52nd week of 2016 patent applcation highlights part 66 |
Patent application number | Title | Published |
20160380768 | DATA MANAGEMENT DEVICE, SYSTEM, RE-ENCRYPTION DEVICE, DATA SHARING DEVICE, AND STORAGE MEDIUM - A data management device according to an embodiment stores first encrypted data obtained by encrypting plain text data with a first public key of a first user device. The data management device stores a first re-encryption key for re-encrypting the first encrypted data without decrypting to obtain first re-encrypted data decryptable with a private key of a second user device. The data management device stores a conversion key generated from a first private key corresponding to the first public key and a second private key of the first user device. The data management device converts the first encrypted data into second encrypted data with the conversion key. The data management device The data management device converts the first re-encryption key into a second re-encryption key with the conversion key. | 2016-12-29 |
20160380769 | METHOD AND APPARATUS FOR SECURE RECORDATION OF TIME OF ATTEMPTED BREACH OF IC PACKAGE - An integrated circuit (IC) package includes a storage element and a protection component coupled to the storage element. The protection component includes a breach detection component configured to detect an attempted breach of the IC package. The protection component further includes a time detection component configured to determine a breach timestamp associated with a time of occurrence of the attempted breach and configured to store a representation of the breach timestamp in the storage element. The storage element may be configured to store a sensitive datum, and the time detection component may be configured to store the representation of the breach timestamp by overwriting the sensitive datum in the storage element with the representation of the breach timestamp. | 2016-12-29 |
20160380770 | System and Method for Hash-Based Data Stream Authentication - An authentication system and a method of creating a secure check value used by the system to verify the integrity and authenticity of data. The authentication system comprises one or more processors, data stores, and network interfaces that can communicate among themselves and with other devices. The secure check value is created by combining some or all of a cryptographic digest with the data to be secured and then outputting a secure check value by using a checksum or hash. The secure check value is associated with the data and can be used to verify the integrity and authenticity of the data after transferring the data and check value to a different location or at some point in the future. | 2016-12-29 |
20160380771 | BINARY CODE AUTHENTICATION - The description particularly relates to methods for authenticating binary code stored in a smart card. The description also relates to systems and a computer program capable of implementing said methods, as well as to storage media containing such a computer program. | 2016-12-29 |
20160380772 | KEYED-HASH MESSAGE AUTHENTICATION CODE PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS - A processor of an aspect includes a decode unit to decode a keyed-hash message authentication code instruction. The keyed-hash message authentication code instruction is to indicate a message, to indicate at least one value that is to represent at least one of key information and key indication information, and to indicate a destination storage location. An execution unit is coupled with the decode unit. The execution unit, in response to the keyed-hash message authentication code instruction, is to store a message authentication code corresponding to the message in the destination storage location. The message authentication code is to be consistent with a keyed-hash message authentication code algorithm that is to use a cryptographic hash algorithm. The message authentication code is to be based on a cryptographic key associated with the at least one value. Other processors, methods, systems, and instructions are disclosed. | 2016-12-29 |
20160380773 | Numeric Pattern Normalization for Cryptographic Signatures - A system for numeric pattern normalization for cryptographic signatures is provided. The system includes a resolving client, and an at least one signature server. The at least one signature server includes at least one processor and non-transitory computer readable media having encoded thereon computer software comprising a set of instructions executable by the at least one processor. The set of instructions may be executed by the signature server to generate a message to be transmitted to a resolving client, normalize the message via numeric pattern normalization, generate a hash value for the normalized message, and generate a cryptographic signature based on the hash value. The signature server may then generate a signed message having the message signed with the cryptographic signature, and transmit the signed message to the resolving client. | 2016-12-29 |
20160380774 | VIRTUAL CREDENTIALS AND LICENSES - Providing virtualized credentials of a holder includes authorizing a subset of credential data to be sent to a device of a relying party that is different from the holder, where the subset of credential data depends on a role of the relying party, selection by the holder, and/or contextual data of the relying party and includes displaying the subset of credential data on a screen of the device of the relying party. The contextual data may be a privacy level setting, distance between the relying party and the holder, and/or geolocation of the relying party. The role of the relying party may be provided by the relying party. Role information provided by the relying party may be provided in a verifiable format. The role information may be digitally signed or securely derived and determined by a mutual authentication algorithm between the relying party and the holder. | 2016-12-29 |
20160380775 | ROBOT MITIGATION - Computer systems, such as a client and a server operably interconnected via a network, are subject to stress on computational resources due to an abundance of automated-user traffic. To improve resource functionalities and control the resources available to automated-agents, value information of valuable assets is encrypted such that a client must perform an algorithm for calculating a decryption key in order to view the unencrypted content. Wherein the encryption is tuned in such a way that any computational delay caused by the encryption is imperceptible to a human-user and largely perceptible to an automated-agent such that the need to determine if a user is an automated-user or a human-user is irrelevant. | 2016-12-29 |
20160380776 | SECURED NEIGHBOR DISCOVERY REGISTRATION UPON DEVICE MOVEMENT - In one embodiment, a device in a network receives a request from a neighbor of the device to add the neighbor as a child of the device in the network. The request includes a signed address registration certificate that certifies that a network address of the neighbor is registered in the network. The device determines whether the signed address registration certificate is valid. The device adds the neighbor as a child of the device in the network based on a determination that the signed address registration certificate is valid. | 2016-12-29 |
20160380777 | POWER INSERTION DEVICE FOR HYBRID FIBER AND POWER NETWORK - A power insertion device includes: an input interface, configured for receiving a fiber connection from a fiber network; an output interface, comprising one or more hybrid cables for connection to one or more end devices, each of the hybrid cables including fiber for data communication and wire for power transmission; a mains power interface, configured to receive alternating current (AC) mains power; one or more power supplies, configured to convert the AC mains power to direct current (DC) power; and a power insertion board, configured to provide power insertion of the DC power out through the one or more hybrid cables. | 2016-12-29 |
20160380778 | A Master Device and Methods Therein - A master device | 2016-12-29 |
20160380779 | COMMUNICATION SYSTEM - A system is provided in which a user device communicates control data with a first base station and communicates user data with a second base station. The user device receives, from the first base station, configuration data specific to the first base station and configuration data specific to the second base station for configuring the user device to handle in-device coexistence interference. When the user device detects interference, it identifies the base station to which the interference relates, and controls the operating of its transceiver circuitry: i) using the first base station specific configuration data if it identifies that the interference is related to the first base station; and ii) using the second base station specific configuration data if it identifies that the interference is related to the second base station. | 2016-12-29 |
20160380780 | Systems and Methods for Simultaneously Sharing Media Over a Network - Systems and methods presented herein may allow a sending user to collaboratively share media content with recipients such that each recipient may control media playback, and the controls effect the playback experienced by the other recipients. The net result is a shared media player. The recipients may all execute a common client software on their computing devices that causes the computing devices to stream the media from a content provider but route playback control selections to a server that then transmits the selections to the other recipients in real time. | 2016-12-29 |
20160380781 | DISTRIBUTED CCAP CABLE MODEM TERMINATION SYSTEM - Distributed CMTS device for a HFC CATV network serving multiple neighborhoods by multiple individual cables, in which at least some and often all of the QAM modulators that provide data for the individual cables are remote QAM modulators ideally located at the fiber nodes. A CCAP set of IP/on-demand data is transmitted to the nodes using an optical fiber, often using digital protocols such as Ethernet protocols. Optionally a basic set of legacy CATV QAM data, transmitted using RF waveforms transposed to optical frequencies, may also be transmitted to the nodes using either the same or different optical fiber. The nodes extract the data specific to each neighborhood, and inject this data into unused cable QAM channels along with any optional legacy CATV QAM waveforms as desired, thus achieving improved data transmission rates through finer granularity. A computerized “virtual shelf” control system for this system is also disclosed. | 2016-12-29 |
20160380782 | REMOTE CARE SYSTEM FOR APARTMENT BUILDING AND REMOTE MONITORING APPARATUS USED THEREIN - A remote care system for an apartment building includes: a home electric appliance installed in a housing unit structuring an apartment building; a sensor that is provided in the home electric appliance and senses the behavior of a resident in the housing unit; and a remote monitoring apparatus that remotely controls the home electric appliance installed in each of a plurality of housing units based on sensing information transmitted from the sensor. This realizes implementation and operation of a remote care system for an apartment building using a major appliance used in ordinary households. | 2016-12-29 |
20160380783 | 128 Gigabit Fibre Channel Speed Negotiation - The FC port state machine enhanced by determining if various lanes are configured to be operated in 128 Gbps mode by operating as parallel lanes as indicated by using a reserved bit in a link training field. If so and if all of the ports are 32 Gbps ports and pass training, then four lanes can be combined to form a 128 Gbps link. If the ports are configured for 128 Gbps only operation and at least one lane does not negotiate to 32 Gbps or fails training, the link is not activated and none of the lanes are activated. If the ports are configured to do either 128 Gbps or independent operation and at least one lane cannot operate at 128 Gbps, then the lanes operate independently at the negotiated and trained speed. If the lanes are configured for only independent operation the transceiver develops independent links as negotiated. | 2016-12-29 |
20160380784 | CIRCUIT AND METHOD FOR PERFORMING ADAPTION ON ALL RECEIVER BRANCHES - Receiver circuitry is disclosed that can take circuit branches offline to possibly adapt an offset value. In one embodiment, a circuit in a receiver has at least two branches. Each branch includes an adjustor to adjust the branch signal by an offset value. Selection circuitry takes one of the branches offline by selecting the output of that branch as an offline value, and by selecting the output of one or more of the other branches as a data decision value. The selection circuitry changes which branch is taken offline during the operation of the circuit. When a branch is taken offline, an offset value associated with that branch may be updated, if necessary. | 2016-12-29 |
20160380785 | ELECTRONIC APPARATUS AND METHOD FOR IMPROVING QUALITY OF TRANSMITTED SIGNAL, AND SYSTEM FOR THE SAME - The present disclosure relates to an improvement in the quality of a transmitted signal, and more particularly, to an electronic apparatus and a method which are provided with a passive equalizer improving the quality of a transmitted signal when a signal is transmitted/received to/from an external apparatus, and a system for the same. The present disclosure provides a signal transmission system for improving the quality of a transmitted signal. The signal transmission system may include a transmitter that transmits a signal; a receiver that receives the signal from the transmitter; a channel that is formed between the transmitter and the receiver and transmits the signal delivered by the transmitter; and a passive equalizer that is formed between the transmitter and the receiver and controls the signal so as to have a higher impedence than a predetermined impedance at a lower frequency than a predetermined frequency of the signal. | 2016-12-29 |
20160380786 | DECISION FEEDBACK EQUALIZER ROBUST TO TEMPERATURE VARIATION AND PROCESS VARIATION - A decision feedback equalizer includes a positive signal line, a negative signal line, a sense amplifier, a feedback driver, a load unit, a differential driver, and a charge pump. The differential driver maintains a difference between the first voltage of the positive signal line and the second voltage of the negative signal line at a last time point of the normal period to be equal to or greater than the reference voltage by adjusting strength of the positive input current corresponding to a positive input signal and strength of the negative input current corresponding to a negative input signal based on a temperature signal. The charge pump provides a positive offset voltage and a negative offset voltage to the positive signal line and the negative signal line, respectively. The positive offset voltage and the negative offset voltage are used to maintain an average voltage of the first voltage and the second voltage at the last time point of the normal period at a first value. | 2016-12-29 |
20160380787 | HIGH SPEED COMMUNICATIONS SYSTEM - Transmission of baseband and carrier-modulated vector codewords, using a plurality of encoders, each encoder configured to receive information bits and to generate a set of baseband-encoded symbols representing a vector codeword; one or more modulation circuits, each modulation circuit configured to operate on a corresponding set of baseband-encoded symbols, and using a respective unique carrier frequency, to generate a set of carrier-modulated encoded symbols; and, a summation circuit configured to generate a set of wire-specific outputs, each wire-specific output representing a sum of respective symbols of the carrier-modulated encoded symbols and at least one set of baseband-encoded symbols. | 2016-12-29 |
20160380788 | SYSTEMS AND METHODS TO DYNAMICALLY CALIBRATE AND ADJUST GAINS IN A DIRECT CONVERSION RECEIVER - Method embodiments are provided herein for dynamically calibrating and adjusting a direct conversion receiver system. One embodiment includes applying one or more gain control signals to one or more gain elements of a receiver system, where the applying one or more gain control signals results in a gain change to the receiver system; in response to the gain change, determining whether the receiver system exhibits a DC (direct conversion) offset; and in response to a determination that the receiver system exhibits the DC offset, applying one or more DC offset correction control signals to one or more gain elements of the receiver system, where the one or more DC offset correction signals are configured to correct the DC offset. | 2016-12-29 |
20160380789 | Media Relay Server - A media session between an initiating endpoint and a responding endpoint is established. A set of candidate pairs is generated at the endpoint. Each of the candidate pairs comprises a respective network address available to the initiating endpoint and a respective network address available to the responding endpoint. The set of candidate pairs is generated by exchanging network addresses between the initiating endpoint and the responding endpoint. The media session is established using a candidate pair of the set determined to be valid by the endpoints performing connectivity checks for at least one candidate pair of the set to determine whether or not the candidate pair is valid. The set includes a multiplexed relayed candidate pair, which comprises a multiplexed relayed candidate. The multiplexed relayed candidate comprises a unique session identifier to allow multiple media streams to be relayed via the same port of the media relay server simultaneously. | 2016-12-29 |
20160380790 | RELAYING APPARATUS - A communication network includes relaying apparatuses, each including redundant-route ports providing communication routes between the relaying apparatuses. The relaying apparatus determines whether a first frame received via a usual port is highly important. The first frame being highly important is transmitted via the respective redundant-route ports; the first frame being not highly important is transmitted via one redundant-route port. The relaying apparatus receives a second frame being highly important via the respective redundant-route ports; the second frame has a transmission destination corresponding to an apparatus connected with the relaying apparatus via the usual port. The relaying apparatus makes determination whether or not all the second frames received via the respective redundant-route ports accord with each other. With affirmative determination, one of the second frames is transferred to the transmission destination. With negative determination, all the second frames are cancelled. | 2016-12-29 |
20160380791 | INTERFERENCE ESTIMATION - An interference estimation method and a communication device configured to estimate interference. The interference estimation method can include determining a first communication channel of a first uplink communication signal of a first communication protocol and determining a second communication channel of a second downlink communication signal of a second communication protocol. The method can further include: determining frequency spacing between the first uplink communication signal and the second downlink communication signal; determining the PSD of the transmit signal within the receiver bandwidth of the second downlink communication signal; and determining the transmit noise floor from the first uplink communication signal in the receiver bandwidth. Power integration terms can be determined based on the overall PSD of the transmit signal from first uplink communication signal within the second downlink communication channel. An interference estimation can be calculated using the interference power integration term(s). | 2016-12-29 |
20160380792 | RECEIVING METHOD AND RECEIVER FOR SATELLITE-BASED AUTOMATIC IDENTIFICATION SYSTEMS - A method for demodulating a received signal relating to a sequence of transmitted symbols that have been modulated by continuous phase modulation includes normalizing samples of a sequence of samples generated from the received signal, to obtain a normalized sequence of samples, wherein an amplitude of each sample of the normalized sequence of samples has an absolute value equal to unity; estimating, on the basis of the normalized sequence of samples, a time offset and a frequency offset of the received signal, and using the estimated time offset and the estimated frequency offset for compensating the normalized sequence of samples for the time and frequency offsets, to obtain a compensated sequence of samples; and determining a sequence of symbols corresponding to the transmitted sequence of symbols on the basis of the compensated sequence of samples. Also disclosed is a receiver for demodulating a received signal relating to a sequence of transmitted symbols that have been modulated by continuous phase modulation. | 2016-12-29 |
20160380793 | SIGNAL TRANSMISSION APPARATUS AND MULTICARRIER COMMUNICATION SYSTEM - A signal transmission apparatus and multicarrier communication system that includes: a first receiving unit configured to receive a probe signal transmitted by transmitting end; wherein, the signal is generated according to characteristics of recommended signal configuration obtained by previous signal to noise ratio (SNR) probings; a first processing unit configured to probe a channel SNR according to the signal; a first determining unit configured to determine transmission signal configuration and signal transmission performance according to a final channel SNR obtained by multiple times of SNR probing; and a first transmitting unit configured to transmit the configuration and the performance to the transmitting end, so that the transmitting end transmits an actual transmission signal according to the configuration and the performance. With the embodiments, accuracy of probing a nonlinear channel SNR is improved, and reliability and stability of the communication system are guaranteed. | 2016-12-29 |
20160380794 | SYSTEMS AND METHODS FOR IMPLEMENTING AN OFDMA LTF DESIGN FOR WIRELESS NETWORK COMMUNICATION - Systems, methods, and apparatuses are disclosed herein for aligning HE-LTFs corresponding to a plurality of users by determining a respective number of spatial streams corresponding to each user, determining a highest respective number of spatial streams of the spatial streams, and setting an alignment number of HE-LTF symbols to be equal to or larger than the highest respective number of spatial streams. For each respective user, a respective matrix of HE-LTF symbols corresponding to the respective number of spatial streams of the respective user is selected, and it is determined whether the respective matrix of HE-LTF symbols has fewer symbols than the alignment number. In response to determining that the respective matrix of HE-LTF symbols has fewer symbols than the alignment number, padding symbols may be added to the respective matrix to yield a number of HE-LTF symbols in the respective matrix that corresponds to the alignment number. | 2016-12-29 |
20160380795 | OFDM-CDMA EQUIPMENT AND METHOD - An OFDM signal transmission apparatus is provided, which includes a mapping unit configured to map first signals into N subcarriers and second signals into M subcarrier(s) to form an OFDM signal, wherein N is larger than M. The first signals are each indicating a same bit of retransmission information and the second signals are each indicating a same bit of information other than retransmission information. The OFDM signal transmission apparatus further includes a transmitting unit configured to transmit the formed OFDM signal. | 2016-12-29 |
20160380796 | Peak To Average Power Ratio Suppression - A transmitter comprises a first peak-to-average-power ratio (PAPR) suppression circuit and a second peak-to-average-power ratio (PAPR) suppression circuit. The first PAPR suppression circuit may receive a first sequence of time-domain symbols to be transmitted, alter the first sequence based on each of a plurality of symbol ordering and/or inversion descriptors to generate a corresponding plurality of second sequences of time-domain symbols, measure a PAPR corresponding to each of the second sequences, select one of the plurality of symbol ordering and/or inversion descriptors based on the measurement of PAPR, and convey the selected one of the symbol ordering and/or inversion descriptors to the second PAPR suppression circuit. The second PAPR suppression circuit may receive the first sequence of time-domain symbols to be transmitted, and alter the first sequence based on the selected one of the symbol ordering and/or inversion descriptors to generate a reordered and/or inverted symbol sequence. | 2016-12-29 |
20160380797 | APPARATUS, METHOD, AND COMPUTER PROGRAM FOR COMMUNICATING ONE OR MORE SYMBOLS WITH MULTIPLE PILOT SIGNALS AND NULLS - An apparatus, method, and computer program product are provided for communicating one or more symbols with multiple pilot signals and nulls. In use, one or more symbols are communicated including a plurality of pilot signals and a plurality of nulls, for use in generating a plurality of coefficients. | 2016-12-29 |
20160380798 | UART With Line Activity Detector - A universal asynchronous receiver/transmitter (UART) module is disclosed. The UART module may include an edge detector coupled with a data line of the UART module, wherein the edge detector resets a counter on a rising and a falling edge. | 2016-12-29 |
20160380799 | METHOD AND APPARATUS FOR TUNING FINITE IMPULSE RESPONSE FILTER IN IN-BAND FULL DUPLEX TRANSCEIVER - A method and an apparatus for tuning an FIR filter in an in-band full duplex transceiver. The method for tuning an FIR filter may include: setting attenuation of the FIR filter to be a first value and then estimating input information of the FIR filter; estimating a delta response using the estimated input information of the FIR filter; and updating the attenuation of the FIR filter to a second value using the estimated delta response. | 2016-12-29 |
20160380800 | Efficient Constellation - Methods and apparatus for efficient mapping and demapping of constellation are described; the distance calculations are completely removed from the demapping process. | 2016-12-29 |
20160380801 | SWITCH, DEVICE AND METHOD FOR CONSTRUCTING AGGREGATED LINK - A switch, a device and a method for constructing an aggregated link are provided. A switch for constructing an aggregated link with multiple peer devices is provided. The switch includes multiple ports supporting different connection protocols, with each port being used for connecting to a peer device. The switch further includes a sub-aggregated link constructing unit used for aggregating one or more ports running the same protocol in the switch into a sub-aggregated link, and a control unit used for forming an aggregated link from all the sub-aggregated links. | 2016-12-29 |
20160380802 | METHODS AND APPARATUSES FOR FACILITATING P-CSCF RESTORATION WHEN A P-CSCF FAILURE HAS OCCURRED - A method of facilitating P-CSCF restoration when a P-CSCF failure has occurred is disclosed. The method comprises a Proxy Call Session Control Function, ‘P-CSCF’ receiving a Session Initiation Protocol, ‘SEP’, message when said P-CSCF has been selected as an alternative P-CSCF to a failed P-CSCF and providing, to an associated Policy and Charging Rules Function, ‘PCRF’, a message comprising an indication that P-CSCF restoration is required. | 2016-12-29 |
20160380803 | RANKING COMPUTER MODULES - A non-transitory computer-readable storage medium may include instructions stored thereon for ranking multiple computer modules to reduce failure impacts. When executed by at least one processor, the instructions may be configured to cause a computing system implementing the multiple computer modules to at least associate the multiple computer modules with multiple services that rely on the multiple computer modules, at least one of the multiple services relying on more than one of the multiple computer modules, determine values of the multiple services, and rank the multiple computer modules based on the determined values of the multiple services with which the respective multiple computer modules are associated. | 2016-12-29 |
20160380804 | STORAGE CONTROL APPARATUS AND STORAGE CONTROL METHOD - A storage system includes a storage apparatus and a server apparatus. The storage apparatus includes a switching unit, a first storage control apparatus, and a second storage control apparatus. The first storage control apparatus includes a storage unit and a control unit. The storage unit stores path connection information. On detecting a restart condition of the second storage control apparatus, the control unit switches a second port from being connected at the switching unit to the second storage control apparatus on a second path to being connected to the first storage control apparatus on a third path, based on the path connection information, and then instructs the second storage control apparatus to restart. | 2016-12-29 |
20160380805 | MOBILE COMMUNICATION METHOD, MOBILE STATION, AND RADIO BASE STATION - A reconnection procedure is successfully performed even when a connection destination radio base station does not manage “UE Context” for a mobile station UE. A mobile communication method according to the present invention includes a step B in which the mobile station UE transmits CGI of cell # | 2016-12-29 |
20160380806 | IDENTIFYING PERFORMANCE-DEGRADING HARDWARE COMPONENTS IN COMPUTER STORAGE SYSTEMS - Performance-degrading hardware components in computer storage systems are identified. A timed-out input/output (I/O) operation is detected. Hardware components that include a plurality of types of hardware components involved with the timed-out I/O operation are identified. Involve counts of the hardware components are increased. A plurality of suspicious hardware components are identified based, at least in part, on a hardware hierarchy including one or more types of hardware components. There is at most one suspicious hardware component for each type of hardware component. A performance-degrading hardware component is identified from among the plurality of suspicious hardware components based, at least in part, on the involve counts and the hardware hierarchy. The performance-degrading hardware component is in a layer of the hardware hierarchy that is lower than layers including other suspicious hardware components. | 2016-12-29 |
20160380807 | EFFICIENT MANAGEMENT OF NETWORK CONFIGURATION-DEPENDENT NETWORK FUNCTIONALITY - Notifications associated with software-defined network components are registered for. A notification is received in accordance with the registration. It is determined that the notification indicates a configuration change to a network associated with the software-defined network components. In response to a determination that the notification indicates the configuration change, a network topology associated with the network is determined. It is determined that one or more network functionalities are impacted by the configuration change based, at least in part, on the network topology. In response to a determination that the one or more network functionalities are impacted by the configuration change, the one or more network functionalities are updated based, at least in part, on the network topology. | 2016-12-29 |
20160380808 | DYNAMICALLY MANAGING DIFFERENT VERSIONS OF A SERVICE - A management portal receives an input indicating that a management operation is to be performed on a service. The management portal dynamically hosts a management interface for performing the management operation on different versions of the service. | 2016-12-29 |
20160380809 | SYSTEMS, METHODS, AND APPARATUS TO CONFIGURE EMBEDDED DEVICES - Systems, methods, and apparatus to configure embedded devices are described. An example apparatus includes a network interface to communicatively couple the apparatus with a network, an antenna to receive a radio frequency signal including 1) configuration data and 2) power, a memory coupled to the antenna to receive the power and to store the configuration data, a network configurer to retrieve the configuration data from the memory and to configure the network interface based on the retrieved data, and a power source other than the antenna to provide power to the memory and the network configurer during operation of the network configurer. | 2016-12-29 |
20160380810 | Configuration Management for Nodes in a Network - Disclosed are various embodiments for managing configuration changes applied to node devices in a network. Expected and target configuration files for a node are obtained, where the configuration files specify various parameters with corresponding values. A computing device determines a different one of the parameters having different corresponding values between the configuration files. A governing one of the parameters on which the different parameter depends is determined based at least in part upon a parameter reference. The computing device calculates a checksum for the governing parameter based at least in part upon a corresponding value of the governing parameter. Instructions are generated to calculate a checksum for the governing parameter currently configured in the node. The instructions further specify that, in response to the checksums matching, the different parameter in the node should be configured with a corresponding value of the different parameter as specified by the target configuration file. | 2016-12-29 |
20160380811 | APPLICATION HIERARCHY SPECIFICATION WITH REAL-TIME FUNCTIONAL SELECTION - A preferred communication application hierarchy that specifies user priorities for application selection for communication sessions and functional communication capabilities of each prioritized application is configured for at least one user of a group of users. A real-time communication request, initiated by a user with a configured preferred communication application hierarchy, is detected that specifies a particular type of communication functionality and that includes an indication of another one of the group of users as a requested communication recipient. Responsive to detecting the real-time communication request that specifies the particular type of communication functionality, a highest-priority application usable to perform the specified particular type of communication functionality with a communication device of the requested communication recipient is selected from the configured preferred communication application hierarchy of the requesting user. | 2016-12-29 |
20160380812 | CONTROL PLANE INTEGRATION WITH HARDWARE SWITCHES - Some embodiments provide a managed hardware forwarding element (MHFE) controller that serves as an intermediary between one or more central controllers in a central control plane (CCP) cluster and one or more third-party hardware devices (e.g., physical switches and routers, applicances such as firewalls, load balancers, etc.). The MHFE controller of some embodiments uses (i) a first protocol to communicate with the CCP cluster and (ii) a second protocol to communicate with the one or more third-party devices managed by the MHFE controller, thereby enabling the CCP cluster to distribute logical network configuration information to the physical workloads (e.g., third-party servers connected to a third-party Top of Rack (TOR) switch). | 2016-12-29 |
20160380813 | CONFIGURATION OF DISTRIBUTED DATA ACQUISITION EQUIPMENT - Configuring distributed data acquisition equipment including at least one data collection unit and at least one data acquisition unit coupled to the data collection unit, including obtaining configuration data for the at least one data acquisition unit, generating a message comprising the configuration data, transmitting said message to a data collection unit coupled to the at least one data acquisition unit, extracting in the data collection unit the configuration data, and transmitting the extracted configuration data to the at least one data acquisition unit. | 2016-12-29 |
20160380814 | SYSTEMS AND METHODS FOR PROVISIONING A BATTERY-POWERED DEVICE TO ACCESS A WIRELESS COMMUNICATIONS NETWORK - In some aspects, the present disclosure provides a method of associating a device with a wireless communications network. The method includes receiving a signal from a second device, the signal received using an element configured to sense at least one of sound or vibration. The method further includes interpreting the signal in order to determine one or more parameters for a wireless communications network. The method also includes associating with the wireless communications network, based at least in part on the one or more parameters. | 2016-12-29 |
20160380815 | PROVISIONING LOGICAL ENTITIES IN A MULTI-DATACENTER ENVIRONMENT - A system provisions global logical entities that facilitate the operation of logical networks that span two or more datacenters. These global logical entities include global logical switches that provide L2 switching as well as global routers that provide L3 routing among network nodes in multiple datacenters. The global logical entities operate along side local logical entities that are for operating logical networks that are local within a datacenter. | 2016-12-29 |
20160380816 | SYSTEM AND METHOD FOR CONFIGURING A DATA ACCESS SYSTEM - A data access configuration system includes, not limited to, a configuration tool, a configuration library, a plurality of configuration files, a data server and an acquisition engine. The configuration library is configured to communicate with the configuration tool. The configuration library includes, not limited to, a plurality of configuration Application Programming Interfaces (APIs). The plurality of configuration files are generated by the APIs. The data server includes, not limited to, a data server configuration module. The acquisition engine includes, not limited to, an acquisition engine configuration module. The acquisition engine is configured to communicate with at least one data source, the at least one data source is configured to communicate with a plurality of field devices to retrieve data. The configuration library is configured to manage the data server configuration module and the acquisition engine configuration module. | 2016-12-29 |
20160380817 | ASSESSING COMPUTING ENVIRONMENT CHANGES USING SPECIFICATION DOCUMENTS - According to one embodiment of the present invention, a system analyzes an environment specification document that specifies a proposed configuration of a full-stack environment for a computing system and that describes infrastructure, middleware, and application elements. The system correlates the environment specification document with an environment instantiated on the computing system from the environment specification document. The system determines an impact of changes in the proposed configuration on the environment instantiated on the computing system, and configures the computing system in accordance with the proposed configuration based on the determined impact. Embodiments of the present invention further include a method and computer program product for analyzing an environment specification document in substantially the same manners described above. | 2016-12-29 |
20160380818 | TDM NETWORK CALL WITH COMPOUND SERVICE LAYER AGREEMENT - A method, implemented in a network with a control plane, is described for creating a compound Service Level Agreement (SLA) call for a Time Division Multiplexing (TDM) service in the network. The method includes creating the call with a non-preemptible component and a preemptible component, the compound SLA comprising the non-preemptible component and the preemptible component; implementing endpoints for the call at a source node and a destination node; and responsive to a preemption event in the network, removing the preemptible component at the endpoints. A node and network are also described. | 2016-12-29 |
20160380819 | CONFIGURING ACCELERATION COMPONENTS OVER A NETWORK - Aspects extend to methods, systems, and computer program products for (re)configuring acceleration components over a network. (Re)configuration can be implemented for any of a variety of reasons, including to address an error in functionality at the acceleration component or to update functionality at the acceleration component. During (re)configuration, connectivity can be maintained for any other functionality at the acceleration component untouched by the (re)configuration. Network (re)configuration of acceleration components facilitates management of acceleration components and accelerated services from a centralized service. Network (re)configuration of acceleration components also relieves host components from having to store (potentially diverse and numerous) image files. | 2016-12-29 |
20160380820 | Reconfiguring Wireless Networks By Predicting Future User Locations and Loads - Wireless networks may be dynamically reconfigured based at least in part on predicted future user device locations. The predicted future user device locations may be used to, for example, to offload user devices to small cells or WiFi networks. The predicted future user device locations may additionally or alternatively be used for targeting directional signals and/or for beam forming for multi-user multi-input/multi-output systems. | 2016-12-29 |
20160380821 | REMOTE ELECTRICAL TILT ANTENNA MANAGEMENT APPARATUS, SYSTEM, AND METHOD, REMOTE CONTROLLER, AND BASE STATION - The present application provides a remote electrical tilt antenna management apparatus, system, and method, a remote controller, and a base station. The method includes: obtaining, by a remote control unit RCU, a first permission configuration file, where the first permission configuration file includes information about a first permission of a first base station to perform an operation on a first remote electrical tilt RET unit, and the first permission includes at least query or control; and configuring, by the RCU according to the first permission configuration file, the first permission of the first base station to perform an operation on the first RET. In this way, the first base station implements configuration of a management operation on the first RET, thereby implementing, by configuring different permission configuration files on the RCU, that a same base station manages different RETs, and further improving operability of managing a RET. | 2016-12-29 |
20160380822 | EXPANDABLE DISTRIBUTED CORE ARCHITECTURES HAVING RESERVED INTERCONNECT BANDWIDTHS - A network system for an expandable distributed core architecture (“DCA”) includes multiple spine switches, multiple leaf switches coupled thereto, and a plurality of interconnections coupling each of the spine switches to each of the leaf switches. Servers, storage, and other system items and resources can be coupled to the leafs via downlinks and uplinks. Each of the plurality of spine switches includes at least one unused spine port that is reserved for a future expansion of the DCA in order to accommodate the addition of at least one other separate leaf switch to the at least one unused spine port. Additional ports can be unused and reserved for future expansion additions of more leafs and/or more spines. Also, a computing system assists in the design of the specific number and configuration of spines, leafs and interconnections based upon user inputs regarding current and future system needs. | 2016-12-29 |
20160380823 | VIRTUAL PRIVATE NETWORK FORWARDING AND NEXTHOP TO TRANSPORT MAPPING SCHEME - A method is provided in one example embodiment and includes configuring on a network element a first tunnel from the network element to a first network, wherein the configuring comprises mapping a nexthop address of the local network element to a transport address of the tunnel on the network to create a first nexthop-to-transport mapping for the network element; and advertising the first nexthop-to-transport mapping along with routing information for the network element to remote network elements. | 2016-12-29 |
20160380824 | TECHNIQUES AND SYSTEMS FOR ENFORCEMENT OF ON-DEMAND CUSTOMIZED MOBILE DATA SERVICES - Techniques for enforcing a data service package are described. A method may comprise receiving a network data packet from a client device; determining an originating application and a data end point from the network data packet; determining whether a policy in a policy store allows the client device to access a cellular data network; and forwarding the network data packet to the data end point on the cellular data network when a policy does allow the access. Other embodiments are described and claimed. | 2016-12-29 |
20160380825 | METHOD AND ASSOCIATED APPARATUS FOR APPLYING DEVICE MANAGEMENT RULES IN ROUTER - A method for applying device management rules in a router and associated apparatus are provided, in which the method includes: providing a user of the router with a drag-and-drop user interface (UI), and outputting display data of a plurality of icons respectively with respect to a plurality of neighboring electronic devices, for displaying the plurality of icons on the drag-and-drop UI to allow the user to drag and drop at least one icon of the plurality of icons; and according to user inputs obtained via the drag-and-drop UI, applying at least one device management rule of the device management rules to at least one neighboring electronic device within the plurality of neighboring electronic devices, in which the icon and the neighboring electronic device correspond to each other. The plurality of neighboring electronic devices can be wirelessly connected to the router. | 2016-12-29 |
20160380826 | SYSTEM AND METHOD FOR ENSURING SUBSCRIBER FAIRNESS USING OUTLIER DETECTION - Various embodiments of the present invention relating to a subscriber fairness solution are disclosed. The subscriber fairness solution contemplates a variety of improved techniques for using a flow-based statistical collection mechanism to monitor subscriber usage across various attributes (e.g., subscriber byte count, flow count, etc.) and maintain subscriber usage information for different time frames. In embodiments, the subscriber fairness solution includes a detection phase and a mitigation phase. In the detection phase, “outliers,” or subscribers who are using more than their fair share of network resources, are identified. In the mitigation phase, appropriate action is taken to resolve the constraints on the network resources, caused by these outliers. The subscriber fairness solution may be embodied in hardware, software, or a composite approach of both hardware and software. | 2016-12-29 |
20160380827 | TECHNIQUES FOR PASSIVELY GLEANING PROPERTIES OF COMPUTING ENTITIES - In response to communications between one or more given networks and one or more other networks, a network protection appliance discovers one or more computing resources of the one or more given networks from a plurality of protocol layers of the received communications. The network protection appliance also gleans properties of the one or more discovered computing resources of the one or more given networks from the plurality of protocol layers of the received communications. The network protection appliance maps the gleaned properties of the one or more discovered computing resources of the one or more given networks to a plurality of network protection policies. The network protection appliance also determines an applicable network protection policy for processing a corresponding received communication from the mapping of the gleaned properties of the one or more discovered given computing resources of the one or more given networks to the plurality of network protection policies. Thereafter, the network protection appliance applies the applicable network protection policies to the corresponding received communication between a computing resource of a given network and a computing resource of the other network. | 2016-12-29 |
20160380828 | INTELLIGENT ROUTE MANAGEMENT FOR DIVERSE ECOSYSTEMS - An intermediating network is adapted to intermediate between an originating network and a servicing network. A first set of communications addresses in the originating network that can be used to originate communications to the servicing network are identified. A second set of communications addresses in the servicing network that can be used to service communications originating in the originating network are identified. The first set of communications addresses and the second set of communications addresses are analyzed. Based on the analyzing, incompatibilities between the first set of communications addresses and the second set of communications addresses that would prevent a communication from one of the first set of communications addresses from reaching the second set of communications addresses are determined. A processor of a computer is used to adapt the intermediating network so that the communication from the first set of communications addresses can be sent to the second set of communications addresses via the intermediating network. The communication from the originating network is received at the intermediating network and the communication is routed through the intermediating network to the servicing network. | 2016-12-29 |
20160380829 | Transactional Orchestration of Resource Management and System Topology in a Cloud Environment - Mechanisms are provided, in a cloud computing data processing system comprising a plurality of components, hosted on one or more hardware computing devices of the cloud computing data processing system, for transactional resource and topology management. A cloud service system is instantiated that comprises component instances having allocated resources. The cloud service system comprises orchestration engine logic which generates a transactional data structure that stores objects corresponding to transactions executed in association with resources and component instance state changes. The orchestration engine logic receives transactions associated with resources or component instances of the cloud service system and records the transactions as objects in the transactional data structure in response to receiving the transactions. In response to detecting an exception during operation of the cloud service system, a recovery engine utilizes the objects in the transactional data structure to restart or recover the cloud service system. | 2016-12-29 |
20160380830 | METHOD AND SYSTEM FOR MANAGING MULTIPLE DEVICES WITHIN A NETWORK SYSTEM - The disclosure is related to a method and a system for managing multiple devices within a network system. For the purpose of configuration or firmware synchronization for the devices within a network segment, the system allows an operator to optionally select the nodes operating as different roles such as a master, synchronization-source device, and slave. A selected device being the master is embedded with a web-based management mechanism, and therefore is remotely accessible. The management program provides a management interface in response to a management link. The management interface allows the operator to instruct the master to synchronize its configuration/firmware with the other selected nodes. Alternatively, through the master, one of the nodes is selected to be the synchronization-source device, and instructed to share its configuration to the other nodes. Through this management mechanism, the multiple nodes can be synchronized as applying the configuration, or/and firmware simultaneously. | 2016-12-29 |
20160380831 | NORMALIZED SOFTWARE-DEFINED NETWORKING INTERFACE - A first message that conforms to a first software-defined networking protocol is received from a first source component. A first destination component associated with the first message is identified. A second software-defined networking protocol is determined based, at least in part, on the first destination component. The second software-defined networking protocol is one of a plurality of software-defined networking protocols. A second message that conforms to the second software-defined networking protocol is generated based, at least in part, on the first message. The second message is sent to the first destination component. | 2016-12-29 |
20160380832 | HOST MANAGEMENT ACROSS VIRTUALIZATION MANAGEMENT SERVERS - In an example, method of managing hosts across a plurality of virtualization management servers, each of the plurality of virtualization management servers managing a plurality of the hosts, each of the hosts configured with virtualization software executing at least one virtual computing instance is disclosed. The method includes deploying, by a rescue service, a rescue agent on each of the plurality of virtualization management servers; obtaining host inventories and configurations at the rescue service for the plurality of virtualization management servers; assigning each of the plurality of virtualization management servers to a category of a plurality of categories based on configuration maximums of the plurality of virtualization management servers; and updating rescue storage managed by the rescue service to monitor resource usage of the plurality of virtualization management servers based on assigned category and the host inventories | 2016-12-29 |
20160380833 | SERVER, PHYSICAL SWITCH AND COMMUNICATION SYSTEM - A server, physical switch, and communication system are provided. The server includes one or more virtual machines and a proxy module. The proxy module includes a registering module configured to register the virtual machines to a physical switch, a message receiving confirmation module configured to receive a confirmation message from the physical switch, wherein the confirmation message comprises identification information associated with the virtual machines, and a server end forwarding module configured to communicate with the physical switch based on the identification information associated with the virtual machines. The physical switch includes a virtual port assigning module configured to register a virtual machine to the physical switch, a message sending confirmation module configured to send a confirmation message to a server, and a physical switch end forwarding module configured to communicate with the virtual machine based on the identification information associated with the virtual machine. | 2016-12-29 |
20160380834 | DETERMINING SERVER LOCATION IN A DATA CENTER - Embodiments generally relate to a method and device of determining a location of a server in a data center by establishing a relationship between a rack unit where each server of the data center is located and a port of a switch and determining the rack unit where the server is located based on a port of a switch connected to the server and the established relationship, and determining a location of the rack unit where the server is located based on relative positions of the switch connected to the server and a plurality of reference points. | 2016-12-29 |
20160380835 | COMMUNICATION SYSTEM USING NETWORK - In a communication system having multiple nodes communicably connected via a network, at least two of the nodes each includes: a software-operated data generator that executes arithmetic processing using software to generate transmission data to be transmitted to another node; a data transmission unit that sends out the transmission data; a data accepting unit that accepts data transmitted from another node; a software-operated controller that executes arithmetic processing using software based on at least the data accepted by the data accepting unit to control hardware serving as a control target; and an interrupt accepting unit that accepts interrupt data generated by another node and, based on the accepted interrupt data, outputs a hardware control signal to the hardware serving as the control target or other hardware associated with the node such that the hardware is directly controlled based on the hardware control signal without via the software-operated controller. | 2016-12-29 |
20160380836 | AUTOMATIC ESTABLISHMENT OF ANALOG NETWORK TOPOLOGY - A method of detecting an RF connection in a network is disclosed. The method involves the use of a low-speed modem pair DC coupled to the RF connection to modulate a DC voltage onto the RF connection. Additionally, a method of signaling over an RF-over-fiber link is provided. The method includes modulating the bias voltage of a laser with a low-bit rate signal applied through a digital-to-analog converter, which is recovered using a low-speed analog-to-digital converter. | 2016-12-29 |
20160380837 | SYSTEM AND METHOD FOR DATA MANAGEMENT - A method for the management of data collected from a remote computing device including the steps of: creating a questionnaire; transmitting the questionnaire to a remote computer, executing the questionnaire in the remote computer to prompt a user for responses to questions of the questionnaire; transmitting the responses to a sever via a network; making the responses available on the Web. Preferably, computers used in connection with the inventive method are loosely networked in that network connections between computers are not always available and, when a connection is not available, data is stored at a node of the network and transmitted at the earliest time when a connection is available. In one preferred embodiment, the inventive method is used to collect survey data and to make the responses to the survey available to a client in virtually real time over the Internet. | 2016-12-29 |
20160380838 | NETWORK NODE CONNECTION CONFIGURATION - A system and method for connectivity configuration of a network node permits an optical signal to be passed through the node and shifted from a first connector position to a second connector position that is offset from the first connector position. The shifted optical signal permits a number of distant nodes in the network to be reached with a direct optical connection, which can be configured to be bidirectional. The disclosed connectivity configuration reduces the cabling requirements for the network and simplifies the interconnections. | 2016-12-29 |
20160380839 | EFFICIENT PARALLEL PROCESSING OF A NETWORK WITH CONFLICT CONSTRAINTS BETWEEN NODES - According to one exemplary embodiment, a method for parallel processing a network of nodes having at least one ordering constraint and at least one conflict constraint is provided. The method may include breaking a plurality of loops caused by the at least one ordering constraint. The method may also include determining a node order based on the at least one ordering constraint. The method may then include determining a conflict order based on the at least one conflict constraint, whereby no new loops are created in the network. The method may further include performing parallel processing of the network of nodes based on the node order and the conflict order. | 2016-12-29 |
20160380840 | DATA SYNCHRONIZATION USING REDUNDANCY DETECTION - Managing data in a cloud computing environment, including data transfers. File level and block level similarities are identified, including for archive and nested archive files, residing on datacenters and regional repositories. A replication plan is generated based on receiving a replication instruction, and further based on similarity clusters by transferring unique data blocks and files from best available sources including regional repositories. | 2016-12-29 |
20160380841 | DYNAMICALLY DEPLOYABLE SELF CONFIGURING DISTRIBUTED NETWORK MANAGEMENT SYSTEM - Systems, software, and methods for managing networks of connected electronic devices are described. In one example, network management policy and network management applications are transferred automatically upon detection and identification of a new device, protocol or application on the network. In another example, information related to at least one aspect of the network is obtained by an NMAS, and at least one applicable management policy is identified by the NMAS; and the identified policy is used to manage at least one aspect of the network's operation. | 2016-12-29 |
20160380842 | DYNAMICALLY DEPLOYABLE SELF CONFIGURING DISTRIBUTED NETWORK MANAGEMENT SYSTEM - Systems, software, and methods for managing networks of connected electronic devices are described. In one example, network management policy and network management applications are transferred automatically upon detection and identification of a new device, protocol or application on the network. In another example, information related to at least one aspect of the network is obtained by an NMAS, and at least one applicable management policy is identified by the NMAS; and the identified policy is used to manage at least one aspect of the network's operation. | 2016-12-29 |
20160380843 | METHOD AND INFORMATION HANDLING SYSTEM PROVIDING AN INTERACTIVE INTERFACE FOR DEVICE-LEVEL MONITORING AND SERVICING OF DATA CENTER - Interactive component-level visual monitoring and controlling an information handling system (IHS) includes displaying a visual representation of one of a plurality of different levels of the IHS based on a current level identified/selected on a graphical user interface (GUI). A current functional state is received of functional components of the IHS at each component level that are being monitored. A controller displays an operating status of at least one functional component on the physical representation at each level of the plurality of different levels. The operating status includes failed, malfunctioning state, and/or a check and/or repair operating state. In response to receiving a user input selecting a specific component level among the one or more levels that is different from a current level being displayed, the controller modifies the GUI to display the physical representation of the specific component level and identifying any components having the problem state. | 2016-12-29 |
20160380844 | METHOD AND CONTROL SYSTEM PROVIDING AN INTERACTIVE INTERFACE FOR DEVICE-LEVEL MONITORING AND SERVICING OF DISTRIBUTED, LARGE-SCALE INFORMATION HANDLING SYSTEM (LIHS) - A controller of a large-scale information handling system (LIHS) includes a memory containing visual representations of architecture and sub-architecture associated with respective data center (DC) configurations. An interactive component-level visual monitoring and control (ICVMC) system includes a processor in communication with the component level monitors and the memory and includes an ICVMC module executing on the processor to receive identification information from one or more component-level monitors of a DC. The DC includes-functional components operationally configured and interconnected in a core architecture in a first DC configuration and monitored respectively by the one or more component-level monitors. The ICVMC module determines the first DC configuration and associated core architecture based on the received identification information. The ICVMC module generates graphical user interfaces (GUIs) for the DC based on the determined first DC configuration and the visual representation of architecture and sub-architectures associated with the first DC configuration. | 2016-12-29 |
20160380845 | METHOD AND APPARATUS FOR MEASURING USER QUALITY OF EXPERIENCE QOE - The present invention discloses a method for measuring user quality of experience QoE, where the method includes the following steps: receiving event information sent by a receiving end, where the event information includes condition information for determining a cause for shortage of valid media data in a buffer of the receiving end; determining, according to the condition information, whether the shortage of the valid media data in the buffer of the receiving end is caused by a service system or caused by a user's action; and measuring QoE decrease degrees according to different causes for the shortage of the valid media data in the buffer, respectively. | 2016-12-29 |
20160380846 | METHOD FOR DETERMINING SYSTEM TOPOLOGY GRAPH CHANGES IN A DISTRIBUTED COMPUTING SYSTEM - A distributed computing system provides at least one service, and the service is provided by resources of the distributed computing system. Resources are represented by a topology graph including storage, application and database server nodes joined by edges indicative of relationships between nodes. Predefined parameters are monitored that are indicative of operating characteristics of the distributed computing system when providing the service. Values of the predefined parameters are compared with respective predetermined performance threshold values. The performance threshold values are determined based on a service level agreement (SLA). The SLA includes a service level objective (SLO). The performance threshold values are indicative of the respective operating characteristics prior to an event. Rules are provided for selecting a combination of application, storage and database server nodes to meet the SLO for each parameter of the parameter. Data associated with the set of rules are stored in the computing system. | 2016-12-29 |
20160380847 | SYSTEM, SERVICE DETERMINING METHOD, AND COMPUTER PROGRAM PRODUCT - A system includes a device and one or more information processing apparatuses. The device includes a device-information generator configured to generate device information on the device; and an analyzer determining unit configured to determine any one of the device and the one or more information processing apparatuses as an analyzer for the device information. The one determined as the analyzer includes an analysis unit configured to perform an analysis based on the device information; and a service determining unit configured to determine a service to the device based on a result of the analysis. | 2016-12-29 |
20160380848 | Packet Copy Management For Service Chain Processing Within Virtual Processing Systems - Systems and methods are disclosed to provide packet copy management for service chain processing within virtual processing systems. A packet manager virtual machine (VM) controls access to shared memory that stores packet data for packets being processed by service chain VMs operating within a virtual processing environment. For certain embodiments, the packet manager VM is configured to appear as a destination NIC (network interface controller), and virtual NICs (vNICs) within the service chain VMs are configured to process packet data using pointers to access the packet data within the shared memory. Once packet data is processed by one service chain VM, the next service chain VM within the service chain is able to access the processed packet data within the shared memory through the packet manager VM. Once all service chain processing has completed, the resulting packet data is available from the shared memory for further use or processing. | 2016-12-29 |
20160380849 | NETWORK SYSTEM, CONTROL METHOD OF A NETWORK SYSTEM AND CONTROL DEVICE - A POS terminal | 2016-12-29 |
20160380850 | METHOD AND CONTROL SYSTEM PROVIDING ONE-CLICK COMMISSIONING AND PUSH UPDATES TO DISTRIBUTED, LARGE-SCALE INFORMATION HANDLING SYSTEM (LIHS) - A large-scale information handling system (LIHS) includes a plurality of nodes each having at least one functional component. An Interactive, Component-Level Visual Monitoring and Control (ICVMC) system displays on a graphical user interface (GUI) of a display device a selected one of the different levels of visual representations of a plurality of nodes, including a system level, node levels, sub-node levels, and component levels. The ICVMC system displays a control affordance on the display device, receives a selection of the control affordance from a user input component that is capable of manipulating and/or interfacing with one or more items on the GUI, and performs a control action to an identical functional component in each of the plurality of nodes in response to the selection of the control affordance. | 2016-12-29 |
20160380851 | HEURISTICS FOR DETERMINING THE LAYOUT OF A PROCEDURALLY GENERATED USER INTERFACE - Embodiments are directed to monitoring communication over a network using a network monitoring device (NMD). Measurement information may be generated based on network traffic that may be monitored by the NMD. Metrics associated with one or more characteristics of the monitored network traffic may be generated based on the measurement information. Layout information for a user-interface may be generated based on results of heuristics that use the measurement information. Generating the layout information may include, determining a layout template based on the results of the heuristics and the measurement information. Metric visualizations that may be associated with the metrics may be displayed in the user-interface based on the layout information. If measurements exceed defined threshold values, the layout information may be modified based on the changes to the measurement information. Accordingly, the layout of the user interface may be modified based on the modified layout information. | 2016-12-29 |
20160380852 | Control Device, Network System, and Server - A POS terminal | 2016-12-29 |
20160380853 | REPORTING MEDIA CONSUMPTION BASED ON SERVICE AREA - An example client device for reporting consumption of media data includes one or more network interfaces configured to send and receive data via a network, and a middleware unit implemented from one or more hardware-based processors comprising digital logic circuitry, the middleware unit configured to determine a service area in which the client device was located when the client device received media data via the network interfaces, determine a reporting strategy for consumption of the media data based on the determined service area in which the client device was located when the client device received the media data, and report consumption of the media data according to the reporting strategy. | 2016-12-29 |
20160380854 | METHODS AND SYSTEMS FOR RESOURCE MANAGEMENT IN A NETWORKED STORAGE ENVIRONMENT - Methods and systems for managing resources in a storage system are provided. As an example, one method includes determining a maximum node utilization of a first node operating in a networked storage environment for storing information at a plurality of storage devices, where the maximum node utilization is based on a first factor that tracks utilization of a processor of the first node; comparing the maximum node utilization to a first threshold value; and triggering an event when the maximum node utilization has reached the first threshold value. | 2016-12-29 |
20160380855 | EFFICIENT REPLACEMENT OF CLIENTS RUNNING LARGE SCALE APPLICATIONS - A system and method for efficiently replacing clients running a large scale application uses a pool of clients, which includes a group of active clients running the large scale application and at least one standby client. When a particular active client is identified to be replaced, one of the at least one standby client is selected as a replacement client for the particular active client. The particular active client is replaced with the selected replacement client with respect to the running of the large scale application such that the particular client is removed from the group of active clients and the selected replacement client is added to the group of active clients. | 2016-12-29 |
20160380856 | SYSTEMS AND METHODS FOR TRACKING DEVICES STATUS AND MALFUNCTIONS IN MACHINE-TO-MACHINE NETWORKS - Disclosed are systems, methods, and apparatus for tracking devices status and malfunctions in a Machine-to-Machine (M2M) network. The system comprises: at least a controller module capable of tracking devices status and malfunctions, wherein the controller module having at least one of a processing module, a tracking module, and a database module; at least a device attached to a mobile or a static entity, wherein the device is having at least one of at least a sensor and at least a device communication module; at least a data profiles module capable of describing at least one of the device and at least the sensor; at least a device heartbeat profile and at least a data accuracy profile associated with the data profiles module; and at least a tracking module capable of tracking devices status and malfunctions. The device is capable of collecting the data records generated by the sensors and transmitting the collected data records to the controller module. | 2016-12-29 |
20160380857 | MONITORING OF IP MULTICAST DELIVERY OVER AN OPTICAL NETWORK - Apparatus and method for monitoring IP multicast delivery. One embodiment comprises an Optical Line Termination (OLT) device that includes a Network Termination (NT) device that connects to a core network, and a plurality of Line Termination (LT) devices that connect to an optical distribution network. The NT device generates an IP multicast monitoring stream directed to a group address, and transmits the monitoring stream to the LT devices. The LT devices then monitor for packets directed to the group address. When an LT device detects a loss of one or more packets directed to the group address, the LT device reports packet loss for the IP multicast monitoring stream to the NT device. | 2016-12-29 |
20160380858 | DISTRIBUTED REAL-TIME COMPUTER SYSTEM AND METHOD FOR FORCING FAIL-SILENT BEHAVIOR OF A DISTRIBUTED REAL-TIME COMPUTER SYSTEM - The invention relates to a method for forcing fail-silent behavior of a periodically functioning, distributed real-time computer system, which real-time computer system comprises at least two redundant NSCFCUs. At the beginning of a frame, the at least two redundant NSCFCUs ( | 2016-12-29 |
20160380859 | MEASURING LATENCY WITHIN A NETWORKING DEVICE - Presented herein are techniques to measure latency associated with packets that are processed within a network device. A packet is received at a component of a network device comprising one or more components. A timestamp representing a time of arrival of the packet at a first point in the network device is associated with the packet. The timestamp is generated with respect to a clock of the network device. A latency value for the packet is computed based on at least one of the timestamp and current time of arrival at a second point in the network device. One or more latency statistics are updated based on the latency value. | 2016-12-29 |
20160380860 | SYSTEMS AND METHODS FOR MEASURING ROUND TRIP TIME IN NETWORK DEVICES BETWEEN THE DEVICE AND AN ENDPOINT - The present disclosure is directed towards systems and methods for measuring round trip time (RTT) in network devices between the device and an endpoint. A network device may be deployed as an intermediary to provide many security and visibility functions. For measuring the server side RTT between the network device and host, the intermediary device identifies the packet that has been sent by the client when it initiated the RTT measurement. The network device remembers the moment T1 when it sees this packet. The host (e.g., the server) will respond to this with a packet that contains the response. The intermediary device remembers the moment T2 when it sees this response. Server side RTT is calculated by the network device as T2−T1. For measuring the client side RTT the network device and client, the intermediary device identifies the packet that the host sends to initiate measurement of RTT. As per the HDX protocol, the client will respond immediately with a new packet or with a bit set in any packet being sent to the host. Just as for server side RTT, the intermediary device can identify these packets and measure the times to calculate the client side RTT. | 2016-12-29 |
20160380861 | METHOD FOR ORDERING MONITORED PACKETS WITH TIGHTLY-COUPLED PROCESSING ELEMENTS - Transaction and session processing of packets within a network monitoring system may be distributed among tightly-coupled processing elements by marking each received packet with a time-ordering sequence reference. The marked packets are distributed among processing elements by any suitable process for transaction processing by the respective processing element to produce transaction metadata. Where a session-owning one of the processing elements has indicated ownership of the session to the remaining processing elements, the transaction-processed packet and transaction metadata are forwarded to the session owner. The session owner aggregates transaction-processed packets for the session, time-orders the aggregated packets, and performs session processing on the aggregated, time-ordered transaction-processed packets to generate session metadata with the benefit of context information. Where the session owner for a transaction-processed packet has not previously been indicated, the transaction-processed packet and transaction metadata are forwarded to an ordering authority of last resort, which assigns ownership of the session. | 2016-12-29 |
20160380862 | METHODS AND SYSTEMS TO EVALUATE DATA CENTER RESOURCE ALLOCATION COSTS - This disclosure is directed to methods and systems to evaluate resource allocation costs of a data center. Methods and systems compute resource allocation costs of a cloud computing industry to obtain industry benchmarks that are compared with the resource allocation costs of the data center. The comparisons enable IT managers to objectively identify computational resource shortages, resource over investments, and where future investment in computational resources should be made for the data center. | 2016-12-29 |
20160380863 | Performance Characterization by Available Capacity - Previously available network monitoring and management systems fail to provide systems or processes that adequately communicate individual client experiences with regards to bitrates or communicate these experiences with respect to time, space and individual client service expectations. By contrast, and to that end, various implementations disclosed herein include systems, methods and apparatuses that obtain network utilization information from a compliant access point, wherein the network utilization information includes a respective first service level indicator value for at least one of one or more client devices; and determines a respective first performance characterization value for the at least one of the one or more client devices based on a function of the respective first service level indicator value and at least one of a first access point capacity value and a respective first network resource capacity value for the at least one of the one or more client devices. | 2016-12-29 |
20160380864 | NETWORK WIDE SOURCE GROUP TAG BINDING PROPAGATION - In one embodiment, a method includes generating at a network device, a trace packet comprising an IP (Internet Protocol) to Source Group Tag (SGT) binding, transmitting the trace packet from the network device to an SGT capable device, wherein at least one non-SGT capable device is interposed in a path between the network device and the SGT capable device, and receiving at the network device, a reply packet from the SGT capable device in response to the trace packet, the reply packet indicating that the IP to SGT binding was installed at the SGT capable device. An apparatus and logic are also disclosed herein. | 2016-12-29 |
20160380865 | NETFLOW COLLECTION AND EXPORT OFFLOAD USING NETWORK SILICON - Methods and apparatus for collection of Netflow data and export offload using network silicon. In accordance with aspects of the embodiments, the Netflow export and collection functions are offloaded to the network silicon in the chipset, System on a Chip (SoC), backplane switch, disaggregated switch, virtual switch (vSwitch) accelerator, and Network Interface Card/Controller (NIC) level. For apparatus implementing virtualized environments, one or both of the collection and export functions are implemented at the Physical Function (PF) and/or Virtual Function (VF) layers of the apparatus. | 2016-12-29 |
20160380866 | ARCHITECTURE FOR METRICS AGGREGATION WITHOUT SERVICE PARTITIONING - A web server computer system receives a plurality of measurements for a metric from one or more computing resources associated with the web server computer system. Each measurement includes metadata for the measurement, which specifies attributes of the measurement. The web server computer system determines, for each measurement and based at least in part on the metadata, a fully qualified metric identifier for the measurement. The web server computer system uses the fully qualified metric identifier to partition the plurality of measurements into various partitions. Once completed, the web server computer system transmits a request to one or more aggregator sub-systems of a computing resource monitoring service to store the plurality of measurements. | 2016-12-29 |
20160380867 | Method and System for Detecting and Identifying Assets on a Computer Network - A computer-implemented method for identifying an asset of a computer machine performed using at least one processing unit for: capturing an update packet from a data path connected to the computer machine; extracting application layer data related to the asset to be identified from the update packet; identifying the asset using the extracted application data layer; and outputting the identification of the asset. | 2016-12-29 |