31st week of 2019 patent applcation highlights part 76 |
Patent application number | Title | Published |
20190238362 | IN-DATAGRAM CRITICAL-SIGNALING USING PULSE-COUNT-MODULATION FOR I3C BUS - Systems, methods, and apparatus are described that enable a device to indicate availability of priority data to be communicated over a half-duplex serial bus without waiting for an ongoing transmission to be completed. In-datagram critical signaling is accommodated without breaking backward compatibility. A method implemented at a transmitting device coupled to a serial bus includes transmitting a data byte over a first line of the serial bus to a receiving device in accordance with a clock signal transmitted by a master device on a second line of the serial device, detecting a first pulse on the first line of the serial bus during a cycle of the clock signal designated for an acknowledgement or negative acknowledgement by the second device, and processing an alert indicated by the first pulse. | 2019-08-01 |
20190238363 | SPECIFYING AND UTILIZING PATHS THROUGH A NETWORK - For a multi-tenant environment, some embodiments of the invention provide a novel method for (1) embedding a specific path for a tenant's data message flow through a network in tunnel headers encapsulating the data message flow, and then (2) using the embedded path information to direct the data message flow through the network. In some embodiments, the method selects the specific path from two or more viable such paths through the network for the data message flow. | 2019-08-01 |
20190238364 | SPECIFYING AND UTILIZING PATHS THROUGH A NETWORK - For a multi-tenant environment, some embodiments of the invention provide a novel method for (1) embedding a specific path for a tenant's data message flow through a network in tunnel headers encapsulating the data message flow, and then (2) using the embedded path information to direct the data message flow through the network. In some embodiments, the method selects the specific path from two or more viable such paths through the network for the data message flow. | 2019-08-01 |
20190238365 | VLAN TO VXLAN TRANSLATION USING VLAN-AWARE VIRTUAL MACHINES - In one example, a virtual local area network (VLAN) tagged packet may be received from a first virtual machine (VM) running on a first host via a port group that spans across hosts by a first virtual bridge of a first VLAN-aware VM. The first VLAN-aware VM may run on the first host. The VLAN tagged packet from the first VM may be translated to a virtual extensible local area network (VXLAN) encapsulated packet by the first virtual bridge based on a network property of a VM port of the first VM. The VXLAN encapsulated packet may be transmitted to a second VM running on a second host by the first virtual bridge via a VXLAN tunnel endpoint (VTEP) provided by the first VLAN-aware VM. | 2019-08-01 |
20190238366 | MONITORING DATA LINK HEALTH USING CONNECTIONLESS LOOPS OVER REDUNDANT IP NETWORKS - Devices, methods, systems, and computer-readable media for using connectionless loops for monitoring data link health using connectionless loops over redundant Internet Protocol (IP) networks are described herein. One system includes an IP network device connected to a device used by a party to communicate with another party through an IP network, a first network device operating a first network and referring to the IP network device with a first identifier, a second network device operating a second network and referring to the IP network device with a second identifier, an intermediary device allowing communication between the first and second networks, and instructions to create a connectionless packet, send the packet through the first network addressed to the second identifier, such that the packet is routed from the first network to the intermediary device and into the second network based on the second identifier, and receive the packet. | 2019-08-01 |
20190238367 | REFERENCE SIGNAL TRANSMISSION TECHNIQUES FOR NON-ORTHOGONAL MULTIPLE ACCESS WIRELESS COMMUNICATIONS - Methods, systems, and devices for wireless communications are described that provide for concurrent reference signal transmissions using common resources, such as demodulation reference signal (DMRS) transmissions, from a number of non-orthogonal multiple access (NOMA) transmitters. Different transmitters may use different sequences for reference signal transmissions, which may allow a receiver, such as a wireless base station, to decode the reference signal transmissions for each NOMA transmitter and perform channel estimation for each NOMA transmitter. The reference signal transmissions may be asynchronous with a bounded timing offset or quasi-synchronous, and the reference signal sequence selection may provide for relatively reliable channel estimation and coherent demodulation. | 2019-08-01 |
20190238368 | COMPUTING TRANSMIT AND RECEIVE FILTERS FOR A NETWORK DEVICE - The embodiments herein use a factorization based technique for determining filter coefficients for a subset of the subcarriers in a wireless frequency band. Once the filter coefficients for the subset of the subcarriers are calculated, the network device uses these filter coefficients to identify the filter coefficients in a neighboring subcarrier. To do so, the network device uses pseudo-inverse iteration to convert the already calculated filter coefficients into filter coefficients for a neighboring subcarrier. The network device can repeat this process for the next set of neighboring subcarriers until all the filter coefficients have been calculated. | 2019-08-01 |
20190238369 | UART-BASED COMMUNICATION-SPEED AUTOMATIC-SWITCHING METHOD - Disclosed is a method for variably changing a communication speed by a first device when a high-speed communication request within a range supported by the first device is input from a second device during low-speed communication of the first device with a third device in the UART communication and performing data communication with the second device at the varied high speed. A method for switching, by a device, a communication speed in an universal asynchronous receiver-transmitter (UART)-based data communication includes: measuring, by an interrupt detection module of the device, a pulse width of a start bit using an interrupt signal; calculating, by a communication speed calculation module of the device, a communication speed using a time duration for which the measured pulse width is maintained; and switching, by a communication speed switching module of the device, a current communication speed of the device to the calculated communication speed. | 2019-08-01 |
20190238370 | COMMUNICATION CHANNEL WITH TUNING STRUCTURE - An example system includes a communication channel and at least one tuning structure coupled to the communication channel. The tuning structure includes a branch of the communication channel. The tuning structure is to dissipate energy from the communication channel at least at one selected wavelength. The branch of the communication channel is a terminated portion. | 2019-08-01 |
20190238371 | Synchronized interference suppression in frequency domain - An apparatus for communication includes a transmission chain, an interference suppressor and a reception chain. The transmission chain is configured to transmit a transmitted signal. The interference suppressor is configured to produce suppression signals, by filtering reference signals drawn from the transmission chain. At least one of the reference signals is filtered in a frequency domain. The reception chain is configured to receive a signal distorted by at least an attenuated and delayed replica of the transmitted signal. The transmitted signal and the received signal are (i) synchronized in time and (ii) each includes one or more subcarriers selected from a common subcarrier-resource. The reception chain is further configured to process the received signal up to selected points, to subtract the suppression signals from the received signal at the selected points to produce an interference-suppressed signal, and to recover data carried in the received signal from the interference-suppressed signal. | 2019-08-01 |
20190238372 | Radio Communication System And Radio Communication Method - A radio communication system includes a radio apparatus and a signal processing apparatus that function as a base station, and the radio apparatus includes a channel estimation unit that, on the basis of a radio signal transmitted from a terminal apparatus, estimates channel information relating to a radio transmission path between the radio apparatus and the terminal apparatus; a demodulation unit that performs soft-decision demodulation of the radio signal on the basis of the channel information estimated by the channel estimation unit; a signal switching unit that, depending on the terminal apparatus that transmitted the radio signal, switches an output destination of a log likelihood ratio obtained by the soft-decision modulation between either a first path passing through a decoding unit that decodes the log likelihood ratio or a second path not passing through the decoding unit; and a transmission unit that transmits a signal output from the first path or the second path to the signal processing apparatus. | 2019-08-01 |
20190238373 | SPACE-TIME OVERSAMPLING AND ERROR SHAPING FOR COARSELY QUANTIZED ARRAYS - Methods and apparatus for shaping and filtering quantization errors conjointly in space and time to produce a higher-precision output in a spatially and temporally oversampled array. A space-time error-shaping array system has an array of sensors, each sensor producing a temporal signal comprising quantized waveforms. A multi-input multiple-output (MIMO) discrete-time filter structure with multiple inputs, each coupled to a sensor of the array of sensors, shapes quantization errors of the array of sensors on the basis of temporal aspects of the quantized waveforms conjointly with spatial aspects of the quantized waveforms. | 2019-08-01 |
20190238374 | Method And System For Split Voltage Domain Receiver Circuits - Methods and systems for split voltage domain receiver circuits are disclosed and may include amplifying complementary received signals in a plurality of partial voltage domains. The signals may be combined into a single differential signal in a single voltage domain. Each of the partial voltage domains may be offset by a DC voltage from the other partial voltage domains. The sum of the partial domains may be equal to a supply voltage of the integrated circuit. The complementary signals may be received from a photodiode. The amplified received signals may be amplified via stacked common source amplifiers, common emitter amplifiers, or stacked inverters. The amplified received signals may be DC coupled prior to combining. The complementary received signals may be amplified and combined via cascode amplifiers. The voltage domains may be stacked, and may be controlled via feedback loops. The photodetector may be integrated in the integrated circuit. | 2019-08-01 |
20190238375 | RESTRICTED EUCLIDEAN MODULATION - A method and apparatus for using Euclidean modulation in an antenna are disclosed. In one embodiment, a method for controlling an antenna comprises mapping a desired modulation to achievable modulation states, mapping modulation values associated with the achievable modulation states to one or more control parameters, and controlling radio frequency (RF) radiating antenna elements using the one or more control parameters to perform beam forming. | 2019-08-01 |
20190238376 | PHYSIOLOGICAL INFORMATION COLLECTING SYSTEM AND TRANSCEIVER DEVICE THEREOF - A physiological information collecting system and a transceiver device thereof are configured to collect physiological information from animal bodies. The transceiver device includes a front-end circuit, a follower circuit, a quadrature delay line and an output circuit. The front-end circuit separates a discontinuous signal into an in-phase signal and a quadrature signal. The follower circuit outputs a control voltage and rotates the in-phase signal by a predetermined phase angle to output a follower signal. The quadrature delay line rotates the quadrature signal by a corresponding phase angle according to the control voltage. The output circuit synthesizes the follower signal and the quadrature signal and outputs a data signal by demodulating the discontinuous signal. Consequently, the transceiver device reduces the bandwidth range of the discontinuous signal when receiving the discontinuous signal, reduces the power consumed by the transceiver device, and demodulates the discontinuous signal with various transmission rates of different data. | 2019-08-01 |
20190238377 | RANDOM ACCESS PPDU FOR WLAN SYSTEMS - In wireless communications for multi-users, an access point may transmit a first trigger frame to one or more stations. The first trigger frame may be for scheduling a first uplink multi-user transmission and may indicate a plurality of resources for indicating existence of data to be sent to the access point. The station(s) may process the first trigger frame received from the access point. In response to the first trigger frame, the station(s) may generate and transmit a respective first uplink frame to the access point. In some cases, the first uplink frame(s) from the station(s) does not have a data field and does have a signal indicating existence of data to be sent from the station(s) to the access point. The signal may be sent using a resource(s) of the plurality of resources. Other methods, apparatus, and computer-readable media are also disclosed. | 2019-08-01 |
20190238378 | INFORMATION TRANSMISSION METHOD AND APPARATUS IN WIRELESS LOCAL AREA NETWORK - Information transmission methods and apparatuses in a wireless local area network are provided. One example method includes generating a legacy signaling field (L-SIG) and a repeated legacy signaling field (RL-SIG), where subcarriers with indexes −28, −27, 27, and 28 in the L-SIG and the RL-SIG in a 20 MHz bandwidth carry −1, −1, −1, and 1, respectively. The method also includes sending the generated L-SIG and RL-SIG. | 2019-08-01 |
20190238379 | Systems and Methods for Communicating by Modulating Data on Zeros - Systems and methods for transmitting data using various Modulation on Zeros schemes are described. In many embodiments, a communication system is utilized that includes a transmitter having a modulator that modulates a plurality of information bits to encode the bits in the zeros of the z-transform of a discrete-time baseband signal. In addition, the communication system includes a receiver having a decoder configured to decode a plurality of bits of information from the samples of a received signal by: determining a plurality of zeros of a z-transform of a received discrete-time baseband signal based upon samples from a received continuous-time signal, identifying zeros that encode the plurality of information bits, and outputting a plurality of decoded information bits based upon the identified zeros. | 2019-08-01 |
20190238380 | OFDMA APPARATUS AND METHOD THEREOF FOR PERFORMING OFDM BASED COMMUNICATION IN WIRELESS COMMUNICATION SYSTEM - Embodiments herein provide an Orthogonal Frequency Division Multiple Access (OFDMA) method for performing Orthogonal Frequency Division Multiplexing (OFDM) based communication in a wireless communication system, comprising allocating by an OFDM apparatus a resource for data in a two-step frequency-domain assignment process as (a) indicating at least one subband, and (b) indicating at least one Resource Blocks (RBs) within the at least one subband. | 2019-08-01 |
20190238381 | TRANSMISSION APPARATUS AND TRANSMISSION METHOD - An OFDM transmission apparatus performs transmission using an orthogonal frequency division multiplexing scheme in one or a plurality of frequency bands and includes a symbol multiplexing unit to multiply a column vector containing a first number of modulated symbols generated by primary modulation in a frequency domain, by a precoding matrix having as many rows and columns as the first number to generate a multiplexed symbol group containing the first number of multiplexed symbols each containing a second number of the modulated symbols that are multiplexed, where the first number is two or more, and the second number is equal to or more than two and equal to or less than the first number; and a subcarrier allocation unit to allocate the multiplexed symbols contained in the multiplexed symbol group to different subcarriers. | 2019-08-01 |
20190238382 | Common Reference Signal Design for OFDM and DFTS-OFDM - The present disclosure pertains to a terminal for a Radio Access Network, the terminal being adapted for transmission based on a first frequency division multiple access (FDMA) technology and for transmission based on a second frequency division multiple access technology. The terminal is adapted for transmitting reference signaling having a comb structure for transmission based on either the first FDMA technology or the second FDMA technology. The disclosure also pertains to related devices and methods. | 2019-08-01 |
20190238383 | APPARATUS FOR TRANSMITTING BROADCAST SIGNALS, APPARATUS FOR RECEIVING BROADCAST SIGNALS, METHOD FOR TRANSMITTING BROADCAST SIGNALS AND METHOD FOR RECEIVING BROADCAST SIGNALS - A method for receiving broadcast signals in a receiver, includes receiving the broadcast signals carrying service data, demodulating the broadcast signals by an Orthogonal Frequency Division Multiplexing (OFDM) scheme, Multiple-Input Multiple-Output (MIMO) processing the broadcast signals based on rotation matrices with rotation angles, wherein values of the rotation angles depend on modulation orders and code rates of the service data, demapping data in the broadcast signals and decoding the data based on the code rates. | 2019-08-01 |
20190238384 | OVERLAPPED MULTIPLEXING-BASED DECODING METHOD AND DEVICE, AND MODULATION AND DEMODULATION METHOD AND SYSTEM - In an overlapped multiplexing-based decoding method and device, and modulation and demodulation method and system provided in this application, a convolution operation with a header and without a tail is split into group operations with both a header and a tail by using a slide group decoding scheme and based on association between adjacent symbols in an OvXDM system, and then each group of sequences is decoded by using a corresponding decoding algorithm. | 2019-08-01 |
20190238385 | METHOD AND DEVICE FOR TRANSCEIVING WIRELESS SIGNAL IN WIRELESS COMMUNICATION SYSTEM - The present invention relates to a wireless communication system and particularly to a method and a device for the method, the method comprising: a step of receiving a subframe having a control duration configured with a plurality of OFDM symbols; a step of receiving a control channel by monitoring a plurality of control channel candidates in the control duration of the subframe; and a step of performing an operation corresponding to the control channel, wherein, if the plurality of OFDM symbols correspond to multi-beam directions, a plurality of control channel resources constituting each control channel candidate are present only in the same OFDM symbol in the control duration, and if the plurality of OFDM symbols correspond to a single-beam direction, the plurality of control channel resources constituting each control channel candidate are present across the plurality of OFDM symbols in the control duration. | 2019-08-01 |
20190238386 | METHOD FOR UPLINK MULTIUSER DATA TRANSMISSION AND SYSTEM FOR UPLINK MULTIUSER MULTIPLE INPUT MULTIPLE OUTPUT - A method for uplink multiuser data transmission and a system for uplink multiuser multiple input multiple output are provided. The method implemented by an access point (AP) includes: sending, indication information to at least two stations (STAs), wherein the indication information indicates that the at least two STAs perform an uplink multiuser data transmission; receiving, uplink data sent by the at least two STAs through channels, respectively; and demodulating, the uplink data using receiving beams corresponding to pre-estimated channels, respectively. According to the embodiments of the present disclosure, the AP receives the uplink data from multiple STAs through different channels from the STAs to the AP respectively, and demodulates data using the receiving beams corresponding to the channels respectively, thereby realizing that the AP performs separation and demodulation of the uplink data sent by multiple STAs and realizing the uplink multiuser data transmission. | 2019-08-01 |
20190238387 | METHOD FOR UPLINK MULTIUSER DATA TRANSMISSION AND SYSTEM FOR UPLINK MULTIUSER MULTIPLE INPUT MULTIPLE OUTPUT - The embodiments of the present disclosure disclose a method for uplink multiuser data transmission and a system for uplink multiuser multiple input multiple output. The method includes: sending, by an access point AP, indication information to at least two stations STAs, wherein the indication information is used for indicating that the at least two STAs perform an uplink multiuser data transmission; receiving, by the AP, uplink data sent by the at least two STAs through channels from the at least two STAs to the AP, respectively; and demodulating, by the AP, the uplink data sent by the at least two STAs using receiving beams corresponding to pre-estimated channels from the at least two STAs to the AP, respectively. | 2019-08-01 |
20190238388 | METHOD FOR UPLINK MULTIUSER DATA TRANSMISSION AND SYSTEM FOR UPLINK MULTIUSER MULTIPLE INPUT MULTIPLE OUTPUT - The embodiments of the present disclosure disclose a method for uplink multiuser data transmission and a system for uplink multiuser multiple input multiple output. The method includes: sending, by an access point AP, indication information to at least two stations STAs, wherein the indication information is used for indicating that the at least two STAs perform an uplink multiuser data transmission; receiving, by the AP, uplink data sent by the at least two STAs through channels from the at least two STAs to the AP, respectively; and demodulating, by the AP, the uplink data sent by the at least two STAs using receiving beams corresponding to pre-estimated channels from the at least two STAs to the AP, respectively. | 2019-08-01 |
20190238389 | PROXIMITY SYNCHRONIZING AUDIO GATEWAY DEVICE - A digital audio gateway device for use in a wireless network of digital audio playback devices. The gateway device is wirelessly linked to one or more digital audio playback devices to provide a gateway to the Internet for the digital audio playback devices. In addition to functioning as a gateway, the device provides additional functionality and may act as a cache of digital audio data for the various digital audio players connected in the wireless network and may also act to automatically update digital audio content on the audio players, synchronize digital audio content and playlists between the digital audio players and continue automatically or upon user request a particular playlist as the user moves from one digital audio player to another. | 2019-08-01 |
20190238390 | METHOD FOR STREAMING AN AUDIO VIDEO CONTENT - An adaptive bitrate streaming method streams audio video (AV) to a client using a multi content delivery network (CDN) approach. Each CDN stores versions of content that can be requested in a succession of consecutive files using HTTP requests. The method is based on use of an intermediate module between an AV player of the client and each CDN. For each file of a version requested by the AV player, the intermediate module requests a manifest file to each CDN and estimates a bitrate of each CDN using reception performances of the manifest files. Each file is requested by the intermediate module in a succession of segment groups according to a pattern including a predetermined number of segments. Each group includes one set of segments for each CDN, each set including segments to be requested to the CDN to which they correspond proportional to the bitrate of this CDN. | 2019-08-01 |
20190238391 | ELECTRONIC DEVICE, SYSTEM, AND METHOD - An electronic device comprises a communication device for communicating with an external server, local communication modules for communicating with another electronic device, and at least one controller. This at least one controller is configured to receive from the external server a universal unique ID (UUID) that is also sent by the server to the other electronic device; connect, by way of a first communication protocol of the local communication modules, with the other electronic device to which was sent the UUID; and while connected by the first communication protocol, connect to the other electronic device by way of a second communication protocol of the local communication modules. | 2019-08-01 |
20190238392 | METHOD AND APPARATUS FOR CONFIGURATING TRANSMISSION MODE IN COPPER WIRE BASED NETWORK - A method for configurating a transmission mode to provide an Internet service to a customer-premises equipment by an transmission mode configurating apparatus in an access network structure is provided. At least one network management equipment and at least one customer-premises equipment are connected through a bundle of cables including a plurality of transmission lines. The method includes determining the number of transmission lines connected to the customer-premises equipment; determining at least one of available transmission mode to provide depending on the number of transmission lines; if a plurality of available transmission modes are determined, calculating a transmission performance in each of the available transmission modes; and selecting the transmission mode with the highest performance among the plurality of the available transmission modes. | 2019-08-01 |
20190238393 | PREVENTING CONCURRENT DISTRIBUTION OF NETWORK DATA TO A HARDWARE SWITCH BY MULTIPLE CONTROLLERS - Some embodiments provide, for a first controller application, a method for configuring a managed hardware forwarding element (MHFE) to implement one or more logical networks. The method of some embodiments receives logical network data that defines at least one logical forwarding element of a logical network to be implemented by the MHFE. The method then identifies a set of tables of a database instance that is instantiated on the MHFE in order to distribute the logical network data to the MHFE. In some embodiments, the method monitors the identified set of tables in order to determine whether a second controller application updates any one of the set of tables. The method distributes the logical network data to the MHFE so long as none of the tables in the set of tables is updated by the second controller application. | 2019-08-01 |
20190238394 | OBJECT COUNTS PERSISTENCE FOR OBJECT STORES - In an example, a system includes network nodes implementing an object store. The system may determine reference count updates for objects stored on the object store, and delay persisting the reference count updates to a persistent storage. The system may cancel reference count updates that increments and decrement between the determined reference count update and another reference count update received during the delay in persisting the reference count update to the persistent storage to minimize writing to the object record. | 2019-08-01 |
20190238395 | NETWORK SYSTEM, CONTROL METHOD, AND CONTROL DEVICE - A mechanism which can easily acquire a connection relationship of each device even in a multilayered network system having a plurality of protocols is provided. A network system has at least one network including a master processing unit and one or a plurality of slave processing units. Each of first, second, and third devices holds characteristic information indicating whether or not the device has a master processing unit or a slave processing unit. The first device includes a network management unit that acquires single-layer network configuration information from each master processing unit included in the network system to generate multilayer network configuration information indicating a connection relationship of each device in the network system. | 2019-08-01 |
20190238396 | USING RANDOM FORESTS TO GENERATE RULES FOR CAUSATION ANALYSIS OF NETWORK ANOMALIES - In one embodiment, a network assurance service receives one or more sets of network characteristics of a network, each network characteristic forming a different feature dimension in a multi-dimensional feature space. The network assurance service applies machine learning-based anomaly detection to the one or more sets of network characteristics, to label each set of network characteristics as anomalous or non-anomalous. The network assurance service identifies, based on the labeled one or more sets of network characteristics, an anomaly pattern as a collection of unidimensional cutoffs in the feature space. The network assurance service initiates a change to the network based on the identified anomaly pattern. | 2019-08-01 |
20190238397 | WIRELESS IO-LINK COMMUNICATION NETWORK HAVING AN ADDITIONAL MASTER AND METHOD FOR ITS OPERATION - A wireless IO-link communication network has a main master and at least one device which have a bidirectional wireless communication between the main master and the at least one device, as well as a backup master which is connected to the main master and the at least one device and is configured to control the at least one device. In a method for operating the IOLW communication network with such a backup master, the backup master controls the at least one device instead of the main master. | 2019-08-01 |
20190238398 | USING NETWORK CONNECTION HEALTH DATA, TAKEN FROM MULTIPLE SOURCES, TO DETERMINE WHETHER TO SWITCH A NETWORK CONNECTION ON REDUNDANT IP NETWORKS - Devices, methods, systems, and computer-readable media for using network connection health data, from multiple sources, to determine whether to switch a network connection on redundant IP networks using VoIP protocol are described herein. One non-transitory computer readable medium includes instructions for connecting an end device used by a first party to communicate with a second party through a VoIP network connection via a VoIP network device, connecting a first network device operating a first network to the VoIP device, connecting a second network device operating a second network to the VoIP device, if there are indications of a fault on at least two OSI layers, then switching from communicating VoIP connection related packets of data on the first network to communicating the VoIP connection related packets of data on the second network. | 2019-08-01 |
20190238399 | IDENTIFICATION OF A SOFT FAILURE AT A MEMBER - Examples herein relate to identifying a soft failure at member within a cluster dedicated to a microservice. Examples disclose identifying a statistical evaluation for each member within the cluster. Based on the statistical evaluation, identifying a soft failure among one of multiple members within the cluster. In response to the identification of the soft failure at one of the members within the cluster, performing an action. | 2019-08-01 |
20190238400 | NETWORK ELEMENT OPERATIONAL STATUS RANKING - Techniques and systems are disclosed for generating and implementing operational status classification extensions to determine multivariate rankings of network elements. A management system includes components that poll network elements to collect operational information such as performance metrics for operationally associated network elements. In response to detecting an operational event based on the operational information, the system includes components for generating training data and processing the training data to generate operational status classifier components. | 2019-08-01 |
20190238401 | METHOD AND APPARATUS FOR EXTENDING SERVICE CAPABILITIES IN A COMMUNICATION NETWORK - Aspects of the subject disclosure may include, for example, a method including selecting a solution set of devices from a set of candidate devices connected to a network to provide a service via a virtual device, generating a virtual finite state machine to control execution of the required functions of the virtual device via selected capabilities of each device of the solution set of devices transmitting, to a controller device of the solution set of devices, the virtual finite state machine, wherein execution of the virtual finite state machine by the controller device causes the controller device to control the required functions of the virtual device via the selected capabilities of each device of the solution set of devices, and transmitting, to non-controller devices of the solution set of devices, software data and configuration data, wherein execution of the software data at the non-controller devices according to the configuration data causes the non-controller devices to perform the selected capabilities according to signals sent by the controller device. | 2019-08-01 |
20190238402 | SYSTEM FOR TESTING ETHERNET PATHS AND LINKS WITHOUT IMPACTING NON-TEST TRAFFIC - A system for testing Ethernet paths or links without adversely impacting non-test traffic. The system includes a test traffic generator that includes a scheduler that determines when a new test packet is generated. The test traffic generator includes a packet creator that builds a test packet and a transmitter for transmitting the test packet via the Ethernet path or link. The packet creator sends the test packet to the transmitter. The traffic generator includes a transmit credit block coupled to the transmitter or to the scheduler. The transmit credit block stores an amount of credits representing a number of bytes that are available to transmit and decrements the amount each time a non-test packet is communicated via the Ethernet path or link. | 2019-08-01 |
20190238403 | PROVISIONING NETWORK DEVICES USING A VENDOR-NEUTRAL PLATFORM - Network devices are provisioned using a single vendor-neutral data model with a non-relational database. Provisioning requirements are collected upon detecting a new network device that needs to be configured and/or installed. Based on the provisioning requirements, a configuration object is retrieved using a data model in the non-relational database. The configuration object is transformed to a concrete configuration file for the network device. After applying the configuration file to the network device, a separate process validates the configuration of the network device by comparing the observed network configuration with the initial target configuration data included in the configuration object. | 2019-08-01 |
20190238404 | METHOD AND APPARATUS FOR COORDINATED SCHEDULING OF NETWORK FUNCTION VIRTUALIZATION INFRASTRUCTURE MAINTENANCE - Systems, methods, apparatuses, and computer program products for coordinated scheduling of network function virtualization infrastructure (NFVI) maintenance are provided. One method includes receiving, by a network function virtualization entity, a request for scheduled maintenance of a network function virtualization infrastructure (NFVI). The method may also include determining whether one or more resources required for the maintenance of the NFVI are reserved, and sending an approval or rejection of the request for maintenance based on the determination of whether the resources are reserved. | 2019-08-01 |
20190238405 | DISCOVERY OF NETWORK CAMERA DEVICES - A system for camera device discovery and enumeration detects a camera device connected to a computing device using a Universal Plug and Play (UPnP) protocol and generates a device object corresponding to the detected camera device with a user-mode camera driver. The user-mode camera driver associated with an operating system executing on the computing device. The system registers the generated device object with the operating system to provide a direct interface from the operating system to the camera device and to make the camera device available to a plurality of applications executing on the computing device and commands the camera device from at least one of the plurality of applications via the registered device object through the operating system, thereby improving the functioning of the computing device and the user experience. | 2019-08-01 |
20190238406 | COMMUNICATION DEVICE, COMMUNICATION METHOD AND COMMUNICATION SYSTEM - A device includes a first port in which a first address as a monitoring point is set and which is connected to one communication line belonging to a link aggregation group to which another communication line for another device also belongs, and a processor configured to transmit and receive a monitoring frame based on the first address through the first port, switch an operating state of the first port to an active state or a standby state, and restrict the transmission and the reception of the monitoring frame through the first port when the operating state of the first port is switched to the standby state, wherein the first address is identical to a second address which is set as a monitoring point in a second port of the other device connected to the other communication line belonging to the link aggregation group to which the one communication line belongs. | 2019-08-01 |
20190238407 | Community Self-Managed Radio Access Network - In some embodiments, a local community may manage its own RAN via a simple, secure, self-service user interface in conjunction with a mobile operator. An exemplary system is disclosed, including: at least two base stations providing wireless access to one or more mobile devices and located in a community; a gateway providing a connection to a core network for the at least two base stations; a management functionality in the core network, in communication with the gateway, for authorizing management activities for the at least two base stations; and a user-facing administration module in communication with the management functionality, the user-facing administration module having: a user interface for providing management control to an administrative user in the community. | 2019-08-01 |
20190238408 | SYSTEM AND METHOD FOR CONFIGURING COMMUNICATION DEVICES - A communication system that includes a base unit and one or more end units that communicate over a primary communication link using a first communication protocol and a secondary communication link using a second protocol. The secondary communication link may be a shorter range communication link than the primary communication link. The secondary communication link may be used to transmit and receive registration information, configuration settings, and status information between the end units and the base unit. | 2019-08-01 |
20190238409 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR NETWORK FUNCTION OPTIMIZATION BASED ON LOCALITY AND FUNCTION TYPE - A network function optimization method, system, and computer program product, include optimizing network function chain components by modifying a structure of the network function chain components by removing one of the functions of the network function chain components in response to a constraint according to a policy requirement. | 2019-08-01 |
20190238410 | VERIFYING NETWORK INTENTS - A method for verifying network intents may include decomposing at least one network intent into a plurality of sub-verification tasks, generating a set of normalized configurations for a plurality of network devices in a target network based on a set of current configurations for the plurality of network devices and generating a network graph based on the set of normalized configurations and a topology of the target network. The method may further include analyzing the plurality of sub-verification tasks and the network graph to determine if the set of current configurations for the plurality of network devices satisfies the at least one network intent. If the at least one network intent is not satisfied, a report may be generated indicating that the target network is not in compliance. If the at least one network intent is satisfied, information may be provided indicating that target network is in compliance. | 2019-08-01 |
20190238411 | VIRTUAL MACHINE PLACEMENT BASED ON NETWORK COMMUNICATION PATTERNS WITH OTHER VIRTUAL MACHINES - A method of determining an optimal host machine to place a virtual machine in a virtualization environment is described. The virtualization environment includes a first rack of host machines and a second rack of host machines, where a first host machine of the first rack of host machines is designated as a leader node. The method includes receiving a request to launch a second virtual machine configured to communicate with a first virtual machine. The method includes identifying, from the first rack of host machines and the second rack of host machines, a cluster of host machines. The method includes computing, for each host machine of the cluster, an aggregate network bandwidth consumed by the host machine. The method includes selecting a host machine from the cluster based on the aggregate network bandwidth computed for the selected host machine. The method includes launching the second virtual machine on the selected host machine. | 2019-08-01 |
20190238412 | POLICY BASED PATH MANAGEMENT - Policy based path management, including: identifying a plurality of data communications paths between a storage system and an entity that issues input/output (‘I/O’) operations to the storage system; selecting, in dependence upon a path selection policy, a subset of data communications paths from the plurality of data communications paths between the entity and the storage system; and issuing, from the entity to the storage system, I/O operations using only the subset of data communications paths. | 2019-08-01 |
20190238413 | Quality Of Service Differentiation Between Network Slices - There is provided mechanisms for quality of service differentiation between network slices. A method is performed by a prioritization entity. The method comprises obtaining relative priority values for the network slices from a network entity. The method comprises providing an access network entity with a relative priority value for a protocol data unit (PDU) flow as given by the relative priority value for the network slice used by that PDU flow, thereby causing differentiation of the quality of service for the network slices. | 2019-08-01 |
20190238414 | ONLINE CAPACITY-EXPANDING AND ONLINE CAPACITY-REDUCING METHODS AND APPARATUSES FOR DISTRIBUTED CONSENSUS SYSTEM - Embodiments of the present disclosure provide a method comprising: adding a second set of one or more servers to a first set of servers of a consensus system to form an expanded set of servers, performing a capacity-expanding operation on one of the second set of one or more servers. The capacity-expanding operation comprises: pausing a service process related to distributed services, updating configuration information of the first set of servers in response to the second set of one or more servers being added, and resuming the service process and initiating master server election for the expanded set of servers, wherein one of the expanded set of servers is elected as a master server, the rest of the expanded set of servers are considered as slave servers. The method can also include performing the capacity-expanding operation sequentially on each of the slave servers, and subsequently, performing the capacity-expanding operation on the master server, and performing the capacity-expanding operation on the second set of one or more servers that have not been subjected to the capacity-expanding operation after completion of the capacity-expanding for the first set of servers. | 2019-08-01 |
20190238415 | Rule based IPv4 to IPv6 migration assisting framework - A method and system for rule based Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6) migration assisting framework is disclosed. The method provides guidance and assistance for migrating a product, a system or the like to IPv6. The method views across the complete development life cycle, not restricting only to the impacted code base of the system artifacts. The method scans the system artifacts for IPv4 dependency detection and then provides IPv4 Dependency Removal Effort Estimation (IDRE). The IPv4 dependency detection is based on predefined Meta-rules constructed with respect to the context of product. The IDRE combines Analysis Effort (AE) and Project Execution Effort (PEE) to provide a user and/or the organization order of magnitude estimate based on the assessment of IPv4 dependencies, level of coupling with IPv4 dependencies against different parts of the system artifacts. | 2019-08-01 |
20190238416 | DEVICE DISCOVERY USING DISCOVERY NODES - A method for discovery of devices is described herein. The method includes connecting, via a processor, to a discovery node service. The method also includes sending, via the processor, a node name to the discovery node service. The method further includes sending, via the processor, data and content to be sent to a discovery node associated with the node name. The method also further includes receiving data and content from the discovery node, the data to include a list of devices subscribed to the discovery node. | 2019-08-01 |
20190238417 | CREATING AND MANAGING AGGREGATION SERVICE HIERARCHIES - Techniques disclosed herein provide an approach for managing aggregation service hierarchies. In some embodiments, a hierarchy of an aggregation service is identified. The hierarchy comprises a plurality of nodes, where a respective node is associated with at least one host computer. The aggregation service places resource consumers based on the nodes. A host computer is assigned as a child host of a leaf node based on a clustering heuristic. The clustering heuristic requires the host computer to have access to at least one resource that is accessible to an existing child host of the leaf node. A resource consumer associated with the leaf node is executed on the host computer. | 2019-08-01 |
20190238418 | SYSTEM AND METHOD FOR MANAGING SITE-TO-SITE VPNS OF A CLOUD MANAGED NETWORK - A management server includes a configuration and management module processing server configuration information, including a VPN peer list and VLAN/subnet settings. The management server automatically calculates the VPN configuration information, including the VPN peer subnet route information identifying which of the subnets participating in the VPN are behind which of the routers and keys to establish VPN tunnels between those routers participating in the VPN. Each of the routers participating in the VPN includes a VPN tunnel with the other routers participating in the VPN, a set of data structures storing data identifying contact information for each of the subnets participating in the VPN, a combination of an IP address and port to reach one of routers that that subnet is behind, and a forwarding module to forward traffic between the subnets. | 2019-08-01 |
20190238419 | CENTRALITY MEASURE RANKING FOR A MULTIPLEX NETWORK - Centrality measure ranking for a multiple network is provided by a method that includes obtaining a representation of a multiplex network including layers and nodes representing communicating entities. The method determines a node centrality measure for each node of the nodes. This includes determining intra-layer and inter-layer centrality measures. The method determines a respective centrality measure for each communicating entity as a function of node centrality measures for nodes representing the communicating entity across the layers of the multiplex network. The method also ranks the communicating entities by their centrality measures. | 2019-08-01 |
20190238420 | SYSTEMS AND METHODS FOR SIMULATING DATA CENTER NETWORK TOPOLOGIES - The disclosed computer-implemented method may include (1) defining a topology of a data center network that defines an arrangement of a plurality of networking devices included in the data center network, (2) generating a routing policy for the data center network based on the defined topology, (3) deriving a forwarding information base (FIB) for each networking device based on the defined topology and the generated routing policy for the data center network, (4) compiling a data center traffic profile for the data center network that includes a set of data flows that include an amount of data that a source networking device begins to transfer to a destination networking device via the data center network at a predetermined time, and (5) executing a simulation of the data center network via the data center traffic profile. Various other methods, systems, and computer-readable media are also disclosed. | 2019-08-01 |
20190238421 | DETECTING TRANSIENT VS. PERPETUAL NETWORK BEHAVIORAL PATTERNS USING MACHINE LEARNING - In one embodiment, a network assurance service that monitors a network detects a pattern of network measurements from the network that are associated with a particular network problem. The network assurance service tracks characteristics of the detected pattern over time. The network assurance service uses the tracked characteristics of the detected pattern over time as input to a machine learning-based pattern analyzer. The pattern analyzer is configured to determine whether the detected pattern is a perpetual or transient pattern in the network, and the pattern analyzer is further configured to detect anomalies in the characteristics of the pattern. The network assurance service initiates a change to the network based on an output of the machine learning-based pattern analyzer. | 2019-08-01 |
20190238422 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR MANAGING DEPLOYMENT AND MAINTENANCE OF NETWORK TOOLS - A method for managing cloud deployment and maintenance of network tools includes providing a network tool user interface for displaying network tools available for deployment from different network tool providers and for receiving user selection of one or more of the network tools for deployment. A network tool provider interface allows network tool providers to submit network tools for availability via the network tool user interface. A user can select, via the network tool user interface, one or more of the network tools for cloud deployment and, a location for deploying the selected network tool. The method further includes interfacing with a service orchestration system of the location for deploying the selected network tool in the location. User interface elements are provided for monitoring performance of and maintaining deployed network tools. | 2019-08-01 |
20190238423 | VERIFYING SERVICE STATUS - A first device verification model is sent to a first agent on a first device providing at least a portion of the service. The first agent is able to monitor based on the first device verification model a parameter of the first device related to the service. A second device verification model is sent to a second agent on a second device providing at least a portion of the service, wherein the second agent is able to monitor based on the second device verification model a parameter of the second device related to the service. A report is received from the first agent of at least the parameter of the first device. A report is received from the second agent of at least the parameter of the second device. At least the parameter of the first device and at least the parameter of the second device are analyzed to determine whether the service is functioning as intended. | 2019-08-01 |
20190238424 | POLICY ENFORCEMENT AS A SERVICE FOR THIRD PARTY PLATFORMS WITH ASYNCHRONOUS USER TRACKING MECHANISMS - Systems, methods, and computer-readable media for providing a Policy Enforcement as a Service (PEaaS) are described. The PEaaS may allow customer service providers to define policies for usage restrictions to be implemented across their distributed systems/platforms. The policy enforcement mechanisms of the PEaaS may prevent users from overloading the systems/platforms of the customer service providers. The PEaaS may also include mechanisms for asynchronously (or “lazy”) tracking user infractions or suspensions. The lazy tracking mechanism may track and perform asynchronous (async) computation of infraction records and suspension sets/lists. Other embodiments may be described and/or claimed. | 2019-08-01 |
20190238425 | CAPABILITY EXPOSURE FOR SERVICE INSTANTIATION - The application is at least directed to a core network including a non-transitory memory having instructions stored thereon for registering a network function or network function template in the core network. The network includes a processor, operably coupled to the non-transitory memory. The processor is configured to perform the instruction of determining that registration of the network function or network function template is acceptable. The processor is also configured to perform the instruction of transmitting a message including the network function or network function template to a repository in the core network. The processor is also configured to perform the instruction of verifying the network function or network function template against existing policies in the core network. The processor is also configured to perform the instruction of registering the network function or network function template in the repository after verification. The application is also directed to a core network that discovers a network function or network function template therein. The application is also directed to a core network that instantiates a network function. | 2019-08-01 |
20190238426 | TENANT ISOLATED DATA IN SHARED REUSABLE SERVICES - A Tenant request to subscribe to an Application is received. A Service that the Application consumes is determined. The Tenant is determined to be new to the Service. In response to determining the Tenant is new, a subscription of the Tenant is provided in the Service, and the Application is added to the subscription. | 2019-08-01 |
20190238427 | DATA CONSISTENCY OF POLICY ENFORCEMENT FOR DISTRIBUTED APPLICATIONS - Systems, methods, and computer-readable media for providing a Policy Enforcement as a Service (PEaaS) are described. A processor may, in response to identification of a suspension of user(s) for one of one or more services, generate a suspension value indicative of the suspension and transmit the suspension value to a corresponding one of third party platforms of the service(s), respectively. The suspension value usable by the corresponding third party platform to determine whether to deny request(s) from the user for the distributed service, or not. A service of the service(s) comprises a distributed service provided by a plurality of hosts. In response to the service corresponding to the suspension including the distributed service, the suspension value may be transmitted to the first host, and the suspension value may be propagated to the one or more second hosts, respectively. Other embodiments may be described and/or claimed. | 2019-08-01 |
20190238428 | OPAQUE INTERFACE FOR ENCLOSED/WRAPPED ASYNCHRONOUS PUSHING AND/OR PULLING DATA BETWEEN POLICY ENFORCEMENT AS A SERVICE (PEaaS) COMPONENTS - Systems, methods, and computer-readable media for providing a Policy Enforcement as a Service (PEaaS) are described. A processing device may collect set(s) of policy parameter values from one or more third party platforms, respectively, by communication with remote interface(s) employed on the one or more third party platforms, respectively; each set of policy parameter values defines a threshold for issuing a user suspension for a service provided by a respective one of the third party platforms; collect one or more sets of usage metrics for the one or more services from the one or more third party platforms, respectively, by communication with the remote interface(s); the communication with the remote interface(s) to collect the sets of usage metric(s) is asynchronous with communications by which the remote interface(s) received the usage metrics. Other embodiments may be described and/or claimed. | 2019-08-01 |
20190238429 | PERFORMING SERVICES ON DATA MESSAGES ASSOCIATED WITH ENDPOINT MACHINES - Some embodiments of the invention provide a method for performing services on an endpoint machine in a datacenter. On the endpoint machine, the method installs a guest introspection (GI) agent and a service engine. In some embodiments, the GI agent and the service engine are part of one monitor agent that is installed on the endpoint machine. The method then registers with a set of one or more notification services on the endpoint machine, the GI agent to receive notifications regarding new data message flow events on the endpoint machine. Through the notifications, the GI agent captures contextual data items regarding new data message flows, and stores the captured contextual data items. The service engine then performs a service for the data message flow based on the captured contextual data. | 2019-08-01 |
20190238430 | HIGHLY PROBABLE IDENTIFICATION OF RELATED MESSAGES USING SPARSE HASH FUNCTION SETS - Methods, systems, and apparatus for network monitoring and analytics are disclosed. The methods, systems, and apparatus for network monitoring and analytics perform highly probable identification of related messages using one or more sparse hash function sets. Highly probable identification of related messages enables a network monitoring and analytics system to trace the trajectory of a message traversing the network and measure the delay for the message between observation points. The sparse hash function value, or identity, enables a network monitoring and analytics system to identify the transit path, transit time, entry point, exit point, and/or other information about individual packets and to identify bottlenecks, broken paths, lost data, and other network analytics by aggregating individual message data. | 2019-08-01 |
20190238431 | TRANSFORMING EVENT DATA USING REMOTE CAPTURE AGENTS AND TRANSFORMATION SERVERS - The disclosed embodiments provide a method and system for processing network data. During operation, the system obtains, at a remote capture agent, configuration information for the remote capture agent from a configuration server over a network. Next, the system uses the configuration information to configure the generation of event data from network data obtained from network packets at the remote capture agent. The system then uses the configuration information to configure transformation of the event data or the network data into transformed event data at the remote capture agent. | 2019-08-01 |
20190238432 | Storage System Root Cause Analysis and Monitoring - A storage system analysis and monitoring mechanism preforms root cause analysis and monitoring of a storage system via a single view of the storage system. A set of objects are identified within the storage system, where the identification of the set of objects is performed by at least one of a topology discovery or a data structure search. For each object in the set of objects, one or more interconnections to one or more other objects in the set of objects are identified. A view of the storage system is then generated in a graphical user interface showing each of the objects in the set of objects and, for each object in the set of objects, the one or more interconnections to one or more other objects in the set of objects. | 2019-08-01 |
20190238433 | SYNCHRONIZATION OF DATA COLLECTED BY INTERNET OF THINGS (IOT) DEVICES - The present disclosure is directed to apparatus and methods that collect sensed data and that may organize that data such that it can be accessed by user devices or that can be organized and analyzed according to rules, conventions, or policies. Data collected by sensors or devices may be transmitted to a computer or server that stores that data. That stored data may then be analyzed to identify trends, events, or a chain of related events. In certain instances, an analysis of sets of raw data may result in the generation of a report or may result in alerts being sent to particular user devices. These sets of collected data, generated reports, and alert information may be stored and synchronized at one or more computing devices as data sets associated with a group of user devices or with a group of sensing devices. | 2019-08-01 |
20190238434 | DYNAMIC SWITCHING BETWEEN EDGE NODES IN AUTONOMOUS NETWORK SYSTEM - System and method of dynamically selecting an egress edge node for data transmission between different autonomous systems based on real-time route performance detection. With respect to a destination node located in a second autonomous system, a plurality of edge nodes in the first autonomous system each operate to detect route performance in real-time and send the detected information to a control center for evaluation. The evaluation results are compared and used to select an optimal edge node and an associated link for transporting data between the source node and the destination node. To switch from a first edge node to a second one, the IP address of the source node contained in the data packets are converted from an address assigned to the first edge node to an address assigned to the second edge node. | 2019-08-01 |
20190238435 | METHOD, APPARATUS AND SYSTEM FOR MONITORING NETWORK CONNECTIVITY STATUS OF NETWORK DEVICE - The present disclosure provides methods, apparatuses and systems for monitoring a network connectivity status of an enrollee device. According to one exemplary method, a configurator device acquires at least one channel. The configurator device sends a request packet to the enrollee device using the at least one channel. The request packet can include at least one of: a first request packet for querying whether the enrollee device is connected to a hotspot, a second request packet for querying whether there is a network failure in the enrollee device, or a third request packet for querying a hotspot list of all hotspots found by the enrollee device. The configurator device can acquire network information of the enrollee device according to a corresponding reply packet returned by the enrollee device. Accordingly, a user can determine whether an enrollee device is connected to a network, and the connectivity status of the enrollee device. | 2019-08-01 |
20190238436 | VEHICLE APPLICATION ENABLING AND NETWORK ROUTING SYSTEMS IMPLEMENTED BASED ON LATENCY CHARACTERIZATION AND PROJECTION - A vehicle application enabling system is provided and includes a latency characterization and prediction module and an application enable module. The latency characterization and prediction module includes: an estimate sample module configured to collect and store obtained latency estimates, where the obtained latency estimates are associated with transmission of signals in a network for one or more vehicle applications; a sample characterization module configured to characterized the obtained latency estimates; a trend module configured to determine a trend based on the characterized obtained latency estimates; a point projection module configured to generate projected latency estimates based on the trend; and a projection characterization module configured to characterize the projected latency estimates. The application enable module is configured to determine whether to enable the one or more vehicle applications based on the characterization of the projected latency estimates. | 2019-08-01 |
20190238437 | FLEXIBLE AND SAFE MONITORING OF COMPUTERS - Described is a server monitoring technology that is scalable to large numbers of servers, e.g., in a datacenter. Agents on servers run queries to monitor data sources for that server, such as performance counters and other events. The agents monitor their resource usage and those of monitored events to stay within an administrator-specified resource budget (policy), e.g., by modifying the running queries and/or monitoring parameters. A controller receives results of the monitoring, analyzes the results, and takes action as needed with respect to server operation and monitoring. The controller may dynamically update an agent's queries, monitoring parameters and/or monitored data post-processing operations. The controller may issue alerts and reports, including alerts indicative of inter-server problems between two or more servers. | 2019-08-01 |
20190238438 | NETWORK RESOURCE MANAGEMENT WITH PREDICTION - An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated. | 2019-08-01 |
20190238439 | COMBINING MEASUREMENTS BASED ON BEACON DATA - Methods and systems for determining usage are described. Initially, site-centric data and panel-centric data are accessed and pre-processed. Initial usage measurement data is determined based on the pre-processed site-centric data. One or more adjustment factors are determined based on the pre-processed panel-centric data. The one or more adjustment factors are applied to the initial usage measurement data to generate an adjusted usage measurement data. Reports based on the adjusted usage measurement data are generated. | 2019-08-01 |
20190238440 | BACKUP NODE OPERATION - A method is disclosed comprising, checking, at a first node, for receipt of an advertisement message from a second node within an advertisement time interval (102), wherein the first node acts as a backup for the second node in a network. The method further comprises, in response to not receiving the advertisement message within the advertisement time interval (104), sending a probe message to the second node (106) and checking for a response to the probe message from the second node (108). | 2019-08-01 |
20190238441 | METHOD FOR DATA COMMUNICATION IN A NETWORK - A method and system is provided for data communication in a network, with one or more nodal for data transfer between a plurality of data-providing transmitters and a receiver receiving the data provided by the plurality of transmitters via a stream with which, to establish the stream, the receiver issues a listener advertise message for the stream, that comprises a stream description, and the listener advertise message is transmitted to at least one nodal point in the network. | 2019-08-01 |
20190238442 | TECHNOLOGIES FOR PERFORMANCE MONITORING AND MANAGEMENT WITH EMPTY POLLING - Technologies for performance monitoring include a computing device having multiple processor cores. The computing device performs a training workload with a processor core by continuously polling an empty input queue. The computing device determines empty polling thresholds based on the empty polling workload. The computing device performs a packet processing workload with one or more processor cores by continuously polling input queues associated with network traffic. The computing device compares a measured number of empty polls performed by the packet processing workload against the empty polling thresholds. The computing device configures power management of one or more processor cores in response to the comparison. The computing device may determine empty polling trends and compare the measured number of empty polls and the empty polling trends to the empty polling thresholds. Other embodiments are described and claimed. | 2019-08-01 |
20190238443 | DYNAMIC SELECTION OF MODELS FOR HYBRID NETWORK ASSURANCE ARCHITECTURES - In one embodiment, a local service of a network reports configuration information regarding the network to a cloud-based network assurance service. The local service receives a classifier selected by the cloud-based network assurance service based on the configuration information regarding the network. The local service classifies, using the received classifier, telemetry data collected from the network, to select a modeling strategy for the network. The local service installs, based on the modeling strategy for the network, a machine learning-based model to the local service for monitoring the network. | 2019-08-01 |
20190238444 | METHODS AND APPARATUS FOR DETECTING INTERNET CONNECTION PROBLEMS - A method of determining a problem with data packet transmission speed over a first communication medium coupled between a plurality of content servers and an ISP communication device. The method comprises repeatedly measuring the data packet transmission speed over the first communication medium coupled between each of the plurality of content servers and the ISP communication device, and determining there is a problem with the data packet transmission speed over the first communication medium coupled between one of the plurality of content servers and the ISP communication device when the repeatedly measured data packet transmission speeds over the first communication medium coupled between the one of the plurality of content servers and the ISP communication device is substantially different from the repeatedly measured data packet transmission speeds over the first communication medium coupled between other of the plurality of content servers and the ISP communication device. | 2019-08-01 |
20190238445 | SYSTEMS AND METHODS FOR REGULATING NETWORK RESOURCES TO IMPROVE DATA-TRANSMISSION QUALITY - Systems and methods are provided for regulating network resources to improve data-transmission quality. In one implementation, a method includes searching one or more computer-readable memory locations for prior-session data that matches current-session data. The prior-session data may comprise information describing a prior data-transmission session and the current-session data may comprise information describing a current data-transmission session. Data describing a cause of transmission degradation may be stored in association with the prior data-transmission session. The method may also include identifying, by at least one processor, the cause of transmission degradation in the prior data-transmission session as being a cause of transmission degradation in the current data-transmission session if the prior-session data matches the current-session data. The method may also include initiating correction of the cause of transmission degradation based on the identification. | 2019-08-01 |
20190238446 | DISTRIBUTED STORAGE PATH CONFIGURATION - Aspects of the present disclosure relate to transmitting prioritized path data to a device based on a set of topology rules and metrics associated with a storage target. A storage target path discovery request is received from the device. In response to the storage target path discovery request, metrics associated with the storage target are collected. Based on the collected metrics, available paths to the storage target are identified. A set of topology rules are then determined. Based on the topology rules and the collected metrics, a subset of available paths are selected. The subset of available paths are then prioritized into prioritized path data. The prioritized path data is then stored and transmitted to the device. | 2019-08-01 |
20190238447 | Systems and Methods Implementing an Autonomous Network Architecture and Protocol - A network having a nodal architecture consisting of a child/parent familial structure formed by a parenting process which creates a structure relative to each node, with descendants below, siblings beside, and a parent above. In this network, a one-to-many relationship exists from the perspective of an entity that is an ancestor to multiple descendants. Thus, a parent may have many children, who each may have multiple children themselves, but each node will only have one parent. Data packets are routed to destination nodes by propagating from one node to the next via the tree structure. | 2019-08-01 |
20190238448 | SEAMLESS BIDIRECTIONAL FORWARDING DETECTION DISCRIMINATOR BASED RETURN PATH DETERMINATION - Seamless Bidirectional Forwarding Detection (S-BFD) discriminator-based return path determination is provided. In one embodiment, a method is provided that includes assigning a first discriminator associated with a first discriminator identifier and a second discriminator associated with a second discriminator identifier different from the first discriminator. The method also includes receiving an S-BFD control packet that includes one of the first discriminator identifier or the second discriminator identifier. The method includes determining whether the first discriminator identifier or the second discriminator identifier is included in the S-BFD control packet, and based on the determination, initiating an S-BFD reflector session to transmit a response along a return path determined based on whether the first discriminator identifier or the second discriminator identifier is included in the S-BFD control packet. | 2019-08-01 |
20190238449 | HIGH PERFORMANCE SOFTWARE-DEFINED CORE NETWORK - A system of nodes configured to form a network comprising virtual links in an overlay network provisioned over an underlay network including servers of a public network. The system includes virtual routers (VRs) at each node. Each VR is coupled to the network and to a tenant of the node, and configured to receive network data of a set of virtual links in real time during operation of the network. Each VR is configured to determine and dynamically adapt an optimal route through the network using the network data. At least one VR is configured to control routing of traffic flows through the network according to the optimal route, obviating routing based on pre-assigned link weights. | 2019-08-01 |
20190238450 | HIGH PERFORMANCE SOFTWARE-DEFINED CORE NETWORK - A system of nodes configured to form a network including a plurality of virtual links in an overlay network provisioned over an underlay network. The system includes at least one virtual machine (VM) at each node. The VM is coupled to the network and configured as a tenant VM to correspond to a tenant of the network, and a tenant network includes the tenant VM at each node. The system includes numerous control planes, and each control plane is created by the VM of a corresponding tenant network and configured as a tenant control plane for routing of traffic flows of a corresponding tenant. The system includes numerous data planes, and each data plane is created by the VM and configured as a tenant data plane for traffic flows of a corresponding tenant. | 2019-08-01 |
20190238451 | OPTICAL NETWORK CONTROL DEVICE AND OPTICAL PATH SETTING METHOD - An optical network control device includes: a path setting unit that sets, based on topology information including a connection relationship among a plurality of nodes and a first route selection index value of routes each connecting the plurality of nodes, a first path for a route having the first route selection index value being minimum from among route candidates linking a start point node and an end point node of a requested traffic; a topology information modification unit that calculates a second route selection index value acquired by increasing the first route selection index value of the route that accommodates the first path; and a path selection unit that selects a second path for a route having the second route selection index value being minimum from among the route candidates. | 2019-08-01 |
20190238452 | SYSTEM AND METHOD FOR LOW-LATENCY NETWORK DATA SWITCHING - Method and systems for data switching, including receiving first input data at a network switching system comprising a crosspoint switch and a data processing card; transmitting the first input data from the crosspoint switch to the data processing card; making a first determination, by the data processing card, that the first input data meets a first pre-determined filtering criterion; and transmitting, based on the first determination, the first input data from a first crosspoint switch port of the crosspoint switch towards a first client. | 2019-08-01 |
20190238453 | END-TO-END QUALITY-OF-SERVICE IN A NETWORK-ON-CHIP - An example method of generating a configuration for a network on chip (NoC) in a programmable device includes: receiving traffic flow requirements for a plurality of traffic flows; assigning routes through the NoC for each traffic flow based on the traffic flow requirements; determining arbitration settings for the traffic flows along the assigned routes; generating programming data for the NoC; and loading the programming data to the programmable device to configure the NoC. | 2019-08-01 |
20190238454 | Datapath Provision in Software Defined Networks | 2019-08-01 |
20190238455 | MULTIPATH ADJUSTMENTS - An example network controller including: a processing resource; and a memory resource storing machine readable instructions to cause the processing resource to adjust, responsive to a factor whose corresponding value is independent of a traffic state of a particular data path, an availability of the particular data path between two of the plurality of static nodes such that the plurality of static nodes are allowed to communicate within a network via the particular data path made available. | 2019-08-01 |
20190238456 | MULTI-TENANT ROUTING MANAGEMENT - Techniques are disclosed relating to establishing routes to access services executing on host computer systems. In some embodiments, a computing system receives a request to distribute routing data for a first service to switches of a plurality of host computer systems. The first service is one of a plurality of services belonging to a plurality of tenants supported by the plurality of host computer systems. The computing system analyzes the routing data to determine whether distribution of the routing data is in accordance with a set of criteria established for a first tenant associated with the first service. Based on the analyzing, the computing system permits communication of the routing data via one or more border gateway protocol (BGP) update messages to the switches. | 2019-08-01 |
20190238457 | EFFICIENT VPN ROUTE REFRESH MECHANISM FOR BGP BASED VPN TECHNOLOGIES - A method is implemented by a network device to optimize the operation of a virtual private network (VPN) route refresh for border gateway protocol (BGP). The method reduces a span of VPN databases to be traversed to perform a route target constraint (RTC) update at the network device. The method includes receiving an RTC add or delete from a BGP peer, looking up each route target (RT) in a route target-route distinguisher (RT-RD) map to get a set of route distinguishers (RDs), and generating a VPN update for each VPN Address Family (AF) and each RD in the RD cache and sending the VPN update to a respective BGP peer. | 2019-08-01 |
20190238458 | DYNAMIC LOOKUP OPTIMIZATION FOR PACKET CLASSIFICATION - A method is implemented by a network device to dynamically optimize lookup speed in a packet processing table maintained at the network device while the network device is in operation. The method includes determining one or more runtime metrics of the packet processing table, selecting a lookup algorithm for the packet processing table from a set of lookup algorithms supported by the network device based on the one or more runtime metrics of the packet processing table, and configuring the network device to match incoming packets against rules in the packet processing table using the selected lookup algorithm for the packet processing table. | 2019-08-01 |
20190238459 | DYNAMIC ALLOCATION OF MEMORY FOR PACKET PROCESSING INSTRUCTION TABLES IN A NETWORK DEVICE - A method for operating a network device, having data storage with selectably modifiable capacity for storing instructional data for a packet processing operation, includes detecting a need for additional storage for the instructional data, allocating an additional memory block without interrupting operation of the network device, associating with the additional memory block an additional address hashing function, different from each of at least one respective previous address hashing function associated with any previously-allocated memory block. Each respective previous address hashing function transforms a look-up key into a respective addressable location in a previously-allocated memory block, and the additional address hashing function transforms the look-up key into an addressable location in the additional memory block. When a block is deallocated, each unit of instructional data is reprocessed through the hashing function of a different block to which the unit of the instructional data will be moved. | 2019-08-01 |
20190238460 | AVAILABILITY OF CONTEXT INFORMATION FOR PACKET PROCESSING - Some examples provide for storage of context information in memory in the process of creating a network connection and subsequent availability of the context information. A context address can refer to context for a packet processing path. A host can provide a context address and associated packet characteristics to a network interface device. If the network interface device receives a packet with the characteristics, the context address can be passed to the host and the host can retrieve the context information using the context address. | 2019-08-01 |
20190238461 | SYSTEMS AND METHODS FOR IDENTIFYING CANDIDATE FLOWS IN DATA PACKET NETWORKS - A computer-implemented method and a transport manager system operate to reduce network congestion by detecting one or more data flows in a network, determining, using a candidate flow detection threshold, whether a data flow of the one or more data flows is a candidate flow, the candidate flow detection threshold being based on one or more characteristics of the one or more data flows, and in response to determining that the data flow is the candidate flow, managing the data flow. A consumption rate, a duration, a number of bytes communicated, a throughput, or aggregated characteristics of the one or more data flows may be used to determine the candidate flow detection threshold. | 2019-08-01 |