30th week of 2018 patent applcation highlights part 65 |
Patent application number | Title | Published |
20180212804 | TRANSMISSION DEVICE, RECEPTION DEVICE, AND COMMUNICATION SYSTEM - Provided is a transmission device including a transmitter. The transmitter includes a first output, a second output, and a third output, and is configured to transmit a symbol signal corresponding to a combination of signals of the first output, the second output, and the third output. An output impedance of the second output is lower than an output impedance of the first output. | 2018-07-26 |
20180212805 | MODULATION METHOD, DEMODULATION METHOD, AND APPARATUS FOR MULTI-USER INFORMATION TRANSMISSION - Disclosed are a modulation method, demodulation method, and apparatus for multi-user information transmission. The modulation method comprises: a transmitter determines a first modulation symbol and a second modulation symbol according to a first information bit, a second information bit, and a mapping table, the mapping table being used for determining a corresponding relation between the first information bit and the first modulation symbol and a corresponding relation between the second information bit and the second modulation symbol, each group of modulation symbols in the mapping table being superposed and mapped to a constellation diagram to achieve a Gray attribute; and the transmitter superposes the first modulation symbol and the second modulation symbol to obtain a superposed symbol. | 2018-07-26 |
20180212806 | DIGITAL COMMUNICATION RECEIVER USING PARTIAL KNOWLEDGE OF THE CHANNEL STATE INFORMATION - The present invention proposes a demodulator device, a receiver and a demodulation method for M-ary amplitude shift keying systems (MASK) that requires partial knowledge of the CSI, namely, the channel attenuation coefficient. Therefore, the new demodulator, receiver and demodulation method do not require the knowledge of the channel phase shift. Consequently, no complicated channel estimation techniques are required, and the system will be very robust to the system impairments such as phase noise, I-Q imbalance, etc. In this sense, the new technique is denoted as semi-coherent demodulation (SCD). To reduce the complexity of the new SCD, a suboptimal demodulator is derived which has much lower complexity than the optimal while providing almost the same error probability. | 2018-07-26 |
20180212807 | Backscatter Communication Among Commodity WiFi Radios - A backscatter tag communicate device includes, in part, a receiver configured to receive a WiFi packet conforming to a communication protocol defining a multitude of codewords, a mapper configured to map at least a first subset of the multitude of codewords disposed in the packet to a second multitude of codewords defined by the protocol, and a frequency shifter configured to shift a frequency of the second multitude of codewords such that the frequency shifted codewords are characterized by a single sideband spectrum. The communication protocol may be the 802.11b communication protocol. The mapper may optionally map the first subset of the multitude of codewords by changing phases of the first subset of the multitude of codewords. | 2018-07-26 |
20180212808 | METHODS, DEVICES AND SYSTEMS FOR RECEIVING AND DECODING A SIGNAL IN THE PRESENCE OF NOISE USING SLICES AND WARPING - A method may comprise receiving and sampling a signal. The signal may encode a data packet. A slice may be generated and stored comprising a pair of values for each of a selected number of samples of the signal representing a correlation of the signal to reference functions in the receiver. The presence of the data packet may then be detected and the detected packet decoded from the stored slices. The generating and storing slices may be carried out as the received signal is sampled. The sampled values of the signal may be discarded as the slices are generated and stored. The slice representation of the signal can be manipulated to generate filters with flexible bandwidth and center frequency. | 2018-07-26 |
20180212809 | SYSTEM AND METHOD FOR COMMUNICATIONS WITH REDUCED PEAK TO AVERAGE POWER RATIO - A method for transmitting data includes modulating data bits with a constellation to produce modulated data symbols, precoding the modulated data symbols to obtain ns groups of precoded samples, where ns is equal to a number of non-zero terms in a sparse code associated with the transmitting device, mapping the ns groups of precoded samples to groups of subcarriers in accordance with the sparse code associated with the transmitting device, to obtain a plurality of subcarrier-mapped samples, transforming the plurality of subcarrier-mapped samples into encoded data symbols, and transmitting the encoded data symbols. | 2018-07-26 |
20180212810 | FREQUENCY AND TIME DOMAIN MULTIPLEXING FOR LOW PEAK-TO-AVERAGE POWER RATIO (PAPR) WAVEFORM DESIGN WITH MULTIPLE STREAMS - Methods, systems, and devices for wireless communications are described that support frequency and time domain multiplexing for low peak-to-average waveforms with multiple streams. A user equipment (UE) may identify sets of symbols associated with different streams (e.g., multiple single-carrier discrete Fourier transform (DFT)-spread waveforms), where each stream may be associated with a low peak-to-average power ratio (PAPR). In some cases, different waveforms may be mapped to subsets of frequency resources through frequency division multiplexing (FDM). The UE may further reduce the PAPR of the multiplexed waveforms by performing time division multiplexing (TDM) across the single-carrier streams, and sets of symbols that are not used by one waveform may be used by another waveform. Frequency domain phase ramps may be applied to align the multiplexed waveforms. Signals included in an uplink transmission according to these techniques may maintain properties similar to single-carrier waveforms, including a low PAPR. | 2018-07-26 |
20180212811 | TRANSMISSION METHOD AND TRANSMISSION APPARATUS FOR PACKET FORMAT DETECTION - A transmission apparatus of the present disclosure comprises a packet generator which, in operation, generates a packet and a transmitter which, in operation, transmits the generated packet. The packet includes a legacy short training field, a legacy long training field, a legacy signal field (L-SIG), a repeated legacy signal field (RL-SIG), a first non-legacy signal field, a second non-legacy signal field, a non-legacy short training field, a non-legacy long training field and a data field, wherein the second non-legacy signal field is optionally present. The packet generator generates the packet by configuring the RL-SIG in different ways according to a presence or absence of the second non-legacy signal field in the packet. | 2018-07-26 |
20180212812 | METHOD AND DEVICE IN A WIRELESS COMMUNICATION SYSTEM - Processor configured to map at least two synchronisation signal sequences to a respective set of resource elements of an OFDM symbol, wherein there is at least one resource element between each pair of adjacent sets of resource elements. | 2018-07-26 |
20180212813 | COMMUNICATION DEVICE AND METHOD IN FILTER-BANK BASED SINGLE CARRIER FREQUENCY DIVISION MULTIPLE ACCESS SYSTEM - Disclosed is a 5G or pre-5G communication system to be provided for supporting a data transmission rate higher than that of a 4G communication system such as LTE. Particularly, the present invention relates to a communication device and method in a filter-bank based single carrier frequency division multiple access (FB based SC-FDMA) system and, particularly, to a communication device and method for lowering a peak to average power ratio (PAPR) in an uplink. | 2018-07-26 |
20180212814 | DEVICE PROGRAMMING WITH SYSTEM GENERATION - A secure programming system and method for provisioning and programming a target payload into a programmable device mounted in a programmer. The programmable device can be authenticated before programming to verify the device is a valid device produced by a silicon vendor. The target payload can be programmed into the programmable device and linked with an authorized manufacturer. The programmable device can be verified after programming the target payload by verifying the silicon vendor and the authorized manufacturer. | 2018-07-26 |
20180212815 | VIRTUAL WINDOW SCREEN CAPTURE - A method and system for capturing and transmitting screen content and input/output events from a server to a client device are provided. The method includes transmitting, to the client device, a screen output rendered by the server respective of a first instance of a first application; and transmitting, to the client device, the screen output rendered by the server respective of a second instance of a second application, wherein the first instance is contained in a first securable object associated with the first application and the second instance is contained in a second securable object associated with the second application, wherein the first instance and the second instance are simultaneously executed by the server under a single logon session. | 2018-07-26 |
20180212816 | DATA STORAGE METHOD, NON-VOLATILE COMPUTER STORAGE MEDIUM, ELECTRONIC EQUIPMENT, SERVICE CAPABILITY EXPOSURE FUNCTION, AND BASE STATION - The present application provides a data storage method, a non-volatile computer storage medium, an electronic equipment, a service capability exposure function, and a base station. The method comprises: a base station receives a storage request that is used for storing a content source and is sent by a service capability exposure function, the content source coming from a third-party server; and the base station stores the content source according to the storage request. The present application solves the technical problem of long time delay in a transmission process of content source data in the prior art. | 2018-07-26 |
20180212817 | ENABLING REDIRECTION POLICIES TO BE APPLIED BASED ON THE WINDOWS CLASS OF A USB DEVICE - Redirection policies can be applied based on the Windows class of a USB device. When an agent on the server receives notification that a USB device has been connected to a client terminal that has a remote desktop connection with the server, the agent can employ the device descriptor contained in the notification to obtain the Windows class of the device. If the Windows class is obtained, and prior to causing the device to be enumerated on the server, the Windows class can be employed to apply one or more redirection policies. In this way, a redirected USB device can be managed at a much more granular level. | 2018-07-26 |
20180212818 | MANAGEMENT APPARATUS, MANAGEMENT METHOD, AND RECORDING MEDIUM - A management apparatus executes: receiving from a given communication apparatus where a fault has occurred, fault information; selecting a given flow that passes through the given communication apparatus from among a group of flows on the basis of the identification information of the given communication apparatus included in the fault information; determining whether the communication pattern of the given flow is similar to the given time series data indicating the change over time of the traffic within a period from a set period prior to the fault occurrence date and time to the fault occurrence date and time for the given flow; calculating the certainty that the given flow has been transmitted on the fault occurrence date and time on the basis of a frequency of appearance of the traffic of the communication pattern determined to be similar; and outputting calculation results. | 2018-07-26 |
20180212819 | Troubleshooting Method and Apparatus - This application provides a troubleshooting method and apparatus. The troubleshooting method includes obtaining key performance indicator (KPI) information of each service processor in a monitored network element; determining a faulty object according to the KPI information; determining a troubleshooting policy according to the faulty object; and sending the troubleshooting policy to a management unit in a network function virtualization (NFV) system, so that the management unit uses the troubleshooting policy to perform troubleshooting. Using the method or apparatus in this application, a problem of relatively low precision in fault locating according to a heartbeat message of a network element can be resolved. | 2018-07-26 |
20180212820 | WIRELESS TRANSMISSION DEVICE, FAULT NOTIFICATION METHOD, AND PROGRAM - A wireless transmission device is configured to group together as a first link group transmission lines connected to the wireless transmission device and a transmission lines connected to adjacent devices that are wireless transmission devices adjacent to the wireless transmission device and to share status information of transmission lines of the first link group with the adjacent devices. | 2018-07-26 |
20180212821 | TELEMETRY ADAPTATION - Methods, systems, and storage media for telemetry adaptation are disclosed herein. In an embodiment, a networking device may include a data collector agent module to receive measurement data from measurement sources according to an initial telemetry policy and to provide the measurement data to the one or more servers of the monitoring system. The networking device may include an anomaly detection module to receive measurement data from the data collector agent module, to detect an anomaly in the measurement data, and to provide an indication of the anomaly to the data collector agent module for the data collector agent module to provide a first modified telemetry policy for the measurement sources. | 2018-07-26 |
20180212822 | IN-VEHICLE COMMUNICATION SYSTEM, DOMAIN MASTER, AND FIRMWARE UPDATE METHOD - It is possible to update firmware of domain masters during travelling. An in-vehicle communication system includes a plurality of domain masters, and a redundant domain master configured to be able to perform alternative operations of the plurality of domain masters. The domain masters transmits operation information to the redundant domain master prior to update of firmware. The redundant domain master executes the alternative operation of the domain master using the received operation information. The domain master receives, after the update of the firmware, operation information generated in the alternative operation from the redundant domain master and operates in the updated firmware. | 2018-07-26 |
20180212823 | MONITORING AND MANAGEMENT METHOD FOR COMPLETE MACHINE CABINET SERVER - A method for monitoring and managing a rack server is provided. The method includes: editing, in a rack management controller RMC for monitoring and managing the rack server in a centralized manner, a configuration file based on configuration information regarding the numbers and positions of server nodes, node mid-planes, fan control boards, fans and power supplies in a rack; and automatically monitoring and managing, by the RMC, components based on the configuration file by the RMC automatically acquiring accurate numbers and positions of nodes and power supplies corresponding to the rack configuration to select a corresponding cooling-speed regulation curve. With the method, racks with different configurations can be dynamically monitored by modifying the configuration file including the configuration information of the rack and uploading the modified configuration file. | 2018-07-26 |
20180212824 | VERIFYING PACKET TAGS IN SOFTWARE DEFINED NETWORKS - Examples relate to packet tagging in Software Defined Networks (SDN). In an example, at least one SDN switch of an SDN marks a packet passing through the SDN switch with a packet tag, wherein the packet tag comprises an identifier of the SDN switch and a digest of a set of network forwarding rules of the SDN switch. Some examples generate, by a verifier, a verifier tag comprising the identifier of the at least one SDN switch and the digest of the set of network forwarding rules of the at least one SDN switch obtained from a network rules table and a network topology table stored in the verifier. Some examples receive, at a particular network element and from a verifier of the SDN, a request for attestation of the packet. Some examples check, by a verification engine, the packet tag against the verifier tag. | 2018-07-26 |
20180212825 | DYNAMIC MANAGEMENT OF NETWORKS TO FACILITATE STORAGE DEVICE ACCESS - Facilitating dynamic management of networks to facilitate storage device access is presented herein. A discovery component can discover a network topology utilizing application programming interfaces (APIs) of storage devices, network switches, and servers comprising a client computing resource in response to receiving an API request to facilitate a network access between the client computing resource and a storage device of the storage devices. Further, using the network topology, the discovery component can generate a network graph representing a physical and logical connectivity between the client computing resource and the storage device. A graph analysis component can determine, using the network graph, that an available connectivity between the client computing resource and the storage device has not been configured. Based on such determination, a configuration component can facilitate, via the APIs, respective configurations of the storage device, the network switches, and/or the client computing resource to enable the network access. | 2018-07-26 |
20180212826 | CENTRALIZED CONTROLLING SYSTEM CONTROLLING INTERACTIONS AND COOPERATION BETWEEN RADIO-OPERATED DEVICES OPERATING IN A MESH NETWORK SUPPORTING MULTIPLE RADIO COMMUNICATION PROTOCOLS - A mesh network ( | 2018-07-26 |
20180212827 | CLOUD CONTROLLED MESH NETWORKING - Devices, systems, and methods for optimizing a mesh network by cloud computing. A cloud network controller may receive from multiple access points (APs) in a mesh network information related to channel quality based on measurements taken by the APs. Based on this information, the cloud network controller may forecast one or more optimal channels based on the information related to channel quality. The cloud network controller may then send to the multiple APs a message including a recommendation to switch to the one or more optimal channels based on the forecasting. The AP may then make a decision to carry out the recommended channel switch. | 2018-07-26 |
20180212828 | G.8032 MISCONFIGURATION DETECTION SYSTEMS AND METHODS - A G.8032 misconfiguration detection method in a node includes receiving a mapped configuration from another node on a ring, wherein the mapped configuration includes a mapping of G.8032 instances to Virtual Local Area Network (VLAN) identifiers configured at the another node; comparing the mapped configuration with a local configuration on the node; and, responsive to a mismatch in the comparing, providing one of a trap and a notification based on the mismatch. The G.8032 misconfiguration can include one of a VLAN not mapped as protected to a node and a VLAN removed from a protected list at the node. | 2018-07-26 |
20180212829 | PROVISION, CONFIGURATION AND USE OF A TELECOMMUNICATIONS NETWORK - A method of configuring a telecommunications network comprising the steps of:
| 2018-07-26 |
20180212830 | RULES IMPLEMENTATION SYSTEM - A system and method receive raw data signals from a variety of edge devices. Observations are processed via a rule engine which may be preconfigured via a rule generator to implement a series of actions on remote or locally controlled machines. Rules are generated via a configurable user interface and may also be dynamically generated based on data received from the edge devices. | 2018-07-26 |
20180212831 | REDUCTION OF MANAGEMENT COMPLEXITY OF AN INFORMATION TECHNOLOGY SYSTEM - IT assets of the IT system are grouped into asset groups by verifying characteristics and relations of the IT assets against affinity criteria in decreasing order of an affinity level of corresponding affinity criteria. A description of target platforms eligible to host the IT assets includes an indication of one or more hosting constraints and an indication of a complexity level of each target platform. At least part of the IT assets of the asset groups are mapped onto respective the target platforms by verifying the characteristics and/or relations of the IT assets of the asset groups, in decreasing order of the affinity level of the corresponding affinity criteria. The IT system is configured by hosting each mapped IT asset on the respective one or more target platform, which aggregates IT assets that have a higher affinity level on target platforms that have a lower complexity level. | 2018-07-26 |
20180212832 | INTERFACING EVENT DETECTORS WITH A NETWORK INTERFACE - Techniques and systems are provided for interfacing one or more event detectors coupled by a common interconnect with a network interface. Interconnect signals indicative of events detected by the one or more event detectors using sensor data are propagated on the common interconnect. A monitor device indirectly or directly couple to the common interconnect monitors the interconnect signals. Information about a first event detector of the one or more event detectors is inferred, in part, from the interconnect signals and transmitted via the network interface. | 2018-07-26 |
20180212833 | METHOD AND FRAMEWORK FOR PROTOCOL TO OPTIMIZE EDGE SIDE DYNAMIC RESPONSE SYSTEM WITH CONTEXT PROPAGATION FOR IOT - The present invention is a method and framework for protocol to optimize edge side dynamic response system with context propagation for IoT. The protocol is a composition of a set of predefined routines, called ‘parlance’, that control the lifecycle of the meshed devices. The master has characteristics to store database as block chains, encryption using hash function, run defined duty cycles. The edge devices have characteristics to receive parlance, execute parlance, provide data to mantles. | 2018-07-26 |
20180212834 | SYSTEMS AND METHODS FOR NETWORK PATTERN MATCHING - Example embodiments of systems and methods for network pattern matching provide the ability to match hidden networks from noisy data sources using probabilistic matching analysis. The algorithms may map roles and patterns to observed entities. The outcome is a set of plausible network models. The pattern-matching methodology of these systems and methods may enable the solution of three challenges associated with social network analysis, namely network size and complexity, uncertain and incomplete data, and dynamic network structure. | 2018-07-26 |
20180212835 | DETERMINING AN APPLICATION DELIVERY SERVER BASED ON GEO-LOCATION INFORMATION - A method for web service load balancing may commence with receiving, from a local DNS server, a request for a web service. The local DNS server may be coupled to a web client requesting the web service. The request may include local DNS server information. The method may continue with determining a geographic location of the local DNS server based on the local DNS server information. The method may further include selecting a web server from a plurality of web servers based on the web service. The method may continue with determining a geographic location of the web server and determining that the geographic location of the local DNS server matches the geographic location of the web server. The method may further include selecting the web server based on the match. The method may continue with sending a response to the local DNS server. | 2018-07-26 |
20180212836 | METHOD FOR EVALUATING PERFORMANCE OF A DATA COMMUNICATION NETWORK - A method for evaluating performance of a data communication network with a receiver node arranged to initiate data transmission thereto from a plurality of transmitter nodes directly connected therewith includes applying to the data communication network a stochastic operation model arranged to model operation characteristics of the receiver node, and determining throughput or power consumption of the network based on the stochastic operation model. The operation characteristics include: a duration of a work cycle of the receiver node (T | 2018-07-26 |
20180212837 | NETWORK RESOURCE ALLOCATION BASED UPON NETWORK SERVICE PROFILE TRAJECTORIES - A method may include a processor of a telecommunication service provider network receiving a training data set including service profile trajectories for subscribers of the network, each including a network service profile of a subscriber over a plurality of time periods, where for a given time period, each network service profile includes indications of whether a subscriber is subscribed to a plurality of network services. The processor may further create a predictive model based upon the training data set to predict whether a subject subscriber will be subscribed to a given network service at a designated future time period, receive a service profile trajectory for the subject subscriber, apply the service profile trajectory to the predictive model to generate a prediction of whether the subject subscriber will be subscribed to the given network service at the designated future time period, and allocate a network resource based upon the prediction. | 2018-07-26 |
20180212838 | Intelligent Optical Network - A link budget analysis dashboard collects and aggregates Layer 1 (Physical Layer) power levels from nodes of optical line systems (OLS) across the span of a backhaul or metro network. In one implementation, this is achieved by a cloud-based centralized network management platform written to poll the physical hardware layer to harvest optical power level data across a link span and subsequently organize, aggregate and present it to network engineer user as a real-time link budget analysis. | 2018-07-26 |
20180212839 | SYSTEM-ON-CHIP (SoC) ASSEMBLY, CONFIGURABLE IP GENERATION AND IP INTEGRATION UTILIZING DISTRIBUTED COMPUTER SYSTEMS - An architecture-specific web-based executable specification tool maintains specification information and metadata for chip and system on a chip (SoC) design. Metadata available in the development ecosystem may be leveraged to improve the specification-to-design process. A unified, integrated environment for subsystem creation, SoC integration, and SoC specification teams is presented using a tool that comprehends SoC constructs. A modern web-based framework (not stand-alone tool) provides collaboration capabilities and allows visual representation and manipulation of data. Connection fabrics (e.g., network on a chip (NoC)) and other project-specific infrastructure can be configured and synthesized on demand and brought in to the design using the common environment. Netlists and other connectivity data can be fed into automated RTL generation processes directly, or used as a reference for implementation design teams. Reports and automated software generation satisfy the needs of the design verification and software teams. Functional and performance testing feedback loops are also provided. | 2018-07-26 |
20180212840 | OUTAGE AVOIDANCE FOR CONNECTED DEVICES - An approach for outage avoidance. The approach receives a scheduled task, wherein the scheduled task is completed at a scheduled time by a device. The approach receives an outage time of a service disruption, wherein the service disruption occurs at the outage time. The approach determines whether the service disruption conflicts with the scheduled task, based on the outage time and the scheduled time. Responsive to a determination that the service disruption conflicts with the scheduled task, the approach modifies the scheduled task to be completed at a modified time, wherein the outage time does not conflict with the modified time. | 2018-07-26 |
20180212841 | OUTAGE AVOIDANCE FOR CONNECTED DEVICES - An approach for outage avoidance. The approach receives a scheduled task, wherein the scheduled task is completed at a scheduled time by a device. The approach receives an outage time of a service disruption, wherein the service disruption occurs at the outage time. The approach determines whether the service disruption conflicts with the scheduled task, based on the outage time and the scheduled time. Responsive to a determination that the service disruption conflicts with the scheduled task, the approach modifies the scheduled task to be completed at a modified time, wherein the outage time does not conflict with the modified time. | 2018-07-26 |
20180212842 | MANAGING DATA CENTER RESOURCES TO ACHIEVE A QUALITY OF SERVICE - In accordance with some embodiments, a cloud service provider may operate a data center in a way that dynamically reallocates resources across nodes within the data center based on both utilization and service level agreements. In other words, the allocation of resources may be adjusted dynamically based on current conditions. The current conditions in the data center may be a function of the nature of all the current workloads. Instead of simply managing the workloads in a way to increase overall execution efficiency, the data center instead may manage the workload to achieve quality of service requirements for particular workloads according to service level agreements. | 2018-07-26 |
20180212843 | CLOUD SYSTEM FOR SUPPORTING BIG DATA PROCESS AND OPERATION METHOD THEREOF - A cloud system for a big data process, and an operation method thereof. A cloud operation method of processing big data includes: receiving a cluster rule; monitoring a cluster resource and a cluster task; adding a cluster resource based on the cluster rule and a cluster resource monitoring value; and replicating a cluster based on a cluster rule and a cluster task monitoring value, wherein the cluster rule may include at least one of a resource assignment threshold value, a resource amount to be assigned, a task threshold value, and a number of replicated clusters. | 2018-07-26 |
20180212844 | MANAGEMENT OF NETWORK CONNECTIONS AND PRIORITIES BASED ON DEVICE PROFILES - Systems and methods for managing network connections and priorities based on device profiles are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the IHS to: receive instrumentation data from a plurality of devices coupled to the IHS via a network; receive observation data from the plurality of devices; correlate the observation data with the instrumentation data; and configure communications between the IHS and one or more the plurality of devices based, at least in part, upon the correlation. | 2018-07-26 |
20180212845 | NETWORK RESOURCE HANDLING - A method of managing network resources across a broadband access network. A slice of the total available network resources is allocated to an application service provider, where the service provider utilises said slice to provide one or more services to a multiplicity of client devices. Traffic is monitored in a transport layer of the broadband access network to determine one or more parameters indicative of traffic flow. Said parameter(s) are passed to the application layer at an application layer end point of the application service. The parameter(s) are used at the application layer to manage traffic specific to the services and achieve efficient use of said slice. | 2018-07-26 |
20180212846 | NETWORK INTERFACE PORT MANAGEMENT - Disclosed aspects relate to network interface port management pertaining to a set of queues of a physical port of a client physical machine. A set of echo packets may be transmitted from the client physical machine to a server physical machine. The set of queues of the physical port of the client physical machine may be monitored with respect to an expected return of the set of echo packets. A triggering event related to the expected return of the set of echo packets may be detected with respect to the set of queues of the physical port of the client physical machine. A wellness indication pertaining to the set of queues of the physical port of the client physical machine may be determined based on a nature of the triggering event. | 2018-07-26 |
20180212847 | NETWORK INTERFACE PORT MANAGEMENT - Disclosed aspects relate to network interface port management pertaining to a set of queues of a physical port of a client physical machine. A set of echo packets may be transmitted from the client physical machine to a server physical machine. The set of queues of the physical port of the client physical machine may be monitored with respect to an expected return of the set of echo packets. A triggering event related to the expected return of the set of echo packets may be detected with respect to the set of queues of the physical port of the client physical machine. A wellness indication pertaining to the set of queues of the physical port of the client physical machine may be determined based on a nature of the triggering event. | 2018-07-26 |
20180212848 | NETWORK INTERFACE PORT MANAGEMENT - Disclosed aspects relate to network interface port management pertaining to a set of queues of a physical port of a client physical machine. A set of echo packets may be transmitted from the client physical machine to a server physical machine. The set of queues of the physical port of the client physical machine may be monitored with respect to an expected return of the set of echo packets. A triggering event related to the expected return of the set of echo packets may be detected with respect to the set of queues of the physical port of the client physical machine. A wellness indication pertaining to the set of queues of the physical port of the client physical machine may be determined based on a nature of the triggering event. | 2018-07-26 |
20180212849 | METHODS, SYSTEMS, AND APPARATUS TO GENERATE INFORMATION TRANSMISSION PERFORMANCE ALERTS - An alert system and method are provided to identify and characterize real-time information transmission anomalies in high-frequency global and local traceroute data. The system includes active network sensors and/or collector devices, which collect traceroute data associated with transmissions to different points in a computer network and provide the traceoute data to a master server. The traceroute data is obtained by the active network sensors by sending probing data packets to numerous computing target devices located locally with respect to the target device and/or globally. The master server determines one or more anomalies from the received traceroute data and characterizes the anomaly in terms of type, severity, location, affected Domain Name System (DNS) server and/or Internet Service Provider (ISP). | 2018-07-26 |
20180212850 | ELECTRONIC TRANSMISSIONS WITH INTERMITTENT NETWORK CONNECTIONS - Embodiments relate to systems and methods for electronically conditioning transmission of communications based on results of a connection assessment. An electronic file is executed at an electronic device, which causes a first query and a second query to be presented. A first query response and a second query response are identified. The first query response is stored in a locked configuration that inhibits the ability to modify the first query response to the first query. The second query response is stored but is not stored in the locked configuration. Query response data is generated that includes an identifier of the second query, an identifier of the second query response and an identifier of the electronic device. A connection variable is determined by assessing one or more network connections available to the electronic device. When a transmission condition is satisfied, the query response data is transmitted to another device. | 2018-07-26 |
20180212851 | METHODS AND APPARATUS FOR TRACKING DATA FLOW BASED ON FLOW STATE VALUES - In one embodiment, a processor-readable medium storing code representing instructions that when executed by a processor cause the processor to update, at a memory location, a first flow state value associated with a data flow to a second flow state value when at least one of a packet from the data flow is received or the memory location is selected after a time period has expired. At least a portion of the packet is analyzed when the second flow state value represents a flow rate of a network data flow anomaly. | 2018-07-26 |
20180212852 | INTERFACE LAYER FOR DIAGNOSTIC SUPPORT OF NETWORK-ACCESSIBLE DEVICES - Techniques are disclosed relating to diagnosing a network-accessible device. A first computer may store authorization information associated with a plurality of network-accessible computing devices associated with a user. The first computer system may receive, from a second computer system, a request from the user to perform a diagnostic operation that involves communication between a third computer system and a particular one of the plurality of network-accessible computing devices. The first computer system may request, based on a permission indicated by the stored authorization information, that the third computer system retrieve diagnostic information from the particular network-accessible computing device and perform the diagnostic operation. The first computer system may receive, from the third computer system, result information relating to the diagnostic operation. | 2018-07-26 |
20180212853 | GATEWAY FOR DISTRIBUTED CONTROL NETWORK - A gateway configured to control and monitor a plurality of control elements (CE is provided that comprises application programming interface (API) for communicating with applications over the internet; libraries of CE's messages; and at least one interpreter utilized for translating the messages into an API protocol and vice versa. | 2018-07-26 |
20180212854 | MODIFYING AN ACTIVITY STREAM TO DISPLAY RECENT EVENTS OF A RESOURCE - Modifying an activity stream to display recent events of a resource includes checking-in a user to a resource to provide context about the resource, specifying a time duration for which the user is checked-in to the resource, and modifying, based on the time duration, an activity stream of the user to display recent events of the resource. | 2018-07-26 |
20180212855 | Low-Impact Proactive Monitoring of Customer Access to Virtualized Network Elements in a Cloud Platform - A system can collect, from an address resolution protocol (“ARP”) cache of a managed virtual network function (“VNF”), at least one active entry corresponding to at least one active element of a plurality of virtual local area network (“VLAN”) networks. The system can check the ARP cache for an entry associated with at least one of the plurality of VLAN elements. The system can determine whether an entry associated with at least one of the plurality of VLAN elements was found. In response to determining that an entry associated with at least one of the plurality of VLAN elements was not found, the system can send an ARP request to the plurality of VLAN elements, wait for an ARP response, and, in response to determining that an ARP response has not been received, generate a notification that VLAN connectivity has been lost. | 2018-07-26 |
20180212856 | RECEPTION DEVICE AND CLOCK GENERATING METHOD - An object of the present invention is to generate a clock also before reception of a packet in a reception device. A reception device has: a storage unit storing a true time-stamp included in a received packet including audio data and the true time-stamp expressing reproduction time of the audio data; a timer counting time; a dummy time-stamp generation unit generating a dummy time-stamp as a false time-stamp; a comparator comparing time based on the true time-stamp stored in the storage unit or the dummy time-stamp and time indicated by the timer; and a clock generation unit generating a clock in accordance with a comparison result of the comparator. The comparator performs comparison using the dummy time-stamp until a predetermined condition is satisfied and, after the predetermined condition is satisfied, performs comparison using the true time-stamp. | 2018-07-26 |
20180212857 | PROACTIVE CHANNEL AGENT - Automated devices send messages of a first batch sequence individually to a target queue of a receiving node of a cluster of server nodes, the messages having a different sequence number indicative of their relative positions within the batch sequence, and each is associated with a first logic unit of work identifier. In response to determining that a message counter meets a threshold, a force commit packet is generated to include the sequence number of the last batch message sent to the target queue. If the force commit packet sequence number is not the last position number within the batch sequence, a second logic unit of work identifier is associated with a subset sequence of the batch of messages having sequence numbers spanning from the first number to the force commit packet sequence number, and the subset sequence messages are committed to the receiving node target queue. | 2018-07-26 |
20180212858 | Systems and Methods for Selection Between Multiple Redundant Data Streams - The disclosure includes systems and methods for the analysis, comparison, and selection between multiple redundant data streams. The data streams may be analyzed, compared, and/or selected based on the individual number of consecutive data frame losses in a data stream, the number of channel noise errors over a time period in a data stream, the clock synchronization values associated with a data stream, the traversal time of a data stream, and/or a MAC address associated with a data stream. | 2018-07-26 |
20180212859 | SYSTEMS AND METHODS FOR REGULATING NETWORK RESOURCES TO IMPROVE DATA-TRANSMISSION QUALITY - Systems and methods are provided for regulating network resources to improve data-transmission quality. In one implementation, a method includes searching one or more computer-readable memory locations for prior-session data that matches current-session data. The prior-session data may comprise information describing a prior data-transmission session and the current-session data may comprise information describing a current data-transmission session. Data describing a cause of transmission degradation may be stored in association with the prior data-transmission session. The method may also include identifying, by at least one processor, the cause of transmission degradation in the prior data-transmission session as being a cause of transmission degradation in the current data-transmission session if the prior-session data matches the current-session data. The method may also include initiating correction of the cause of transmission degradation based on the identification. | 2018-07-26 |
20180212860 | AUTOMATICALLY DETECTING POTENTIAL MICROLOOP CONDITIONS ASSOCIATED WITH NETWORK CONVERGENCE - The disclosed embodiments provide a system that automatically detects a potential microloop condition associated with network convergence. During operation, the system obtains a topology for a network containing a set of nodes connected by a set of links. Next, the system uses the topology to detect a ring containing at least four hops in the network. The system then outputs an indication of a potential microloop condition associated with one or more nodes on the ring to improve improve routing of network traffic by the one or more nodes. | 2018-07-26 |
20180212861 | DISTRIBUTING NETWORK PATH INFORMATION IN A NETWORK ENVIRONMENT - Methods for distributing multicast network path information to various network nodes in a network environment are disclosed. An exemplary method includes a downstream node transmitting a first message including a network path indicating a specific desired route that is to be used when delivering multicast traffic from a given multicast source to a given host, as well as an identifier assigned to the network path in order to uniquely identify that network path in the network. The method also includes the downstream node transmitting a second message for announcing that the multicast source is to be reached via the network path announced in the first message. The second message identifies the network path to be used by including the identifier of the path announced in the first message, but not the network path itself. | 2018-07-26 |
20180212862 | POPULATING FORWARDING DATABASE TABLES IN A FABRIC ENVIRONMENT - Each switch in a network maintains a forwarding database table in which each record identifies a media access control (MAC) address, a port identifier, and a source identifier. A frame is received from a first network device at a first port of a first switch, wherein the frame includes a MAC address of the first network device. The first switch prepares a synchronization packet including the MAC address, a port identifier identifying the first port, a source identifier identifying the first switch and an instruction, in response to determining that the MAC address is not associated with the first switch in the first forwarding database table. The synchronization packet is sent to each other switch, and the forwarding database tables of the other switches are modified to implement the instruction. | 2018-07-26 |
20180212863 | ISLAND TOPOLOGIES AND ROUTING IN HYBRID MESH NETWORKS - A wireless network device may receive, over an interface, a broadcasted hello message that indicates network topology and interface information of neighbor nodes in a network. The wireless network device may transmit an announce message to unblocked hello peers of the wireless network device. The wireless network device may receive, on a wired interface from another node, a hello message. The wireless network device and the another node may each be identified as island heads based on the received hello message. The wired interface may be utilized for connecting the island heads. | 2018-07-26 |
20180212864 | METHOD AND APPARAUS FOR OVERLAP-RESISTANT DYNAMIC ROUTING - A disclosure of the present invention is related to a method and an apparatus for overlap-resistant dynamic routing to prevent a path from overlapping. A method of performing an overlap-resistant routing according to an embodiment of the present disclosure includes: computing p candidate paths (p is an integer more than 2) from a first host to a second host based on information related to a network structure; computing k paths (k is an integer more than 1, k≤P) with low redundancy from the p candidate paths; and setting one path from the k paths according to a path change timing. | 2018-07-26 |
20180212865 | Mechanism and Framework for Finding Optimal Multicast Tree Roots Without the Knowledge of Traffic Sources and Receivers for Fabricpath and TRILL - The proposed methodology enables finding the most efficient roots in the network to carry multicast traffic, while further providing a theoretical basis for such selection. It guarantees the minimum expected delivery cost for multicast frames in the absence of any knowledge about the source and receivers. | 2018-07-26 |
20180212866 | NETWORK LEVEL PROTECTION ROUTE EVALUATION SYSTEMS AND METHODS - A method of network level protection route evaluation and remediation in a network includes defining thresholds for one or more services, wherein the thresholds define how many expected alternate protection routes are available for the one or more services for network level restoration; periodically evaluating a number of available alternate protection routes for the one or more services; notifying a network operator responsive to the number of available alternate protection routes being below the thresholds; and performing one or more remedial actions in the network based on the notifying. | 2018-07-26 |
20180212867 | Message Distribution System and Method for Providing Local Traffic Messages - The disclosure relates to a message distribution system configured to provide traffic messages received by at least one base station of a telecommunications network to at least one traffic control system capable of controlling traffic infrastructure. The message distribution system comprises a detection module and a routing module. The detection module is configured to detect traffic messages from user devices in a radio coverage area of the at least one base station. The routing module is configured to access association information associating at least one routing address of the at least one traffic control system with the radio coverage area of the at least one base station and to route the detected traffic messages to the at least one routing address associated with the radio coverage area of the at least one base station receiving the traffic messages from the user devices. | 2018-07-26 |
20180212868 | ROUTING DEVICE WITH INDEPENDENT SERVICE SUBSYSTEM - Various systems and methods for providing network services are described herein. In one example, a method includes receiving, via a first processor, a network packet from a source device. The method can also include sending, via the first processor, the network packet to a second processor if a service subsystem and a service are responsive. Furthermore, the method can include modifying, via the second processor, the network packet or generating a new packet based on the service. The method can also include receiving, via the first processor, the modified network packet or the new network packet from the second processor. The method can also further include sending, via the first processor, the modified network packet or the new network packet to a destination device. | 2018-07-26 |
20180212869 | NETWORK INTERFACE CARD, COMPUTING DEVICE, AND DATA PACKET PROCESSING METHOD - The present disclosure discloses a data packet processing method applied to a computing device in software-defined networking. After receiving a data packet of a data flow, a NIC queries a flow table set according to matching information of the data packet; and if a flow table is obtained from the flow table set the NIC processes the data packet according to the flow table; or if no flow table can be obtained from the flow table set, the NIC sends the data packet to a virtual switch to obtain a flow table corresponding to the data flow, and saves the flow table into the flow table set, so that the NIC can process a subsequent data packet of the data flow. An operating load of the virtual switch is reduced, and operating efficiency of the computing device is improved. | 2018-07-26 |
20180212870 | NETWORK PROPERTY VERIFICATION - A method of network property verification may include obtaining one or more properties of a network to verify, and obtaining first forwarding rules for a first network device in the network, where the first forwarding rules are indicative of how the first network device handles an incoming packet with a variable-length packet header. The method may also include obtaining second forwarding rules for a second network device in the network, the second forwarding rules indicative of how the second network device handles the incoming packet, and generating a pushdown automata based on the first and the second forwarding rules. The method may additionally include applying a saturation-based algorithm to the pushdown automata to verify the one or more properties of the network. | 2018-07-26 |
20180212871 | SOURCE IMPOSITION OF NETWORK ROUTES IN COMPUTING NETWORKS - Various techniques for source imposition of network routes are disclosed herein. In one embodiment, a method includes receiving label values at a source host from a label server. The individual label values corresponding to a network route to one of the hosts or network nodes in the computing network. The method also includes constructing a label stack to reach a destination virtual machine on a destination computing device in the computing network based on the received label values corresponding to the destination computing device and a location of the source computing device in the computing network. The method also includes imposing the constructed label stack on a packet destined to the destination virtual machine on the destination computing device. | 2018-07-26 |
20180212872 | PACKET PROCESSING METHOD, DEVICE, AND SYSTEM - The present disclosure discloses a packet processing method, device, and system. The system includes: a controller, configured to: allocate a service label to a service processing manner of an FEC, establish a mapping relationship between the service label and the service processing manner, send the service label to a source node, and send the mapping relationship to a destination node; the source node, configured to: receive the service label sent by the controller, receive a first packet, insert the service label to the first packet to obtain a second packet, and send the second packet to the destination node; the destination node, configured to: receive the mapping relationship sent by the controller, receive the second packet sent by the source node, and pop the service label from the second packet according to the mapping relationship, to obtain the first packet. | 2018-07-26 |
20180212873 | ROUTING MESSAGES BETWEEN VIRTUAL NETWORKS - Routing messages between virtual networks using a mapping of virtual addresses from one virtual network to a virtual address of the other virtual network. Each virtual network has a valid set of virtual addresses, some of which being assigned to virtual nodes within the corresponding network. When a virtual network identifies a message to be sent, it identifies a destination for the message. Some destinations may be within the same virtual network and thus may be routed to virtual nodes within the virtual network. Other destinations may instead be mapped to a virtual address of another virtual network. In that case, routing information may also be obtained and the message may be dispatched to the virtual address of the other virtual network. This may be performed without the need for a gateway, which publishes a public address that is globally unique. | 2018-07-26 |
20180212874 | REDIRECTING NETWORK TRAFFIC BASED ON CONTENT - A rule indicates that data having particular characteristics be automatically routed to a particular destination. When software on a switching device detects a new data stream, it is analyzed to determine whether it has characteristics specified by the rule. If it does, the packet is encapsulated with a special tag, indicating that the packet should be routed to the new destination. Also, an entry is added to a quick-lookup table in the switching device. The entry indicates that future packets in the data stream that have the same source and destination port and address should also be routed to the new destination. | 2018-07-26 |
20180212875 | DATA PACKET FORWARDING METHOD, NETWORK ADAPTER, HOST DEVICE, AND COMPUTER SYSTEM - A data packet forwarding method, a network adapter and a host device. The method is applied to a network adapter, the network adapter is connected to a host device, the host device includes a first VM, the first VM includes N vNICs, and the network adapter includes a first VF allocated to the first VM, where N is an integer greater than 1. The method includes: receiving mapping relationship information sent by the host device, where the mapping relationship information is used to indicate a one-to-one mapping relationship between N queue pairs among queues configured for the first VF and the N vNICs, and each of the N queue pairs is used to forward a data packet of a vNIC corresponding to each queue pair; recording the mapping relationship information in a forwarding information table; and forwarding data packets of the N vNICs according to the mapping relationship information. | 2018-07-26 |
20180212876 | DYNAMIC AND COMPRESSED TRIE FOR USE IN ROUTE LOOKUP - In one embodiment, a method includes receiving a request to add a prefix to memory for a route lookup at a forwarding device, the memory comprising a plurality of pivot tiles for storing pivot entries, each of the pivot entries comprising a plurality of prefixes and a pointer to a trie index, searching at the forwarding device, a dynamic pool of the pivot tiles based on a base-width associated with the prefix, allocating at least a portion of the pivot tile to the base-width and creating a pivot entry for the prefix and other prefixes with a corresponding base-width, and dynamically updating prefixes stored on the pivot tiles based on route changes to optimize storage of prefixes on the pivot tiles. An apparatus and logic are also disclosed herein. | 2018-07-26 |
20180212877 | COMBINING PREFIX LENGTHS INTO A HASH TABLE - Examples herein disclose a smaller prefix length and a greater prefix length which are identified from a routing table of various prefix lengths. The smaller prefix length is converted into the greater prefix length. The converted prefix length and the greater prefix length are combined into a hash table. | 2018-07-26 |
20180212878 | USING A SINGLE CACHE TABLE - In an example implementation, a method is provided. The method includes receiving at a switch a packet having a tuple, wherein the tuple comprises a plurality of fields, wherein the switch operates using a protocol that compares each one of the plurality of fields to a table of a plurality of tables in series. The switch compares the plurality of fields of the tuple to a single cache table instead of the plurality of tables in series. When a match is found, a plurality of actions associated with the plurality of fields of the tuple is accumulated. The plurality of actions is applied to the packet. | 2018-07-26 |
20180212879 | Efficient Intercept Of Connection-Based Transport Layer Connections - A TCP connection is established between a client and a server, such that packets communicated across the TCP connection pass through a proxy. Based at least in part on a result of monitoring packets flowing across the TCP connection, the proxy determines whether to split the TCP control loop into two TCP control loops so that packets can be inspected more thoroughly. If the TCP control loop is split, then a first TCP control loop manages flow between the client the proxy and a second TCP control loop manages flow between the proxy and the server. Due to the two control loops, packets can be held on the proxy long enough to be analyzed. In some circumstances, a decision is then made to stop inspecting. The two TCP control loops are merged into a single TCP control loop, and thereafter the proxy passes packets of the TCP connection through unmodified. | 2018-07-26 |
20180212880 | MANAGING NETWORK COMPUTING COMPONENTS UTILIZING REQUEST ROUTING - Aspects of the disclosure will be described with regard to the processing of a client computing device DNS queries by a DNS processing service to determine an identifier associated with a previously instantiated hosted virtual machine instance. In one aspect, if the previously instantiated hosted virtual machine instance is instantiated, the DNS service can resolve the DNS query by transmitting network address information associated with the previously instantiated hosted virtual machine instance. In another aspect, if the previously instantiated hosted virtual machine instance is not instantiated, the DNS service can initiate a process to cause an instantiation of a hosted virtual machine instance based on the previously instantiated hosted virtual machine instance. The DNS service can then resolve the DNS query by transmitting network address information, or an alternative identifier, associated with the newly instantiated hosted virtual machine instance. | 2018-07-26 |
20180212881 | LOAD-BASED COMPRESSION OF FORWARDING TABLES IN NETWORK DEVICES - The disclosed embodiments provide a system that performs load-based compression of a forwarding table for a node in a network. During operation, the system obtains link utilizations for a set of physical links connected to the node. Next, the system uses the link utilizations to update a set of entries in a forwarding table of the node for use in balancing load across the set of physical links. The system then uses the set of entries to process network traffic at the node. | 2018-07-26 |
20180212882 | Bandwidth Management of Multicast Adaptive Bitrate (MABR) Data Streams in an IPTV-over-DOCSIS System - A Multicast Adaptive Bitrate (MABR) Bandwidth Control Agent (BCA) configured to manage bandwidth of a plurality of MABR data streams in an Internet Protocol Television (IPTV) over Data Over Cable Service Interface Specification (DOCSIS) system, wherein a bandwidth bottleneck exists on either an inbound, IP-network side of a Cable Modem Termination System (CMTS) or on an outbound, DOCSIS/RF-network side of the CMTS. The MABR BCA configures multiple virtual pipes on the inbound, IP-network side of the CMTS when the bottleneck is on the outbound, DOCSIS/RF-network side of the CMTS. One virtual pipe is configured for each service group to manage the bandwidth per service group for output RF ports on the CMTS. When the bottleneck is on the inbound, IP-network side of the CMTS, the MABR BCA configures one virtual pipe on the inbound, IP-network side to manage the bandwidth for input Ethernet ports on the CMTS. | 2018-07-26 |
20180212883 | DATA TRANSMISSION METHOD AND COMMUNICATIONS APPARATUS - Embodiments of the present application provide a data transmission method and a communications apparatus. A Hypertext Transfer Protocol version 2 HTTP/2 adaptation layer is configured between an application layer and a Multipath Transmission Control Protocol MPTCP layer of a protocol stack. All frames belonging to a same HTTP/2 stream are allocated to a same MPTCP subflow for transmission, so that a data throughput is large, and system robustness is good, thereby improving HTTP/2 stream transmission performance. | 2018-07-26 |
20180212884 | PROBABILISTIC METERING - A service provider or operator of a network often requires the ability to control the amount of data that flows can send and/or receive over a network such that a flow receives at least a predetermined, minimum amount of upstream and/or downstream bandwidth and can potentially utilize excess upstream and/or downstream bandwidth above the minimum amount when available. The present disclosure provides a method and apparatus for implementing a control scheme capable of achieving these and other objectives in a network. In general, the method and apparatus probabilistically meter packets to be sent upstream and/or downstream to determine whether they are in conformance with a service agreement (and at what level of conformance). By using probabilistic metering, smaller width counters can be used to perform the metering over conventional implementations, which reduces power demands and chip space demands. | 2018-07-26 |
20180212885 | DEVICE AND METHOD FOR SCALABLE TRAFFIC SHAPING AT A RECEIVER WITH A TIME-INDEXED DATA STRUCTURE - Systems and methods of performing rate limiting with a time-indexed data structure in a network device are provided. A transport protocol module of the network device can receive data packets from a remote computing device. The transport protocol module can generate a packet acknowledgement message which is received by the network interface driver. The network interface driver can process the received packet acknowledgement message to determine a transmission time for the packet acknowledgement message based on at least on rate limit policy. The network interface driver can store an identifier associated with the packet acknowledgement message in a time-indexed data structure. The network interface driver can determine that a time indexed in the time-indexed data structure has been reached and in response transmit a packet acknowledgement message associated with the identifier stored in the time-indexed data structure at a position associated with the reached time. | 2018-07-26 |
20180212886 | DEVICE AND METHOD FOR SCALABLE TRAFFIC SHAPING WITH A TIME-INDEXED DATA STRUCTURE - Systems and methods of performing rate limiting traffic shaping with a time-indexed data structure in a network device are provided. A network interface driver of the network device can received packets at the packet layer of a network host from a plurality of applications. The network interface driver can prevent one of the applications from sending additional packets for transmission until the application received a transmission completion notification indicating a packet previously forwarded to the packet layer of the network host has been transmitted. The network interface driver can process the received packets to determine a transmission time for each packet based on at least on rate limit policy. The network interface driver can store an identifier associated with the respective packet in a time-indexed data structure at a position associated with the transmission time determined for the packet. The network interface driver can determine that a time indexed in the time-indexed data structure has been reached and in response transmit a packet associated with the identifier stored in the time-indexed data structure at a position associated with the reached time. The network interface driver can communicate a transmission completion notification subsequent to the network interface driver transmitting the packet. | 2018-07-26 |
20180212887 | METHOD AND APPARATUS FOR CONTROLLING MEDIA DELIVERY IN MULTIMEDIA TRANSPORT NETWORK - A method and an apparatus for controlling media delivery in a multimedia transport network. The method includes transmitting composition information (CI) on media assets within a media package to be transmitted, to a user equipment (UE), packetizing the media assets of the media package to packets, transmitting some of the packets to the UE, receiving a feedback message including information on an available bitrate determined by the UE from the UE while the some of the packets are transmitted, selecting media data, which can be transmitted according to the available bitrate, from the media package by using asset delivery characteristics (ADCs) of the media assets within the media package, and packetizing the selected media data to packets and transmitting the packets to the UE. | 2018-07-26 |
20180212888 | SIGNALING FOR TRANSMISSION OF COHERENT DATA FLOW WITHIN PACKET-SWITCHED NETWORK - This invention relates to a node of packet-switched network having input interfaces and at least one output interfaces, and a forwarding layer adapted to detect that a received datagram belongs to a coherent flow and to forward it to the appropriate output interface for emission during a reserved time interval, and further adapted to detect a reservation conflict concerning the emission of said datagram on said output interface and, when a reservation conflict is detected, to send a signaling message containing time information for modifying reception dates of subsequent datagrams of said coherent flow. | 2018-07-26 |
20180212889 | MULTI-CORE LOCK-FREE RATE LIMITING APPARATUS AND METHOD - An apparatus, such as a network element, comprises a receiver to receive a plurality of packets. A memory stores instructions and forms a first and second set of virtual queues to store the plurality of packets. A processor having one or more cores with one or more packet classifiers provides a classification of a packet in the plurality of packets. The processor in communication with the memory executes instructions to transfer the packet from the receiver to a virtual queue in the first set of virtual queues based on the classification. The processor also transfers the packet from the virtual queue to a transmitter based on a demand rate value and supply rate value associated with the virtual queue. | 2018-07-26 |
20180212890 | OPTIMIZING VALUE OF CONTENT ITEMS DELIVERED FOR A CONTENT PROVIDER - An online system receives content items from content providers and delivers the content items to client devices of users. The online system receives a weight associated with an item described in the content item. The online system determines a rate at which a content item is delivered to users based on the received weight associated with the item and a rate at which users interact with the content item. The online system delivers the content item to users at the rate determined based on the received weight and the rate at which users interact with the content item. The online system may periodically adjust the rate of delivery of the content item based on the rate at which users interact with the content item. | 2018-07-26 |
20180212891 | PACKET PROCESSING METHOD AND SYSTEM, AND NETWORK DEVICE - A packet processing method includes: receiving, by a first network device, a packet, where the packet includes match object information and match condition information; determining, by the first network device, a to-be-matched network device among one or more network devices according to the match object information, determining, by the first network device, whether device information of the of the to-be-matched network device matches with the match condition information; and performing, by the first network device, forwarding processing or discarding processing on the packet according to a result of the determination. | 2018-07-26 |
20180212892 | METHOD, APPARATUS AND SYSTEM FOR CONTROLLING SERVICE TRANSMISSION RATE - The present disclosure discloses a method, an apparatus and a system for controlling a service transmission rate. The method includes acquiring service transmission rate information reported by service gateways in a service gateway group in a distributed environment, the service gateways being gateways that transmit service data in parallel to an identical destination address and limit a transmission rate of service data based on respective flow limiting thresholds; adjusting a flow limiting threshold allocated to each service gateway to a specified value to obtain a specified threshold when a service transmission rate indicated by the service transmission rate information is greater than a flow limiting threshold corresponding to the service gateway, the specified values satisfying that a sum of the specified values on the service gateways is not greater than a bandwidth allocated by an operator to the destination address; and sending the specified thresholds to the service gateways. The present disclosure solves a technical problem that there is no technical solution effectively ensuring that a total traffic of flows limited in parallel satisfies an expected threshold after the flows pass through multiple service gateways in a distributed environment. | 2018-07-26 |
20180212893 | Processing Real-Time Multipoint-to-Point Traffic - Each of N sets of memory space bins are associated with a different processing deadline (N is an integer greater than two or one). Messages are received from multiple distinct sources (for example, received at a base station or network interface card from multi-points of a communication system) are stored in one of the memory space bins of the set whose processing deadline corresponds to a transmit deadline of the respective message. In response to a triggering condition for a respective set being satisfied, all the messages stored in any of the bins of the respective set are processed for transmission and the messages that were processed are cleared from their respective bins. In specific embodiments, the triggering condition is expiry of a timer offset ahead of the set's processing deadline, and each set's bin has a different priority and the processing is done in priority order. | 2018-07-26 |
20180212894 | FORK TRANSFER OF DATA BETWEEN MULTIPLE AGENTS WITHIN A RECONFIGURABLE FABRIC - Techniques are disclosed for managing data within a reconfigurable computing environment. In a multiple processing element environment, such as a mesh network, or other suitable topology, there is a need to pass data between processing elements. In many instances when multiple processing elements are working together to perform a given task, it is desirable to improve parallelism where possible to decrease overall execution time. An upstream processing element performs a fork operation to provide data to multiple downstream processing elements. The processing elements within the reconfigurable fabric are controlled by circular buffers. The circular buffers are statically scheduled. The fork operation provides for computation to be divided amongst multiple processing elements. An efficient forking mechanism is a key component in achieving optimal performance of a multiple processing element system. | 2018-07-26 |
20180212895 | Mapping of Service Requirements for a Virtualized Network on a Packet Flow - Certain embodiments relate to a method for assigning, by a resource orchestration entity, resources for a service carried out on a data packet flow in a multilayer network, the method comprising determining software requirements and network requirements necessary for the service wherein the software requirements and network requirements are received by the network resource orchestration entity from an upper layer through a northbound interface; determining a virtual network topology of the network with at least one virtual network entity, the virtual network entity comprising entity computing resources and entity network resources; and assigning the software requirements and the network requirements at least partially to the entity computing resources and the entity network resources. | 2018-07-26 |
20180212896 | DISTRIBUTED HYBRID CLOUD ORCHESTRATION MODEL - Aspects of the instant disclosure relate to methods for facilitating intercloud resource migration. In some embodiments, a method of the subject technology can include steps for instantiating a first intercloud fabric provider platform (ICFPP) at a first cloud datacenter, instantiating a second ICFPP at a second cloud datacenter, and receiving a migration request at the first ICFPP, the migration request including a request to migrate a virtual machine (VM) workload from the first cloud datacenter to the second cloud datacenter. In some aspects, the method may further include steps for initiating, by the first ICFPP, a migration of the VM workload via the second ICFPP in response to the migration request. Systems and machine readable media are also provided. | 2018-07-26 |
20180212897 | STATION-SIDE APPARATUS IN OPTICAL TRANSMISSION SYSTEM AND OPTICAL TRANSMISSION SYSTEM - An upstream allocation circuit ( | 2018-07-26 |
20180212898 | CUSTOM RESOURCES IN A RESOURCE STACK - A resource stack managed by a resource stack provider is created based on a resource stack template that integrates a custom resource from a second provider into the resource stack using a notification system with the second provider. For example, a customer may create a template that defines a resource stack that comprises resources available from the resource stack provider and one or more custom resources provided by a second provider. When a resource stack is created, resources available from the resource stack provider may be provisioned. Custom resources may be initialized by notifying the provider of the custom resource of the requested integration of the custom resource with the resource stack and requested configuration details. The custom resource provider may respond with an indication of successful integration when the custom resource has been successfully initialized. After initializing the resources, the resource stack may be enabled for use. | 2018-07-26 |
20180212899 | FAST SCHEDULING AND OPTMIZATION OF MULTI-STAGE HIERARCHICAL NETWORKS - Significantly optimized multi-stage networks with scheduling methods for faster scheduling of connections, useful in wide target applications, with VLSI layouts using only horizontal and vertical links to route large scale sub-integrated circuit blocks having inlet and outlet links, and laid out in an integrated circuit device in a two-dimensional grid arrangement of blocks are presented. The optimized multi-stage networks in each block employ several slices of rings of stages of switches with inlet and outlet links of sub-integrated circuit blocks connecting to rings from either left-hand side only, or from right-hand side only, or from both left-hand side and right-hand side; and employ multi-drop links where outlet links of cross links from switches in a stage of a ring in one sub-integrated circuit block are connected to either inlet links of switches in the another stage of a ring in the same or another sub-integrated circuit block | 2018-07-26 |
20180212900 | ROUTING MANAGEMENT - In an example, a method of routing management is provided, wherein the method applied in device for forwarding packet, which includes a main control board, fabric boards and line cards. The main control board may transmit routing entries to one or multiple fabric boards in the device according to a preset entry distribution strategy, transmit routing distribution information for indicating correspondence between each fabric board and a packet character of the routing entries stored in the fabric board to each of the line cards, so that the line card transmits a packet matching the packet character to a corresponding fabric board to be forwarded, according to the routing distribution information. | 2018-07-26 |
20180212901 | LINK-FAULT TOLERANCE IN A DISTRIBUTED ANTENNA SYSTEM - Certain features relate to improving the link-fault tolerance in a distributed antenna system (DAS) by utilizing a series of synchronous communication frames. A receiving remote unit or a head-end unit in the DAS can predict the start of incoming communication frames based on frame information extracted from previously received communication frames. For example, a remote unit can be configured to receive one or more communication frames, each of the one or more communication frames including a start-of-frame field. After a period of time corresponding to the frame repetition rate, the remote unit can search for an additional start-of-frame field, indicating the receipt of the next communication frame. The remote unit can extract the payload data from the next communication frame based on the predicted value for the additional start-of-frame field. | 2018-07-26 |
20180212902 | COALESCING MESSAGES USING A NETWORK INTERFACE CONTROLLER - An injection descriptor corresponding to a destination node may be stored in memory. A network interface controller (NIC) may determine that one or more messages added to the injection descriptor are to be transmitted to the destination node. The NIC may then lock the injection descriptor so that no additional message can be added to the injection descriptor, and the NIC may load the one or more messages. The NIC may then generate a network packet that includes the one or more messages, and the NIC may transmit the network packet to the destination node. | 2018-07-26 |
20180212903 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR ASSOCIATING AN IDENTIFIER WITH ONE OR MORE MESSAGE COMMUNICATIONS WITHIN A GROUP-BASED COMMUNICATION SYSTEM - Embodiments of the present disclosure relate to a group-based communication server for associating an identifier with one or more message communications within a group-based communication system. In some embodiments, the group-based communication server comprises at least one processor and at least one memory including computer program code. | 2018-07-26 |