one of a plurality of digital content streams ( | 10-08-2015 |
20150288660 | Synchronizing a Routing-Plane and Crypto-Plane for Routers in Virtual Private Networks - Techniques are presented herein for optimizing secure communications in a network. A router in a virtual private network determines whether or not it has successfully registered with a key server that provides cryptographic keys for routers in the virtual private network. The router stores state information that is indicative of whether or not the router has successfully registered with the key server. | 10-08-2015 |
20150288603 | Path Maximum Transmission Unit Handling For Virtual Private Networks - Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a subnetwork protected by the router. The router examines the packet to determine a source address that identifies the device and a destination address that identifies a destination network device for the packet. The router also analyzes the packet to determine a size of the packet and determines whether or not the size of the packet is larger than a maximum transmission unit size. If the size of the packet is larger than the maximum transmission unit size, the router encapsulates the packet with a header that includes the destination address and a new source address that identifies the router. | 10-08-2015 |
20150288509 | Transport Control Protocol Sequence Number Recovery in Stateful Devices - Techniques are presented herein for optimizing network traffic exchanged between devices in a network. A firewall device in a network detects a firewall failure event. In response to detecting the firewall failure event, the firewall device changes from a standby state to an active state in managing a network connection between a source device and a destination device in the network. The firewall device generates a synchronization message and sends the synchronization message to the destination device. The firewall device receives from the destination device a response message that includes synchronization information. | 10-08-2015 |
20150282118 | SUBSCRIBER-AWARE PAGING - This disclosure relates to systems and methods for paging devices in a communication network. A network device providing mobility management through control messaging can be assigned a number of cell sites in multiple tracking areas. The network device such as a mobility management entity (MME) can use a subscriber-aware implementation to provide a hierarchy for contacting a mobile device with a page. The subscriber-aware implementation can be tailored to analyze subscriber activity such as frequency and timing, to page a subset of the total number of cell sites in multiple tracking areas based on the subscriber activity, and to expand the subset after unsuccessful attempts to page the mobile device. | 10-01-2015 |
20150281763 | System and Method for Synchronized Presentation of Video Timeline Metadata - In one embodiment, a method for broadcast state agnostic timeline metadata presentation on a companion device is implemented on a computing device and includes: receiving timeline metadata associated with a video content item in a pseudo-live mode, where the timeline metadata is received from a timeline metadata provision system according to a timeline for an original broadcast of the video content item, and presenting the timeline metadata as it is received from said timeline metadata provision system, where the presenting is in parallel to an original or non-original broadcast of the video content item playing on an associated viewing device. | 10-01-2015 |
20150281185 | Cloud Collaboration System With External Cryptographic Key Management - The embodiments presented herein provide for a method for a key management service (KMS) to provide a conversation key over individually established secure channels. The KMS establishes, with a first device, a first ephemerally secure communication channel over an unsecure network. The KMS receives, over the first ephemerally secure communication channel, a first request for a conversation key. After obtaining the conversation key, the KMS transmits the conversation key to the first device over the first ephemerally secure communication channel. The KMS establishes, with a second device, a second ephemerally secure communication channel over the unsecure network. The KMS receives, over the second ephemerally secure communication channel, a second request for the conversation key. The conversation key is transmitted to the second device over the second ephemerally secure communication channel. | 10-01-2015 |
20150281184 | External Indexing and Search for a Secure Cloud Collaboration System - An end-to-end secure cloud-hosted collaboration service is provided with a hybrid cloud/on-premise index and search capability. This approach includes on-premise indexing and search handling, while relying on the cloud for persistent storage and search of the index. The on-premise indexer receives a copy of an encrypted message from the cloud-hosted collaboration service. The encrypted message has been encrypted with a conversation key. The indexer receives the conversation key from an on-premise key management service, and decrypts the encrypted message with the conversation key. A set of tokens are extracted from the decrypted message, and subsequently encrypted with a secret key, different than the conversation key, to generate a first set of encrypted tokens. The first set of encrypted tokens is transmitted for storage in a search index on the cloud-hosted collaboration service. | 10-01-2015 |
20150281173 | DYNAMIC SERVICE CHAIN WITH NETWORK ADDRESS TRANSLATION DETECTION - In one embodiment, a method includes receiving a packet associated with a flow at a network device, classifying the packet at the network device based on information received from a policy layer, inserting a Network Address Translation (NAT) indicator for the flow into the packet, and transmitting the packet in a service chain comprising network address translation. The NAT indicator is associated with the flows before and after network address translation to provide symmetry between the service chain and a return traffic service chain. An apparatus and logic are also disclosed herein. | 10-01-2015 |
20150281096 | E-TREE SERVICE WITH OPTIMAL FORWARDING IN EVPN - In one embodiment, when an ingress provider edge (PE) device of a computer network domain receives a frame at the ingress PE device destined to a destination media access control (MAC) address, it can determine whether the frame was received on a root or leaf Ethernet ingress segment, and also whether the destination MAC address is located via a root or leaf Ethernet segment. Accordingly, the ingress PE device may either drop or forward the frame based on the ingress Ethernet segment and destination MAC address Ethernet segment being either a root or a leaf, respectively. | 10-01-2015 |