22nd week of 2017 patent applcation highlights part 49 |
Patent application number | Title | Published |
20170155492 | INTERFERENCE CANCELLATION ON SECONDARY CARRIERS IN A CARRIER AGGREGATION ENVIRONMENT - Techniques described herein may allow for information, regarding neighboring cells, to be used in interference cancellation techniques in a carrier aggregation environment. A serving base station (or cell) may provide information, regarding neighboring cells that operate at a primary component carrier and one or more secondary component carriers, to a user device that employs carrier aggregation. The user device may use the information, regarding the neighboring cells, to filter interference, caused by the neighboring cells, at the primary component carrier and the secondary component carrier(s). | 2017-06-01 |
20170155493 | INTERFERENCE MANAGEMENT FOR ADAPTIVE TDD WITH FREQUENCY DOMAIN SEPARATIONS - A method of wireless communications includes adapting to downlink/uplink resource allocations. In particular, the downlink/uplink communications may be adjusted according to time division duplexed (TDD) configurations of serving and neighbor cells. | 2017-06-01 |
20170155494 | UPLINK (UL) FREQUENCY-DIVISION DUPLEX (FDD) SUBFRAME - Various aspects provide a subframe for uplink (UL) communication in a frequency-division duplex (FDD) configuration. Control information in the frequency range of the UL communication may include channel quality indicator (CQI) and acknowledgement (ACK) information. The CQI information may be provided prior to a demodulation reference signal (DMRS). The ACK information may be provided subsequent to another DMRS. The CQI information may be time-division multiplexed in a common frequency range as the ACK information. A sounding reference signal (SRS) may be provided as an initial symbol of the subframe. Some CQI information may be provided in two or more separate portions that are each prior to a separate DMRS. Some ACK information may be provided in two or more separate portions that are each subsequent to another separate DMRS. | 2017-06-01 |
20170155495 | Dynamic Allocation of Subframe Scheduling For Time Division Duplex Operation in a Packet-Based Wireless Communication System - Systems and methods for enabling the dynamic allocation of certain subframes as downlink or uplink resources in a time division duplexed over the air communications system. A base station or eNB may allocate certain subframes within a repeating radio frame of a TDD configuration as either DL or UL subframes for communicating to user equipment or UE devices to increase efficient use of system resources based on the data to be transmitted. Methods for determining the capabilities of a selected UE and based on the determining step, dynamically allocating certain subframes are disclosed. The methods and systems are compatible with user equipment that does not support the dynamic allocation of subframes. | 2017-06-01 |
20170155496 | FULL DUPLEX WIRELESS TRANSMISSION WITH CHANNEL PHASE-BASED ENCRYPTION - A method comprising: at a first transceiver, transmitting a plurality of signals to a second transceiver and receiving corresponding receive signals from the second transceiver, wherein each transmitted signal is sent using a channel perturbation; measuring a plurality of phase values, wherein each phase value is a phase difference between one of the plurality of transmitted signals and corresponding receive signal; masking a subsequent phase modulated signal employing phase rotation at the first transceiver using the plurality of phase values. | 2017-06-01 |
20170155497 | Accessing Data Via Different Clocks - An example relates to a method for accessing data of a first domain that is driven by a first clock via a second clock, comprising at least one of the following: accessing the data of the first domain via the second clock during a time when the first clock is in a first logical state. An edge indicating a transition from a second logical state to the first logical is used to access data via the first clock, or accessing the data of the first domain via the second clock at edges of the first clock that are synchronized with edges of the second clock. | 2017-06-01 |
20170155498 | APPARATUSES AND METHODOLOGIES FOR BLIND EQUALIZATION IN A COMMUNICATION SYSTEM - A method and apparatus for equalization in a communication system. The method includes receiving an input of a block of symbols, filtering the input in the frequency domain, calculating an error factor in the time domain based on the filtered input, updating tap weights of the equalizer in the frequency domain using circular correlation based on the error factor and the conjugate of the input in the frequency domain, and outputting the filtered input. | 2017-06-01 |
20170155499 | COMMUNICATION APPARATUS AND COMMUNICATION METHOD FOR SUCCESSIVE QUANTUM KEY DISTRIBUTION - Disclosed is a communication apparatus including a synchronization signal detector configured to detect a synchronization signal received from other communication apparatus coupled to the communication apparatus, wherein the other communication apparatus sends a quantum signal generated by a first light source to the communication apparatus, and a second light source configured to generate a decoy signal to be added to a quantum signal that is to be sent to the other communication apparatus according to a result of the detection of the synchronization signal. | 2017-06-01 |
20170155500 | ANALYSIS DEVICE, ANALYSIS METHOD AND COMPUTER READABLE MEDIUM - An analysis device for analyzing a data signal in an electronic system comprises a signal input for receiving the data signal, a memory unit to buffer the data signal, a signal decoder which is coupled to the memory unit and decodes frames of the data signal, an identification unit coupled to the decoder for identifying a number of the frames and/or at least one sub-frame of the frames which comply with a predetermined frame content condition, and a signal processor which is coupled to the memory unit and processes the data signal according to the identified at least one frame or sub-frame and according to respective timing information. | 2017-06-01 |
20170155501 | TRANSMISSION APPARATUS AND PLUG-IN UNIT - A transmission apparatus includes: a first plug-in unit including: a clock generator to generate a first clock, a first frame-pulse generator to generate a first frame-pulse-signal based on the first clock; a detector to detect a phase-difference between a first phase of the first frame-pulse-signal and a second phase of a second frame-pulse-signal transmitted from other plug-in unit, and generate phase-difference information based on the phase-difference, and a first transmitter to transmit a control-signal including the phase-difference information to the other plug-in unit; and a second plug-in unit being the other plug-in unit, including: a receiver to receive the control-signal, a controller to control a phase of a second clock of the second plug-in unit, based on the phase-difference information, a second frame-pulse generator to generate the second frame-pulse-signal based on the second clock, and a second transmitter to transmit the second frame-pulse-signal to the first plug-in unit. | 2017-06-01 |
20170155502 | METHOD FOR ENHANCED SECURITY OF COMPUTATIONAL DEVICE WITH MULTIPLE CORES - A method to protect computational, in particular cryptographic, devices having multi-core processors from DPA and DFA attacks is disclosed herein. The method implies: Defining a library of execution units functionally grouped into business function related units, security function related units and scheduler function related units; Designating at random one among the plurality of processing cores on the computational device to as a master core for execution of the scheduler function related execution units; and Causing, under control of the scheduler, execution of the library of execution units, so as to result in a randomized execution flow capable of resisting security threats initiated on the computational device. | 2017-06-01 |
20170155503 | ENCRYPTION SYSTEM AND METHOD BASED ON BIOMETRIC TECHNOLOGY - An encryption method includes: converting a section of express information into a binary sequence, grouping the binary sequence into a plurality of group data, and aligning each group data into an information matrix; converting the information matrix into a corresponding a basic group information matrix; randomly choosing a reference DNA sequence from a gene library, and aligning the reference DNA sequence into a basic group transition matrix, using the basic group transition matrix to convert the basic group information matrix into an encrypted information matrix, and exploding the encrypted information matrix to obtain a basic group information sequence; generating a primer for the basic group information sequence, and adding the primer before and behind the primer generator to obtain a completed DNA sequence; and synthesizing a DNA matter based on the completed DNA sequence. | 2017-06-01 |
20170155504 | COMPRESSING ENCRYPTED DATA WITHOUT THE ENCRYPTION KEY - A method, system and computer program product are disclosed for compressing encrypted data, wherein the data is encrypted by using a block encryption algorithm in a chained mode of operation, and the encrypted data is comprised of a set of N encrypted blocks, C | 2017-06-01 |
20170155505 | SECURING ENTERPRISE DATA ON MOBILE DEVICES - Embodiments include method, systems and computer program products for securing enterprise data in a mobile computing environment. Aspects include receiving a request to access the enterprise data stored on the mobile computing device in an encrypted format and determining whether a decryption key is stored in a cache memory of the mobile computing device. Based on determining that the decryption key is not stored in a cache memory of the mobile computing device, aspects include transmitting a request to an enterprise network for the decryption key and receiving the decryption key and storing the decryption key in the cache memory. Aspects also include decrypting the enterprise data using the decryption key and deleting the decryption key from the cache memory based on a determination that the decryption key has not been accessed for a period of time greater than a threshold time. | 2017-06-01 |
20170155506 | SYSTEM AND METHOD FOR INTERACTIVE SESSION PROVISION - Systems and methods applicable, for instance, in interactive session provision. One or more nodes and/or other computers might, for example, provide to one or more other nodes and/or other computers the ability to employ certain software for an interactive session. A node and/or other computer providing the ability might, for instance, provide to a node and/or other computer receiving the ability software to be used in the interactive session, and/or one or more appropriate keys. A node and/or other computer that has received the ability might, for example, lose the ability with interactive session termination. | 2017-06-01 |
20170155507 | METHOD AND DEVICE FOR INSTALLING PROFILE OF EUICC - The present disclosure relates to a method and a device for installing a profile of an embedded universal integrated circuit boards (eUICC) and, more particularly, to a method and a device for remotely installing mobile communication subscriber information (profile) substituting for a universal integrated circuit boards (UICC), on a security module. The present disclosure relate to a method and a device for installing a profile of an eUICC of a network device, the method comprising the steps of: acquiring at least one of or more profiles encrypted with a first password key and one or more first password keys encrypted with a second password key; and when profile installation for the eUICC starts, transmitting to, at least one eUICC, the one or more encrypted profiles and the one or more encrypted first password keys, wherein the first password key is re-encrypted by the first password key with a third password key and transmitted to the one or more eUICCs and the encrypted profiles are decrypted by the first password key and installed on the one or more eUICCs, respectively. | 2017-06-01 |
20170155508 | CRYPTOGRAPHIC COMMUNICATION SYSTEM AND CRYPTOGRAPHIC COMMUNICATION METHOD - Provided is a cryptographic communication system including a first semiconductor device and a second semiconductor device. The first semiconductor device includes a common key generation unit that generates a common key CK(a) by using a unique code UC(a) and correction data CD(a), and an encryption unit that encrypts the common key CK(a) generated in the common key generation unit by using a public key PK(b) of the second semiconductor device. The second semiconductor device includes a secret key generation unit that generates a secret key SK(b) by using a unique code UC(b) and correction data CD(b), and a decryption unit that decrypts the common key CK(a) encrypted in the encryption unit by using the secret key SK(b). | 2017-06-01 |
20170155509 | METHOD AND SYSTEM FOR SECURE DISTRIBUTION OF SELECTED CONTENT TO BE PROTECTED ON AN APPLIANCE-SPECIFIC BASIS WITH DEFINABLE PERMITTED ASSOCIATED USAGE RIGHTS FOR THE SELECTED CONTENT - The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related thereto and to apparatus and methodology for production side systems and are consumer side systems for securely utilizing protected electronic data files of content (protected content), and further relates to controlled distribution, and regulating usage of the respective content on a recipient device (computing system) to be limited strictly to defined permitted uses, in accordance with usage rights (associated with the respective content to control usage of that respective content), on specifically restricted to a specific one particular recipient device (for a plurality of specific particular recipient devices), or usage on some or any authorized recipient device without restriction to any one in specific, to control use of the respective content as an application software program, exporting, modifying, executing as an application program, viewing, and/or printing of electronic data files. | 2017-06-01 |
20170155510 | DEVICE FOR DETERMINING A SHARED KEY - A first device ( | 2017-06-01 |
20170155511 | EMBEDDED SECURITY ARCHITECTURE FOR PROCESS CONTROL SYSTEMS - An apparatus includes a first distributed control system (DCS) node. The first DCS includes at least one interface configured to communicate, over a network, with a second DCS node. The first DCS node also includes at least one processing device. The processing device is configured to exchange a security association policy with the second DCS node. The processing device is also configured to exchange public keys with the second DCS node using the security association policy. The processing device is also configured to send a public key of the second DCS node to a field programmable gate array of the first DCS node. The processing device is also configured to receive a shared secret from the field programmable gate array. The processing device is also configured to generate a hash of a message using the shared secret. | 2017-06-01 |
20170155512 | MANAGEMENT APPARATUS, MEASUREMENT APPARATUS, SERVICE PROVIDING APPARATUS, COMPUTER PROGRAM PRODUCT, TRANSFER SYSTEM, AND TRANSFER METHOD - A management apparatus according to an embodiment is connected to a measurement apparatus deployed for each user via a first network. The management apparatus is connected to a service providing apparatus via a second network. The management apparatus includes a first communication device, a second communication device and one or more first processors. The first processors generate seed information using a service providing apparatus identifier. The first processors generate a user key using a measurement apparatus individual key, and the seed information. The first communication device transmits the generated seed information to the measurement apparatus via the first network. The second communication device transmits the generated user key to the service providing apparatus via the second network. | 2017-06-01 |
20170155513 | Trusted Platform Module (TPM) Protected Device - Example apparatus and methods provide a device (e.g., smartphone) that is more secure for electronic commerce. An example device includes a trusted platform module (TPM) that stores a public key and a private key. The device is provisioned with account information, user information, and device information. The TPM uses the account, user, and device information to acquire attestation credentials and endorsement credentials. The device uses the account, user and device information along with the attestation credentials and endorsement credentials to acquire limited use keys (LUKs) that are encrypted with the public key. The LUKs will only be decrypted as needed to support an actual transaction at the time of the transaction. Before decrypting an LUK, the TPM will authenticate a user of the device at the time of the transaction using. for example, a personal identification number (PIN), fingerprint, or other personal information. | 2017-06-01 |
20170155514 | METHODS AND APPARATUS TO PROVIDE FOR EFFICIENT AND SECURE SOFTWARE UPDATES - In a method for validating software updates, a data processing system contains a current version of a software component. The data processing system saves at least first and second current advance keys (AKs). After saving the current AKs, the data processing system receives an update package for a new version of the software component. The data processing system extracts a digital signature and two or more new AKs from the update package. The data processing system uses at least one current AK to determine whether the digital signature is valid. In response to a determination that the digital signature is valid, the data processing system uses a software image from the update package to update the software component, and the data processing system saves the new AKs, for subsequent utilization as the current AKs. Other embodiments are described and claimed. | 2017-06-01 |
20170155515 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PRIVACY-PRESERVING TRANSACTION VALIDATION MECHANISMS FOR SMART CONTRACTS THAT ARE INCLUDED IN A LEDGER - The system, method, and computer program product described herein may provide the capability to handle a variety of types of transactions, not just payment transactions. In addition, system, method, and computer program product described herein may provide the capability for users to be able to control the confidentiality of their transactions, for the system to control access to transactions, for the system to be capable of auditing transactions, and to provide accountability of the validating entities. | 2017-06-01 |
20170155516 | CELLULAR NETWORK AUTHENTICATION - A method, apparatus and computer program in which a cellular terminal: transmits a request that requires authentication procedure triggering to a cellular network and responsively receiving from the cellular network an authentication request message with an indication of a selected cryptographic algorithm from a group of a plurality of cryptographic algorithms; decodes the authentication request message to a decoded authentication request according to the selected cryptographic algorithm and based on a shared secret known by the cellular terminal and a network operator of the cellular terminal; based on the decoded authentication request, the shared secret and the selected cryptographic algorithm, produces and encrypts an authentication response message; and transmits the authentication response message to the cellular network. | 2017-06-01 |
20170155517 | Power over Ethernet Method and Device - A Power over Ethernet method and device, where the Power over Ethernet method includes: determining, by PSE, a maximum power of a PD according to a classification class of the PD; obtaining, by the PSE, a length of a network cable between the PSE and the PD; determining, by the PSE, a type of the network cable; calculating, by the PSE, a loss power of the network cable according to the length of the network cable and the type of the network cable; and using, by the PSE, a sum of the maximum power of the PD and the loss power of the network cable as a supply power, to supply power to the PD. The Power over Ethernet method and device provided in the present disclosure improves usage efficiency of the PSE supply power. | 2017-06-01 |
20170155518 | POE-Based Power Supply Method and PSE - A PoE-based power supply method and PSE. The method includes: after PSE supplies power to a PD, determining, by the PSE, a line voltage drop across a network cable between the PSE and the PD; and when the line voltage drop across the network cable is greater than a line voltage drop threshold, sending, by the PSE, a first Ethernet packet to the PD, so that the PD decreases load of the PD according to instruction information instructing the PD to decrease load power consumption and included in the first Ethernet packet. This ensures that a voltage received by the PD can satisfy a power requirement of the load of the PD, and further ensures that the PD can work normally. | 2017-06-01 |
20170155519 | Methods, Systems, and Products for Sharing Usage Plans - Shared usage plans are popular with families, friends, and small businesses. These shared usage plans share some cumulative utilization of resources, such as communications services. Even though multiple devices may share a monthly allotment of resources, an individual threshold is established for each device. The multiple individual thresholds may then be dynamically regulated to maintain the monthly allotment of resources. | 2017-06-01 |
20170155520 | IP MULTICAST MESSAGE TRANSMISSION FOR EVENT NOTIFICATIONS - A method for a dispersed storage network (DSN) begins when storing data associated with a vault, by identifying a multicast IP address associated with the vault. The method continues by generating and sending a multicast IP message to a plurality of storage units of the DSN and extracting, by each storage unit receiving the multicast IP message, the multicast IP address. The method continues when the extracted IP address compares favorably to a subscribed IP address, by storing, by the storage unit, the one or more encoded data slices for storage and the corresponding slice name for each encoded data slice. The method continues by each storage unit issuing a status multicast IP message. The method continues when an extracted IP address of a plurality of received status multicast IP messages compares favorably to a subscribed IP address, by executing an associated task. | 2017-06-01 |
20170155521 | METHOD AND APPARATUS FOR PROCESSING GROUP CHAT MESSAGE - The present disclosure discloses a method and an apparatus for processing a group chat message. The method includes: determining that a specified user is joined into a group; if at least one chat message exists in the group within a preset time period before a current time, obtaining the at least one chat message within the preset time period; selecting a chat message from the at least one chat message within the preset time period; and sending a message identifier of the selected chat message to a target server, so that the target server sends the selected chat message in the group according to the message identifier of the selected chat message. According to the present disclosure, by means of a simple selection operation, a previous chat message can be presented to a specified user that newly joins a group, thereby greatly improving processing efficiency. | 2017-06-01 |
20170155522 | COMMUNICATION APPARATUS AND COMMUNICATION SYSTEM - There is provided a communication apparatus of a plurality of communication apparatuses forming a ring network, the communication apparatus includes: a transmitter configured to transmit a multicast packet to a first communication apparatus of the plurality of communication apparatuses; a receiver configured to receive data of a reception failure of the multicast packet from the first communication apparatus; and a transmission controller configured to stop transmitting of the multicast packet from the transmitter according to the data of the reception failure. | 2017-06-01 |
20170155523 | METHOD AND APPARATUS FOR IDENTIFYING TYPE OF ELECTRONIC DEVICE ON SMART SOCKET, AND STORAGE MEDIUM - The present disclosure relates to a method and an apparatus for identifying a type of an electronic device on a smart socket. The method includes: obtaining a target power-on state parameter of a target electronic device connected to the smart socket in a power-on state, identifying a target type of the target electronic device based on the target power-on state parameter, and outputting the target type. | 2017-06-01 |
20170155524 | Location-Based Addressing Lighting and Environmental Control System, Device and Method - Location-Based Addressing (LBA) is a method of controlling and commissioning networked lighting devices. The lighting devices communicate over a wireless network using radio frequency communication protocols. The lighting devices are commissioned or grouped based on their 5 respective locations in a building floor plan or a building architecture. The lighting devices are commissioned to respond to radio frequency communications that correspond to their respective locations. This imposed location-based architecture reduces the amount of transmitted data required to control the lighting devices and, thus, reduces the radio bandwidth required to control the lighting devices. In other words, controlling devices “multicast” instructions and controlled devices “listen” for instructions and act only upon instructions that correspond to their respective location. Hand shaking or two-way communication between the controlling devices and the controlled devices is not required. | 2017-06-01 |
20170155525 | RING NETWORK SYSTEM AND NETWORK NODE - A ring network system is a ring network system in which a plurality of nodes including a blocking node that blocks transfer of a predetermined frame are connected in a ring shape, and when, any one of the plurality of nodes detects a change in a link state with an adjacent node, the node detecting the change transmits a collision frame for inquiring a collision of a blocking node to a current blocking node, and in accordance with a response from the current blocking node, a determination is made which of the nodes is to be a new blocking node, and in a case where the link state with the adjacent node has a higher priority level of blocking than a link state between the current blocking nodes, the node having detected the change transmits a collision frame for inquiring a collision of the blocking node. | 2017-06-01 |
20170155526 | SMART SOCKET AND SMART SOCKET CONTROL SYSTEM - A smart socket remotely controllable as to power outputs includes a switch control circuit, a wireless transmission module, and a power module. The switch control circuit is electrically connected to the live line input port and the live line output port, configured to control the connection of the live line. The wireless transmission module is electrically connected to the switch control circuit, to control the switch control circuit in accordance with the receiving wireless signals. The power module can transform AC power to DC power and supply power. A control system is also provided. The smart socket and smart socket control system can provide statistics and analysis of home appliances and respective power consumptions, and also can timely secure and protect electrical appliances, and eliminate fire risks. | 2017-06-01 |
20170155527 | CHANNEL ESTIMATION FOR WIRELESS SYSTEMS WITHOUT MATRIX INVERSION - In various embodiments, techniques are provided to determine channel characteristics of various communication systems such as OFDM systems or systems using a plurality of transmit antennas by using various sets of training symbols that produce zero cross-correlation energy. Channel communication can accordingly be simplified as the zero cross-correlation property allows for channel estimation without a matrix inversion. | 2017-06-01 |
20170155528 | ADAPTIVE CHANNEL ESTIMATION - The present invention relates to a method and apparatus for adaptive channel estimation for signal-amplitude-based communications systems. In one arrangement, the method comprises: receiving an observation (r) of a transmitted coded symbol (d); generating, with a weight generator, a first coefficient (v) for weighting the received observation based on an estimate of the transmitted coded symbol (d_est), the first coefficient having a magnitude that is invariable with the amplitude of the transmitted coded symbol; and forming a new channel estimate (h_est) based on a weighted observation using the first coefficient (v). | 2017-06-01 |
20170155529 | Clock Data Recovery Circuitry Associated With Programmable Logic Device Circuitry - A programmable logic device (“PLD”) is augmented with programmable clock data recover (“CDR”) circuitry to allow the PLD to communicate via any of a large number of CDR signaling protocols. The CDR circuitry may be integrated with the PLD, or it may be wholly or partly on a separate integrated circuit. The circuitry may be capable of CDR input, CDR output, or both. The CDR capability may be provided in combination with other non-CDR signaling capability such as non-CDR low voltage differential signaling (“LVDS”). The circuitry may be part of a larger system. | 2017-06-01 |
20170155530 | BASE STATION DEVICE, TRANSMISSION SYSTEM, AND TRANSMISSION METHOD - A base station device includes a first electronic component and a second electronic component that are connected. The first electronic component includes a generator configured to generate data; scramblers configured to perform, by using different codes, a scrambling process on the data generated by the generator; and a sending driver configured to send, by using different transmission lines, signals obtained by being subjected to the scrambling process by the respective scramblers and the second electronic component includes a receiver configured to receive the signals transmitted by the sending driver; descramblers configured to perform, by using the codes used by the respective scramblers, a descrambling process on the respective signals received by the receiver; and a selector configured to select one of a plurality of pieces of data obtained by being subjected to the descrambling process by the respective descramblers. | 2017-06-01 |
20170155531 | WIRELESS TRANSMISSION SYSTEM, WIRELESS COMMUNICATION DEVICE, AND WIRELESS COMMUNICATION METHOD - A wireless transmission system includes: a communication unit for transmission; and a communication unit for reception. The communication units for transmission and reception are housed in a housing of the same electronic apparatus, or the communication unit for transmission is housed in a housing of first electronic apparatus and the communication unit for reception is housed in a housing of second electronic apparatus and a wireless signal transmission path enabling wireless information transmission between the communication units is formed between the communication units when the first and the second electronic apparatus are disposed at given positions to be integrated with each other. The communication unit for transmission includes a first carrier signal generating unit and a first frequency converter, and the communication unit for reception includes a second carrier signal generating unit, and a second frequency converter. | 2017-06-01 |
20170155532 | WIRELESS RECEIVER - The present invention relates to a method and apparatus for demodulation in a wireless communications system transmitted across a wireless communications channel. The described wireless receiver includes a first antenna for receiving a wireless signal including a symbol transmitted across a wireless communications channel perceived by the first antenna, an observation modifier for generating a modified observation (y) of the symbol based on a product of the received observation (r) and the complex conjugate of a channel estimate (h*), a log-likelihood ratio (LLR) module generating log-likelihood ratios (LLRs) based on the modified observation and the channel estimate, and a maximum-likelihood-based decoder for decoding the symbol based on the LLRs. | 2017-06-01 |
20170155533 | METHODS OF UPLINK CHANNELIZATION IN LTE - Slot-level remapping physical uplink control channels into two resource blocks, respectively located at two slots of a subframe, are generally adapted to a 3GPP LTE physical uplink. ACK/NAK resource blocks may be applied by the extended cyclic prefix, adapted to a complex 3GPP LTE physical uplink where mixed resource blocks (where the ACK/NAK and CQI channels coexist) may be applied by the normal cyclic prefix, and adapted to a complex 3GPP LTE physical uplink where mixed resource blocks (where the ACK/NAK and CQI channels coexist) may be applied by the extended cyclic prefix. | 2017-06-01 |
20170155534 | METHOD AND APPARATUS FOR TRANSMITTING ACK/NACK - A technology enabling a base station to transmit acknowledgement (ACK)/negative ACK (NACK) information about data received from a terminal is provided. A cyclic shift value difference of each terminal may be maximized and a radio resource for transmitting the ACK/NACK information may be assigned without collision. | 2017-06-01 |
20170155535 | BROADCAST SIGNAL TRANSMITTER, BROADCAST SIGNAL RECEIVER, AND METHOD FOR TRANSCEIVING BROADCAST SIGNALS IN BROADCAST SIGNAL TRANSCEIVERS - A broadcast signal receiver according to the present invention comprises: a demodulator for performing OFDM demodulation on a received broadcast signal including a frame for the delivery of a broadcast service: a frame demapper for outputting the frame, the frame including a preamble that contains first signaling information, and a plurality of link-layer-pipes (LLPs) that contain PLP data, second signaling information and third signaling information, with the PLP data including a base layer and an enhancement layer of the broadcast service; and a decoder for decoding the first signaling information, for decoding the second and third signaling information, and for selectively decoding the PLP data by using the third signaling information. | 2017-06-01 |
20170155536 | EMBEDDING DATA BASED ON ORTHOGONAL CODES - In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus may include a processing system configured to map a data set based on a modulation scheme, to modulate the mapped data set based on a set of codes, the set of codes being orthogonal to a portion of a frame, and to generate the frame comprising the modulated data set in the portion of the frame. The apparatus may include an interface configured to output the frame for transmission. | 2017-06-01 |
20170155537 | ROOT CAUSE INVESTIGATION OF SITE SPEED PERFORMANCE ANOMALIES - The disclosed embodiments provide a system for processing data. During operation, the system obtains a set of components of a time-series performance metric associated with an anomaly in a performance of one or more monitored systems. For each component in the set of components, the system performs a statistical hypothesis test on the component to assess a deviation of the component from a baseline value of the component. When the statistical hypothesis test identifies a statistically significant deviation of the component from the baseline value, the system outputs an alert comprising a root cause of the anomaly that is represented by the statistically significant deviation of the component from the baseline value. | 2017-06-01 |
20170155538 | ALERT DASHBOARD SYSTEM WITH SITUATION ROOM - A user interface system includes a first engine configured to receive message data from managed infrastructure that includes managed infrastructure physical hardware that supports the flow and processing of information. A second engine determines common characteristics of events and produces clusters of events relating to the failure of errors in the managed infrastructure, where membership in a cluster indicates a common factor of the events that is a failure or an actionable problem in the physical hardware managed infrastructure directed to supporting the flow and processing of information. One or more situations is created that is a collection of one or more events or alerts representative of the actionable problem in the managed infrastructure. A display computer system generates a dashboard display that includes situations from clustered messages received from managed infrastructure, the display computer system coupled to or included in a situation room coupled to the first and second engines. | 2017-06-01 |
20170155539 | SYSTEMS AND METHODS FOR CORRELATING ALARMS IN A NETWORK - Networking equipment often generates alarms that operators must sift through to troubleshoot the network. The heterogeneous nature of the equipment and their associated alarms renders this task difficult. Furthermore, a network fault may trigger collateral alarms in adjacent equipment, sometimes obscuring the root cause of the fault. The present disclosure includes a system for correlating multiple successive alarms to discriminate between alarms from a faulty network object and alarms from a properly functioning network object that is dependent on the faulty network object. | 2017-06-01 |
20170155540 | SYSTEM FOR DECOMPOSING EVENTS FROM MANAGED INFRASTRUCTURES WITH SITUATION ROOM - A system is provided for clustering events. At least one engine is configured to receive message data from managed infrastructure that includes managed infrastructure physical hardware which supports the flow and processing of information. The at least one engine is configured to determine common characteristics of events and produce clusters of events relating to the failure of errors in the managed infrastructure. Membership in a cluster indicates a common factor of the events that is a failure or an actionable problem in the physical hardware managed infrastructure directed to supporting the flow and processing of information. The at least one engine is configured to create one or more situations that is a collection of one or more events or alerts representative of the actionable problem in the managed infrastructure. A situation room includes a collaborative interface (UI) for decomposing events from managed infrastructures. In response to production of the clusters one or more physical changes in a managed infrastructure hardware is made, where the hardware supports the flow and processing of information. | 2017-06-01 |
20170155541 | Failure Analysis Method and Device - A failure analysis method and device, where the method includes obtaining a frequency domain response amplitude of a channel from a hybrid fiber-coaxial (HFC) network, performing linear fitting on an effective portion of the frequency domain response amplitude to determine a channel slope value, and performing channel failure analysis according to the channel slope value. Failure analysis is performed according to the obtained channel slope value, and the channel slope value is a new failure analysis parameter. In this way, means of channel failure analysis increase, and channel failure analysis is more accurate. | 2017-06-01 |
20170155542 | METHOD FOR VIRTUAL LOCAL AREA NETWORK FAIL-OVER MANAGEMENT, SYSTEM THEREFOR AND APPARATUS THEREWITH - A method for virtual local area network fail-over management, a system therefor and an apparatus therewith are introduced herein. In the method for virtual local area network fail-over management in a hybrid software-defined network (SDN), a controller with a centralized management authority may manage some fail-over events that occur in each link or switch in a centralized manner. The controller may pre-calculate backup paths for each link or switch in case that fail-over events occur therefrom. Whenever the fail-over event occurs in some specific link or switch, the controller may deploy the pre-calculated backup path in response to the link down or switch down event, which may reduce the convergence recovery time for the VLAN path in case of fail-over events and improve the reliability of data transmission. | 2017-06-01 |
20170155543 | CONTROL APPARATUS, COMMUNICATION SYSTEM, AND CONTROL METHOD - A control apparatus is a control apparatus capable of controlling a plurality of relay apparatuses capable of executing a process for a packet, the control apparatus including: a first unit that determines presence of a predetermined relay apparatus in a state incommunicable with all neighboring relay apparatuses; a second unit that calculates a communication path bypassing the predetermined relay apparatus as a communication path for the packet, when it is determined that the predetermined relay apparatus is present; and a third unit that notifies at least one of the plurality of relay apparatuses of a processing rule for achieving the calculated communication path. | 2017-06-01 |
20170155544 | MONITORING AND DETECTING CAUSES OF FAILURES OF NETWORK PATHS - Generally described, systems and methods are provided for monitoring and detecting causes of failures of network paths. The system collects performance information from a plurality of nodes and links in a network, aggregates the collected performance information across paths in the network, processes the aggregated performance information for detecting failures on the paths, analyzes each of the detected failures to determine at least one root cause, and initiates a remedial workflow for the at least one root cause determined. In some aspects, processing the aggregated information may include performing a statistical regression analysis or otherwise solving a set of equations for the performance indications on each of a plurality of paths. In another aspect, the system may also include an interface which makes available for display one or more of the network topology, the collected and aggregated performance information, and indications of the detected failures in the topology. | 2017-06-01 |
20170155545 | TAKEOVER PROCESSES IN SECURITY NETWORK INTEGRATED WITH PREMISE SECURITY SYSTEM - An integrated security system is described comprising a gateway located at a first location. The gateway includes a takeover component that establishes a coupling with a first controller of a security system installed at the first location. The security system includes security system components coupled to the first controller. The takeover component automatically extracts security data of the security system from the first controller. The gateway automatically transfers the security data extracted from the controller to a second controller. The second controller is coupled to the security system components and replaces the first controller. | 2017-06-01 |
20170155546 | DUPLEX CONTROL DEVICE AND DUPLEX SYSTEM - A duplex control device includes: two systems of duplex controllers and a switching device. The switching device includes, in a feedback path of each system, a transmitter configured to generate feedback data including data for fixing failure detection and a receiving device configured to determine the presence or absence of a fixing failure based on the feedback data output from the transmitter. | 2017-06-01 |
20170155547 | NETWORK DIAGNOSTIC DEVICE - A diagnostic device for a communications network; the network comprising a customer communications network located at a customer location and connected by a customer communications link to a communications service provider network remote from the customer location. The device comprises a network monitoring interface arranged to monitor operation of the customer communications network; a processor arranged to detect faults in the operation of the customer communications network, a store for storing records of detected faults; a processor arranged to store records of detected faults in the store and to generate a report on a detected fault based on the stored records. The device is co-located with the customer communications network and further comprises: a first communications interface arranged to send to the communications service provider network via the customer communications link, the report generated on the detected fault; and a second communications interface arranged to send to the communications service provider network via a second communications link, the report generated on the detected fault. | 2017-06-01 |
20170155548 | ARRANGEMENTS AND METHODS PERFORMED BY A WIRELESS COMMUNICATION NETWORK AND A ROUTER FOR FACILITATING ROUTING OF DATA PACKETS IN THE NETWORK - A method is described performed by a wireless communication network for facilitating routing of data packets in the network. The wireless communication network comprises a network node, a number of base stations and a number of routers connecting the network node to the base stations. The method comprises obtaining transport bearer associations in which a plurality of transport bearer ID ranges are individually associated with one or more transport bearer parameter values of a plurality of transport bearer parameter values, and triggering provision of the obtained transport bearer associations to one or more of the number of routers. | 2017-06-01 |
20170155549 | ESTIMATING SERVER-CHANGE RISK BY CORROBORATING HISTORIC FAILURE RATES, PREDICTIVE ANALYTICS, AND USER PROJECTIONS - A method and associated systems for predicting a degree of risk associated with a planned change to a computer server or other electronic component. A computerized change-management system receives Probability and Impact inputs derived from user-derived input, from which it determines a Baseline risk of change failure. The system processes mined data to determine an historic change-failure rate as a function of a type of change, and computes a predictive incident probability based on a predictive analytics engine's forecast of whether a particular type of server will be problematic. The system then computes a final Change Risk by adjusting the Baseline risk as a function of the historic change-failure rate, the predictive incident-probability, and a Baseline-specific weighting factor. If the resulting Change Risk is judged to be elevated, the system initiates collateral actions and notifications intended to reduce the probability and impact of a change failure. | 2017-06-01 |
20170155550 | CLOUD ORCHESTRATED CLOUD CONNECTOR UPGRADES - Presented herein are techniques for orchestrating an update of an on-premises cloud connector from a cloud-based software platform. In particular, a first version of a first cloud connector is running in an active-active configuration across first and second nodes in an on-premises cluster. The first cloud connector is associated with user subscriptions to a first on-premises application and the first cloud connector connects the first on-premises application to a first cloud service hosted at a cloud-based software platform application. The first cloud connector is updated from the first version to a second version on each of the first and second nodes in a sequential manner. The update of the first cloud connector from the first version to the second version is initiated at the cloud-based software platform. | 2017-06-01 |
20170155551 | VISUALIZING DISTRIBUTIONS OF CORRELATED DATA - A method is described for visualizing distributions of correlated data in a computing environment in a form readable by a computer system operator, such as throughput and response time. Data is collected and a visualized representation is generated that is indicative of system performance. | 2017-06-01 |
20170155552 | Method for Self-Construction of Multiple Wireless Networks - Provided is a network self-construction method of connecting network devices to a specific network in a wireless application environment in which network devices must be divided into multiple networks in the same space. An access point (AP) controls network association of the network devices by transmitting a beacon signal into which information indicating association permission or non-permission of a network operated by the AP is inserted. A system manager associates the network devices with a specific network through the AP. When the network construction is completed, the system manager disables the AP from permitting additional network association. By repeating these steps, new networks are sequentially constructed. The system manager performs network construction by dividing the network devices into multiple networks in a desired structure and supports additional network association of network devices and transfer to other networks. | 2017-06-01 |
20170155553 | SYSTEM FOR PROVIDING TELEMATIC SERVICES AND CORRESPONDING METHOD - Method of providing services for a vehicle, the method comprising: storing for at least one model of vehicle of said group of vehicles, the configuration files for at least one service to be provided; storing a set of data pairs comprising an identifier of the control unit and an identification number of the corresponding vehicle; receiving the identification number of the vehicle from said vehicle by the services provision server; extracting the identifier of the control unit as a function of the identification number of the vehicle; —an extraction of one or more configuration files as a function of a vehicle identification datum; and—a downloading by the control unit of said vehicle from the services provision server of the configuration file or files extracted for the setting up of the service or services to be provided for the model of the vehicle. | 2017-06-01 |
20170155554 | CONFIGURING COMPUTING DEVICES USING A BOOTSTRAP CONFIGURATION - In the described embodiments, a device configuration file is used to set configuration settings on a computing device during a configuration operation (e.g., an initial configuration or a re-configuration of the computing device). The device configuration file is retrieved from a location where the device configuration file is hosted using a reference to the location from a bootstrap configuration. The bootstrap configuration is provided by a bootstrap configuration server and is retrieved by the computing device from the bootstrap configuration server during the configuration operation. | 2017-06-01 |
20170155555 | SYSTEMS AND METHODS FOR A RECONFIGURABLE ORDER-CONSTRAINED SWITCH NETWORK - Systems and methods for a reconfigurable order-constrained switch network are provided. In certain implementations, a reconfigurable switch network comprises a plurality of subtrees, wherein a subtree comprises a plurality of ports coupled to a single port, wherein a signal that passes through the single port is directed to a port in the plurality of ports as directed by at least one circulator, wherein at least two subtrees in the plurality of subtrees have a different number of ports in the respective plurality of ports, wherein the plurality of subtrees are combined such that at least one of the plurality of ports from each subtree is shared. | 2017-06-01 |
20170155556 | NETWORK TOPOLOGY DISCOVERY METHOD AND DEVICE - Embodiments of the present application provide a network topology discovery method and device, for performing a comprehensive analysis on results obtained after network topology discovery by using multiple types of network characteristic data, improve accuracy of network topology discovery. A specific solution comprises: collecting network characteristic data of a network element in a network; obtaining at least two corresponding link subsets respectively by using at least two types of topology discovery algorithms and according to the network characteristic data, gathering all links in the link subsets into one set to obtain a first link set, combining same links in the first link set, and for multiple links having only one same port, retaining only a link having a largest confidence value in the multiple links and deleting a remaining link, to obtain a second link set; obtaining a network topology of the network according to the second link set. | 2017-06-01 |
20170155557 | Monitoring Dynamic Networks - Monitoring a network is provided. A set of predicted network topology snapshot graphs of nodes in the network are generated based on a set of network topology prediction models for the network. A subset of the nodes is selected as monitors in the set of predicted network topology snapshot graphs of the network so that each link in a set of selected network links is identifiable using end-to-end measurements between the monitors. Network states of interest are determined in the set of selected network links within a selected time window based on the end-to-end measurements between the monitors. | 2017-06-01 |
20170155558 | Machine Data-Derived Key Performance Indicators with Per-Entity States - Raw machine data are captured and may be organized as events. Entity definitions representing machine entities that perform a service identify the machine data pertaining to respective entities. KPI search queries each define a KPI. Each KPI search query derives one or more values for the KPI from machine data identified in the entity definitions. The derivation may be performed on a per-entity basis and on the aggregate. The derived values may then be translated into a state value domain using per-entity thresholds, aggregate thresholds, or a combination. | 2017-06-01 |
20170155559 | ALERT DASHBOARD SYSTEM WITH SITUATION ROOM - A user interface system has at least a first engine configured to receive message data from managed infrastructure that includes managed infrastructure physical hardware which supports the flow and processing of information. The at least first engine determines common characteristics of events and produces clusters of events relating to the failure of errors in the managed infrastructure. Membership in a cluster indicates a common factor of the events that is a failure or an actionable problem in the physical hardware managed infrastructure directed to supporting the flow and processing of information. One or more situations are created that is a collection of one or more events or alerts representative of the actionable problem in the managed infrastructure. A display computer system generates a dashboard display that includes situations from clustered messages received from managed infrastructure. The display computer system is coupled to or included in a situation room coupled to the at least first engines. | 2017-06-01 |
20170155560 | MANAGEMENT SYSTEMS FOR MANAGING RESOURCES OF SERVERS AND MANAGEMENT METHODS THEREOF - A management method for management of resources of servers is provided, the method including the step of: collecting, by a resource status monitor, performance monitoring data of each resource within each of the servers and operation status data of a plurality of virtual machines within the servers; analyzing, by an abnormality analysis and determination device, the performance monitoring data and the operation status data collected to automatically send a trigger signal in response to determining that a virtual machine in performance abnormal status is exist among the virtual machines; and automatically performing, by a resource allocator, a processing on the virtual machine in performance abnormal status in response to the trigger signal, wherein the processing is at least one action of a limiting processing, a transfer processing and a resource allocation. | 2017-06-01 |
20170155561 | METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS TO DERIVE QUALITY DATA FROM AN EVENTUALLY CONSISTENT SYSTEM - An apparatus for deriving quality data includes a processor and memory storing executable computer code causing the apparatus to at least perform operations including receiving a consistency check from a network device indicating a summary count obtained during a time period. The summary count specifies a number of data items of a service utilized/provided, within a given time period, to one or more communication devices of an entity. The consistency check also includes a raw count, obtained during a time window the expiration of which is subsequent to the time period, indicating a number of data items of the service utilized/provided, within the given time period, to the communication devices. The computer program code may further cause the apparatus to determine whether a deviation between the summary count relative to the raw count is less than or equal to a threshold. Corresponding methods and computer program products are also provided. | 2017-06-01 |
20170155562 | PROVIDING NETWORK BEHAVIOR VISIBILITY BASED ON EVENTS LOGGED BY NETWORK SECURITY DEVICES - A network management entity is configured to communicate with one or more network security devices. Each network security device is configured to store in a respective event queue an event for each attempt to access a network accessible destination through the security device. Each event indicates the destination of the attempted access. The management entity periodically collects from the event queues the stored events so that less that all of the events stored in the event queues over a given time period are collected. The management entity determines, based on the collected events, top destinations as the destinations that occur most frequently in the collected events. The management entity determines, based on the collected events, bottom destinations as the destinations that occur least frequently in the collected events. The management entity generates for display indications of the top destinations and generates for display indications of the bottom destinations. | 2017-06-01 |
20170155563 | Method of tracking progress in a distributed system - Method of tracking program progress, the flow of information and/or the interaction of users in a distributed system of programmable controls and/or data-processing systems, wherein time stamps are generated and stored at previously defined places of the system. | 2017-06-01 |
20170155564 | INTERCONNECTING ELECTRONIC DEVICES FOR REPORTING DEVICE STATUS - A first electronic device can receive an identifying signal broadcast from a second electronic device located within a wireless communication range of the first electronic device, and in response, establish a first, local electronic communication path between the first and second electronic devices. The first electronic device can then receive a set of status data from the second electronic device over the local electronic communication path. The first electronic device can then establish a second, remote electronic communication path to a remote server and subsequently transmit, over the remote electronic communication path, the status data from the second electronic device along with status data from the first electronic device. | 2017-06-01 |
20170155565 | CALCULATION DEVICE, PROGRAM, AND INFORMATION PROCESSING METHOD - An information processing method for a computer having a memory and a processor coupled to the memory, and the computer is coupled between a plurality of transmission nodes and a reception node. The method including: calculating coefficients of an equation, the coefficients corresponding to a number of transmission nodes having an abnormality among a plurality of transmission nodes, based on a numeric value including state information of transmission nodes having the abnormality and identification information for identifying the transmission nodes having the abnormality; and transmitting the coefficients to a reception node that extracts the numeric value from a solution of the equation using the coefficients. | 2017-06-01 |
20170155566 | PERFORMING NETWORK TOPOLOGY TRACES WITH MINIMAL DATA COLLECTION - In one embodiment, a device in a network receives privatized network trace data that comprises round trip time information for hops along a communication path. The device groups the trace data into a plurality of network segments based on the round trip time information. The device calculates a segment trip time metric for one or more of the network segments based on the round trip time information associated with the one or more network segments. | 2017-06-01 |
20170155567 | METHOD AND DEVICE FOR DETECTING HOTLINKING - Disclosed are a method and a device for detecting hotlinking. The method includes: receiving a resource obtaining request sent by a client, the resource obtaining request comprising the client's IP address information; then performing statistic on processing status information corresponding to the resource obtaining request within a preset territorial scope corresponding to the IP address information; and outputting alarm information if the processing status information is not available in preset condition. | 2017-06-01 |
20170155568 | FAILURE DETERMINATION METHOD AND TRANSMISSION DEVICE - A failure determination method executed by a transmission device, the failure determination method includes acquiring first identification information to identity types of a plurality of signals that have passed through an input terminal of the transmission device; generating a monitoring signal in which the first identification information is stored and inserting the generated monitoring signal into the input terminal; acquiring second identification information to identify the types of the plurality of signals when the plurality of signals transmitted through the input terminal pass through an output terminal of the transmission device; extracting the first identification information from the monitoring signal that is transmitted from the input terminal and is detected at the output terminal; and determining path failure between the input terminal and the output terminal regarding each of a plurality of types by comparing the second identification information and the first identification information extracted from the monitoring signal. | 2017-06-01 |
20170155569 | TEST CASE BASED VIRTUAL MACHINE (VM) TEMPLATE GENERATION - A method is implemented by a computing device to automatically generate a virtual machine (VM) template to be used by a test orchestrator for creating a virtualized testing environment in which to perform a networking test. The method includes obtaining a test script from a test script repository, parsing the test script to determine a set of network devices involved in the networking test and a network connectivity among the set of network devices, and generating the VM template based on the set of network devices involved in the networking test and the network connectivity among the set of network devices, where the VM template defines a configuration of networked VMs that virtualizes the set of network devices involved in the networking test and the network connectivity among the set of network devices. A test orchestrator can administer creation of the virtualized testing environment based on the VM template. | 2017-06-01 |
20170155570 | ANALYSIS OF SITE SPEED PERFORMANCE ANOMALIES CAUSED BY SERVER-SIDE ISSUES - The disclosed embodiments provide a system for processing data. During operation, the system obtains a component of a time-series performance metric associated with a server-side root cause of an anomaly in the time-series performance metric. Next, the system obtains a call graph representation of the component, wherein the call graph representation includes a parent node having a parent value of the component and a set of child nodes of the parent node, each child node having a corresponding child value of the component. The system then analyzes the call graph representation to identify one or more of the child nodes as sources of the anomaly. Finally, the system outputs an alert that identifies the sources of the anomaly. | 2017-06-01 |
20170155571 | SYSTEM AND METHOD FOR DISCOVERING AD-HOC COMMUNITIES OVER LARGE-SCALE IMPLICIT NETWORKS BY WAVE RELAXATION - A method includes computing a diffusion vector starting with a seed, querying nodes for connections, reweighting diffusion vector based on the degrees, sorting nodes based upon magnitude in the reweighted diffusion vector which is obtained through wave relaxation solution of a time-dependent initial value problem, detecting a community through a sweep over the nodes according to their rank, and selecting a prefix that minimizes or maximizes an objective function. | 2017-06-01 |
20170155572 | RELATIVE POSITIONING OF A MOBILE COMPUTING DEVICE IN A NETWORK - An approach to determine a relative position for each computer of a group of computers within a wireless network to a computer within the wireless network, the approach includes a computer receiving a set of digital image files from each computer of the group of computers. The approach includes a computer aggregating the set of digital image files into a panoramic digital image file. The approach includes a computer generating a network map depicting a position of each of the computers within the wireless network based, at least in part, on the panoramic digital image file. The method includes a computer determining a relative position map for at least one computer based, on the network map and the panoramic digital image file, wherein the relative position map provides a location of each computer of the group of computers within the wireless network with respect to the at least one computer. | 2017-06-01 |
20170155573 | SWITCHING OF HOST NETWORK TRAFFIC THROUGH BASEBOARD MANAGEMENT CONTROLLER (BMC) - Systems and methods for switching host network traffic through a Baseboard Management Controller (BMC) are described herein. In an illustrative, non-limiting embodiment, an Information Handling System (IHS) may include a host processor; a Baseband Management Controller (BMC) coupled to the host processor; and a memory coupled to the host processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: determine that a network path dedicated to the host processor has failed; and route host network traffic to and from the host processor through a network failover path provided by the BMC. | 2017-06-01 |
20170155574 | CONNECTION QUALIFIED LINK PASS THROUGH - Described herein are techniques for monitoring signal paths of a media converter and finding faults within those signal paths. For instance, techniques may include monitoring signal paths associated with a media converter to discover a path failure, wherein each of the paths can include a RX portion associated with a different physical transmission media, and a path failure is discovered when a signal expected to be received by one of the RX portions is absent. The techniques may also include, upon discovery of a path failure, providing an emulated signal over a signal path associated with the path failure and/or providing an emulated signal over a remainder of the paths, such that all the signal paths continue to communicate signals, and such that at least one of the RX portions of the paths is identified as associated with the path failure. | 2017-06-01 |
20170155575 | RESTORATION METHOD FOR AN MPLS RING NETWORK - According to the present invention, there is provided a method for restoring a MultiProtocol Label Switching (MPLS) ring network in the event of a network link failure. The MPLS ring network comprises a path for traffic around the ring comprising a plurality of sequential Label Switched Paths (LSPs). The method comprises, at a network node in the MPLS ring network: detecting a failure along a network link traversed by a first LSP having an end point at the network node; in response to the detecting, encapsulating an Ethernet Ring Protocol (ERP) restoration message in a restoration pseudowire; and transmitting the restoration pseudowire within a second LSP over a subsequent network link. The method also comprises, at a network node in the MPLS ring network: receiving a first LSP comprising a pseudowire; detecting that the pseudowire is a restoration pseudowire comprising an Ethernet Ring Protocol (ERP) restoration message; and in response to the detecting, processing the ERP restoration message. There is also provided a network node for an MPLS ring network, and an MPLS ring network. | 2017-06-01 |
20170155576 | CONTROL OF PROTECTION SWITCHING IN A COMMUNICATION NETWORK - It is disclosed a method for controlling the protection switching in a communication network having a ring topology. The method applies when a lockout of protection command is applied at a node, a bidirectional failure occurs on a span connecting the node to an adjacent node, and the lockout of protection command is subsequently removed. The method comprises, at any one of the node and the adjacent node, detecting the failure and, if there is not a further lockout of protection command locally applied at the any one of the node and the adjacent node, sending a request packet carrying a signal fail indication towards the other node. | 2017-06-01 |
20170155577 | Virtual Router Redundancy Protocol Fault Detection Method and Routing Device - A VRRP fault detection method is applied to a VRRP group including one primary router and one or more secondary routers. The method includes: sending, by the primary router and the secondary router, link detection packets having an echo response function, where a destination address of the link detection packet is a virtual address of the VRRP group. The method also includes determining, by the primary router and the secondary router, whether response packets corresponding to the link detection packets sent by the primary router and the secondary router are received within a predetermined time, and if the primary router and/or the secondary router does not receive the response packet within the predetermined time, determining that the primary router is faulty. | 2017-06-01 |
20170155578 | METHOD, MOBILE TERMINAL, AND APPARATUS FOR MANAGING ROUTING DEVICE - A method includes: obtaining, by a mobile terminal, first network connection parameters of a routing device connected to the mobile terminal; according to the first network connection parameters, determining, by the mobile terminal, whether the mobile terminal has a management permission for managing the connected routing device; and if the mobile terminal has the management permission for managing the connected routing device, managing, by the mobile terminal, the connected routing device. | 2017-06-01 |
20170155579 | CENTRALIZED SERVER SWITCH MANAGEMENT - A system for managing server switches includes a plurality of leaf switches, a plurality of spine switches connected to each of the plurality of leaf switches, and a switch manager. The switch manager is connected to the plurality of leaf switches and the plurality of spine switches, and is configured to provide an individual controller as a virtual machine for each leaf switch and for each spine switch. | 2017-06-01 |
20170155580 | Low-Overhead Routing - A method of routing an Internet Protocol (IP) packet from a routing device is provided. The method includes receiving a first IP packet having a first IP header and a first IP data field, the first IP packet having a final destination corresponding to a destination device communicatively coupled to the routing device via a network route including at least two hops between the routing device and the final destination. A second IP packet having a second IP header and a second IP data field is generated. The second IP data field is a copy of the first IP data field, and a destination IP address field in the second IP header includes an IP address of a next hop on the network route. The second IP packet does not include an IP address of the final destination in the second IP header. | 2017-06-01 |
20170155581 | METHOD, DEVICE, AND SYSTEM FOR PACKET ROUTING IN A NETWORK - A method for packet routing in a network is disclosed. The network includes a network controller, a first switch connected to the network controller, a first server directly connected to the first switch, and a second server. The network controller obtains network connection information of the two servers. The network connection information indicates that the first server belongs to a first subnet and the second server belongs to a second subnet, the first subnet and the second subnet are two different subnets, and the two different subnets are configured on a same router. The network controller sends configuration information to the first switch. The configuration information configures the first switch to modify a packet header of a packet sent from the first server to the second server, and forward the modified packet to the second server. | 2017-06-01 |
20170155582 | Method and Apparatus for Processing Modified Packet - A method and an apparatus for processing a modified packet. A first routing device obtains a first packet sent by a second routing device, where the first packet carries a first correspondence, creates a forwarding entry that includes the first correspondence, receives a modified packet and determines an ID of a destination service function (SF) of the modified packet, queries the forwarding entry according to the ID of the destination SF, and determines that an SF identified by the ID of the destination SF is an SF connected to a second routing device, and forwards the modified packet to the second routing device. | 2017-06-01 |
20170155583 | DIGITAL FRAME SWITCH - This disclosure relates to a switch for digital frames exchanged with an external computer system, the switch comprising at least one input port, at least one output port and a switching matrix, the input port also comprising: a first means for validating the incoming frame, a second means for routing the validated frame, a third means for temporarily storing the validated incoming frame; the means for temporarily storing the validated incoming frame being controlled by “flow control” information from the switching matrix; the output port including: a means for temporarily storing the outgoing frame controlled by “flow control” information from the external computer system, the digital-frame switching operation in FIFO (first in, first out) mode. | 2017-06-01 |
20170155584 | SYSTEMS AND METHODS FOR IMPLEMENTING A SWITCHED CONTROLLER AREA NETWORK - Systems, methods, and apparatuses are described herein for implementing a switched Controller Area Network (“CAN”). In some embodiments, control circuitry of a bridge may receive a CAN message. The control circuitry may identify a first plurality of nodes to which the CAN message is addressed by comparing a virtual CAN bus identifier of the CAN message to entries of a virtual CAN bus lookup table, and may identify a second plurality of nodes to which the CAN message is addressed by comparing a message identifier (“ID”) of the CAN message to entries of a message ID lookup table. The control circuitry may perform a logical AND operation between the first plurality of nodes and the second plurality of nodes, and may transmit the CAN message to a node that satisfies the logical AND operation. | 2017-06-01 |
20170155585 | CONTROL MESSAGE ROUTING STRUCTURE FOR A CONTROLLER AREA NETWORK - Systems and methods are provided for routing a message in a network. A bit length of an identifier field of a received message is identified. A lookup table is selected based on the bit length of the identifier field. The identifier field is used as a reference for the lookup table to identify a bus for the message, and the message is forwarded to the bus. | 2017-06-01 |
20170155586 | SYSTEMS AND METHODS FOR IMPLEMENTING A TIME-STAMPED CONTROLLER AREA NETWORK (CAN) BUS MESSAGE - Systems, methods, and apparatuses are provided herein for time-stamping a Controller Area Network (“CAN”) bus message. Control circuitry (e.g., of a network bridge) may receive a CAN message, and may, in response to receiving the CAN message, generate a time stamp. The control circuitry may add an entry to a lookup table stored in memory, wherein the entry correlates a CAN message Identifier (“ID”) corresponding to the CAN message with the time stamp. The control circuitry may encapsulate the CAN message and the time stamp, and may transmit the CAN message according to the time stamp. | 2017-06-01 |
20170155587 | FORWARDING TABLE COMPRESSION - One embodiment of the present invention sets forth a technique for compressing a forwarding table. The technique includes storing a first network prefix and a first set of routing information associated with the first network prefix in a routing table, and writing the first network prefix from the routing table to a first entry included in a forwarding table. The technique further includes storing a second network prefix and a second set of routing information associated with the second network prefix in the routing table. The second network prefix is covered by the first network prefix. The technique further includes, based on comparing the first set of routing information to the second set of routing information, determining that the second network prefix should not be written from the routing table to the forwarding table, or removing the second network prefix from the forwarding table. | 2017-06-01 |
20170155588 | Call Admission Control and Preemption Control Over a Secure Tactical Network - In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion. | 2017-06-01 |
20170155589 | ROUTE OPTIMIZATION USING MEASURED CONGESTION - A flow based routing method and apparatus selects a path from a plurality of different paths for assignment to a flow. The path is selected based on traffic performance measurements which identify relative congestion and performance of the different paths, so that traffic flows can be diverted away from network congestion points, thereby allowing network resources to be load balanced at a flow granularity. The present invention may be configured on physical or virtual links on an NE to enhance the forwarding of packets using the primary link and one or more alternate links to any given destination. | 2017-06-01 |
20170155590 | SYSTEM AND METHOD FOR POLICY-BASED MULTIPATH WAN TRANSPORTS FOR IMPROVED QUALITY OF SERVICE OVER BROADBAND NETWORKS - An approach is provided whereby multiple broadband connections operate together to provide a highly available secure private networking solution. Data packets of a communications flow are received by a networking device, for transmission to a remote destination node, over a wide area data communications network. A service classification is determined for the data flow. A sequence number is generated for each data packet, where the sequence numbers indicate an order by which the data packets are received. An indication of the service classification and the sequence number is added to each data packet. For each data packet, a transport policy is determined that indicates one or more VPN tunnels through which the data packet is to be transmitted, where the determination of the VPN tunnels is based on the service classification, and wherein each VPN tunnel is carried over a respective WAN transport of the wide area data network. | 2017-06-01 |
20170155591 | NETWORK DEVICE AND CONTROLLING METHOD THEREOF - A network device includes a packet classifying unit and a packet processing unit. The packet processing unit includes processors coupled in series. Each processor includes a storage unit and an operating unit. Data packets are classified into packet types corresponding to different pipelines by the packet classifying unit. The storage unit stores characteristic values and operation data corresponding to different pipelines. The operating unit processes data packets output from the previous stage (e.g., classified data packets) in accordance with their packet types, characteristic values and the corresponding operation data. | 2017-06-01 |