Patent application number | Description | Published |
20120182935 | SYSTEM AND METHOD FOR PACKET DISTRIBUTION IN A VEHICULAR NETWORK ENVIRONMENT - A method is provided in one example embodiment that includes receiving a request for data from a source device, such as an on-board unit of vehicle or a mobile device coupled to an on-board unit, over a vehicular network. Location data, such as GPS coordinates, speed, and heading associated with the source device may also be received. A travel path for the source device can be predicted based on the location data, and an access point to the network can be located within range of the travel path. Packets associated with the requested data may be sent to the access point and then forwarded to the source device when the source device is in range. | 07-19-2012 |
20130121176 | COMMUNICATION PROTOCOL FOR ENERGY-HARVESTING DEVICES - In one embodiment, an energy-harvesting communication device of a communication network accumulates energy, e.g., electromagnetic energy. Upon detecting that the accumulated energy surpasses a sufficient threshold, the communication device may transmit a message into the communication network using the accumulated energy as an unreliable and unsynchronized broadcast transmission to any available receiver within the communication network. | 05-16-2013 |
20130124883 | ENERGY-BASED FEEDBACK FOR TRANSMISSION RECEPTION IN A COMMUNICATION NETWORK - In one embodiment, a communication device of a communication network determines its available power level, and also estimates a power requirement to receive an expected transmission from a transmitter of the communication network. By determining whether the available power level is sufficient for the estimated power requirement, the device may correspondingly provide feedback to the transmitter regarding whether the available power level is sufficient for the estimated power requirement (e.g., if insufficient, either ignoring the transmission or returning an explicit reply). In another embodiment, further power conservation may be afforded through a radio-triggered wake-up mechanism. | 05-16-2013 |
20130151563 | NETWORK-BASED DYNAMIC DATA MANAGEMENT - In one embodiment, a router operating in a hierarchically routed computer network may receive collected data from one or more hierarchically lower devices in the network (e.g., hierarchically lower sensors or routers). The collected data may then be converted to aggregated metadata according to a dynamic schema, and the aggregated metadata is stored at the router. The aggregated metadata may also be transmitted to one or more hierarchically higher routers in the network. Queries may then be served by the router based on the aggregated metadata, accordingly. | 06-13-2013 |
20130188513 | FAST-TRACKING APPROACH FOR BUILDING ROUTING TOPOLOGIES IN FAST-MOVING NETWORKS - In one embodiment, a local node in a communication network determines a set of its neighbor nodes, and determines a respective occurrence frequency at which each particular neighbor node is to be probed based on a rate of change in distance between the local node and the particular neighbor node. The local node may then probe each particular neighbor node according to the respective occurrence frequency to determine the rate of change in distance between the local node and each particular neighbor node, and one or more routing metrics for reaching each particular neighbor node. As such, the local node may select, based on the probing, a suitable preferred next-hop node of the set of neighbor nodes for a corresponding routing topology. | 07-25-2013 |
20130212212 | APPLICATION CONTEXT TRANSFER FOR DISTRIBUTED COMPUTING RESOURCES - In one embodiment, a universal programming module on a first device collects context and state information from a local application executing on the first device, and provides the context and state information to a context mobility agent on the first device. The context mobility agent establishes a peer-to-peer connection with a second device, and transfers the context and state information to the second device, such that a remote application may be configured to execute according to the transferred context and state information from the first device. In another embodiment, the context mobility agent receives remote context and remote state information from the second device, wherein the remote application had been executing according to the remote context and remote state information, and provides the remote context and remote state information to the universal programming module to configure the local application to execute according to the remote context and remote state information. | 08-15-2013 |
20130215942 | APPLICATION-AWARE DYNAMIC BIT-LEVEL ERROR PROTECTION FOR MODULATION-BASED COMMUNICATION - In one embodiment, a device (e.g., a transmitter) determines a level of error protection of each bit position within symbols of a particular constellation map used for modulation-based communication, and also determines priority levels of application data bits to be placed into a communication frame. Application data bits may then be placed into symbols of the communication frame, where higher priority application data bits are placed into bit positions with greater or equal levels of protection than bit positions into which lower priority application data bits are placed. The communication frame may then be transmitted to one or more receivers with an indication of how to decode the placement of the application data bits within the symbols. In another embodiment, the particular constellation map may be dynamically selected from a plurality of available constellation maps, such as based on communication channel conditions and/or applications generating the data. | 08-22-2013 |
20130301584 | SYSTEM AND METHOD FOR ENABLING A VEHICULAR ACCESS NETWORK IN A VEHICULAR ENVIRONMENT - A method includes joining a vehicular access network (VAN) comprising cooperative communication between a plurality of on-board units (OBU) in respective vehicles, scanning the VAN to pick up a coverage of at least one infrastructure access point (IAP), which operates on a control channel in a radio access tree (RAT) comprising a plurality of cells, listening to a channel allocation information from the IAP that includes a request for a mobile cell gateway (MCG) at a nominal location in the RAT, and sending a candidacy message to the at least one IAP to become an MCG. Certain embodiments include establishing the VAN in a highway, and in urban areas, aggregating traffic in a cell and transmitting to the IAP via the MCG, and other features. | 11-14-2013 |
20130336316 | RELIABLE ON-DEMAND DISTRIBUTED DATA MANAGEMENT IN A SENSOR-ACTUATOR FABRIC - In one embodiment, a system comprises a plurality of minimalistic data collection nodes in a computer network, the minimalistic data collection nodes configured to generate sensed data values of a particular type and to communicate the data values within the computer network in substantially real-time using distributed data acquisition (DA) packets specific to the particular type of the data values. The system also comprises a plurality of capable data collection nodes in the computer network, the capable data collecting nodes configured to store the data values of the minimalistic data collection nodes from the DA packets. One or more points of use of the system may be configured to request the data values, wherein one or more particular capable data collection nodes of the system are configured to service the request in substantially real-time on behalf of the minimalistic data collection nodes with the stored data values. | 12-19-2013 |
20140129876 | ROOT CAUSE ANALYSIS IN A SENSOR-ACTUATOR FABRIC OF A CONNECTED ENVIRONMENT - In one embodiment, the techniques herein provide that a node may receive indicia of a fault state in one or more components of a computer network. Based on the indicia, the node may then identify a network dependency group including a plurality of network components that are hierarchically associated with the one or more components. The node may then receive, from a database, a time series of performance data values corresponding to the network dependency group, wherein the time series comprises performance data values from before and after the onset of the fault state. The node may then identify altered performance data values in the time series comprising values which differ before and after onset of the fault state, and then determine a root cause of the fault state by identifying one or more particular components within the network dependency group that are associated with the altered performance data values. | 05-08-2014 |
20140215491 | SYSTEM AND METHOD FOR INTERNAL NETWORKING, DATA OPTIMIZATION AND DYNAMIC FREQUENCY SELECTION IN A VEHICULAR ENVIRONMENT - A system includes an on-board unit (OBU) in communication with an internal subsystem in a vehicle on at least one Ethernet network and a node on a wireless network. A method in one embodiment includes receiving a message on the Ethernet network in the vehicle, encapsulating the message to facilitate translation to Ethernet protocol if the message is not in Ethernet protocol, and transmitting the message in Ethernet protocol to its destination. Certain embodiments include optimizing data transmission over the wireless network using redundancy caches, dictionaries, object contexts databases, speech templates and protocol header templates, and cross layer optimization of data flow from a receiver to a sender over a TCP connection. Certain embodiments also include dynamically identifying and selecting an operating frequency with least interference for data transmission over the wireless network. | 07-31-2014 |
20140269592 | APPLICATION-AWARE DYNAMIC BIT-LEVEL ERROR PROTECTION FOR MODULATION-BASED COMMUNICATION - In one embodiment, a device (e.g., a transmitter) determines a level of error protection of each bit position within symbols of a particular constellation map used for modulation-based communication, and also determines priority levels of application data bits to be placed into a communication frame. Application data bits may then be placed into symbols of the communication frame, where higher priority application data bits are placed into bit positions with greater or equal levels of protection than bit positions into which lower priority application data bits are placed. The communication frame may then be transmitted to one or more receivers with an indication of how to decode the placement of the application data bits within the symbols. In another embodiment, the particular constellation map may be dynamically selected from a plurality of available constellation maps, such as based on communication channel conditions and/or applications generating the data. | 09-18-2014 |
20140303807 | SYSTEM AND METHOD FOR REAL-TIME SYNTHESIS AND PERFORMANCE ENHANCEMENT OF AUDIO/VIDEO DATA, NOISE CANCELLATION, AND GESTURE BASED USER INTERFACES IN A VEHICULAR ENVIRONMENT - A method includes establishing communication channels between an on-board unit (OBU) of a vehicle and a plurality of nodes, tagging each of a plurality of data from the plurality of nodes with a priority level, storing the plurality of data in a priority queue according to respective priority levels, selecting a medium to present a first data of the plurality of data to a user, and presenting the first data to the user via the medium. In the method, the plurality of nodes includes a remote node and an in-vehicle device. Another method includes receiving a data from a remote node, generating a plurality of data streams from the data and transmitting the plurality of data streams across a plurality of wireless interfaces. Another method includes enhancing audio signals from a plurality of microphones and speakers. Yet another method includes various gesture based user interfaces coupled to the OBU. | 10-09-2014 |
20140380442 | SYSTEM AND METHOD FOR ENABLING SECURE TRANSACTIONS USING FLEXIBLE IDENTITY MANAGEMENT IN A VEHICULAR ENVIRONMENT - A method in one embodiment includes authenticating a first agent to an on board unit (OBU) of a vehicle if the first agent validates a first set of one or more authentication requirements and identifying a first identity profile corresponding to the first agent. The method also includes determining a role of the first agent in the vehicle and configuring the vehicle with the first identity profile, where the vehicle is configured based, at least in part, on the role of the first agent. In this embodiment, the first identity profile is one of a plurality of identity profiles provisioned on the OBU. In specific embodiments, each one of a plurality of agents corresponds to a respective one of the plurality of identity profiles, and includes one or more of a human agent, a machine device, a software agent, an authorized entity, and a mobile device. | 12-25-2014 |
20150029987 | SYSTEM AND METHOD FOR WIRELESS INTERFACE SELECTION AND FOR COMMUNICATION AND ACCESS CONTROL OF SUBSYSTEMS, DEVICES, AND DATA IN A VEHICULAR ENVIRONMENT - A method in one embodiment includes intercepting a message in an on-board unit (OBU) of a vehicular network environment between a source and a receiver in the vehicular network environment, verifying the message is sent from the source, verifying the message is not altered, evaluating a set of source flow control policies associated with the source, and blocking the message if the set of source flow control policies indicate the message is not permitted. In specific embodiments, the message is not permitted if a level of access assigned to the source in the set of source flow control policies does not match a level of access tagged on the message. In further embodiments, the method includes evaluating a set of receiver flow control policies associated with the receiver, and blocking the message if the set of receiver flow control policies indicates the message is not permitted. | 01-29-2015 |
20150112767 | SYSTEM AND METHOD FOR USING NETWORK MOBILITY EVENTS TO BUILD ADVERTISING DEMOGRAPHICS - An example method is provided in one example embodiment and includes receiving a mobility event message for a first user equipment; determining demographic information for a first subscriber associated with the first user equipment; determining a location of the first subscriber in relation to a first network domain; identifying one or more advertising domains in relation to the location of the first subscriber based on the first network domain; determining a modeling function based on the mobility event message and the location of the first subscriber in relation to the identified advertising domains; updating, based on the modeling function, one or more demographic models for each of the identified one or more advertising domains using the demographic information for the first subscriber; and following the updating, calculating demographic information for all subscribers for each of the updated one or more demographic models for the identified advertising domains. | 04-23-2015 |
20150150118 | HARDWARE VIRTUALIZATION MODULE FOR EXCLUSIVE CONTROLLED ACCESS TO CPU - In one embodiment, a method comprises providing an apparatus having exclusive access to each of one or more central processing units (CPUs) of a computing system and exclusive access to host resources of the computing system; and controlling, by the apparatus, execution of a virtual machine in the computing system based on the apparatus controlling access to any one of the CPUs or any one of the host resources according to prescribed policies for the virtual machine, the prescribed policies maintained exclusively by the apparatus. | 05-28-2015 |
20150213056 | LINE RATE VISUAL ANALYTICS ON EDGE DEVICES - In one embodiment, a stream of data packets originated by a visual data source is received at an edge device in a network. The data packets include at least one of video data, image data, and geo spatial data. Next, a visual data attribute is extracted at the edge device from the stream of data packets according to an edge-based extraction algorithm. The extracted visual data attribute is vectorized at the edge device via quantization vectors. The vectorized visual data attribute is then indexed at the edge device in a schema-less database that stores indexed visual data attributes. | 07-30-2015 |
20150222708 | SYSTEM AND METHOD FOR APPLICATIONS MANAGEMENT IN A NETWORKED VEHICULAR ENVIRONMENT - A method in one example embodiment includes identifying a power state and a battery level of a vehicle. The method also includes allocating power to critical applications (for example) in response to determining that the battery level is above a reserve threshold while the power state of the vehicle is engine-off. The method also includes allocating remaining power in excess of the reserve threshold to non-critical applications according to a power management policy. The power management policy may comprise at least one of a user power preference index and an application power preference index. | 08-06-2015 |
20150264554 | SYSTEM AND METHOD FOR ROUTING, MOBILITY, APPLICATION SERVICES, DISCOVERY, AND SENSING IN A VEHICULAR NETWORK ENVIRONMENT - A method includes selecting a path for routing a data packet from a source node to a destination node in a vehicular ad hoc network, storing the data packet if the selected path is identified as a dead end, and establishing a communication link with a first node. The method also includes forwarding the data packet to the first node if a first distance between the first node and the destination node is less than a second distance between the source node and the destination node. More specific embodiments include sending a query for location information of the destination node, receiving the location information including two or more available paths from the source node to the destination node, and determining the path for routing the data packet is an optimal path of the two or more available paths. | 09-17-2015 |
Patent application number | Description | Published |
20120317252 | METHOD AND SYSTEM FOR ADDRESS CONFLICT RESOLUTION - A method and system for resolving a conflict between private internet protocol addresses assigned in a network between an internet protocol security remote access server (IRAS) and an internet protocol security remote access client (IRAC) arranged behind a network address translator (NAT) router in the network. By modifying internet key exchange version2 (IKEv2) and internet key exchange (IKE) protocol negotiations between IRAC and IRAS to include a private attribute used by IRAC to send all its internet protocol (IP) subnet addresses to IRAS, IRAS dynamically resolves any conflict of the IP addresses with that of its internal networks by mapping and assigning non-conflicting virtual IP addresses and network subnet addresses to IRAC for IRAC to access the internal networks of IRAS. The conflict resolving mechanism used in run time allows mobile virtual private networks (VPN) to access corporate networks employing IP routers implementing IP security (IPsec) remote access mechanism without access failure due to IP address conflicts. | 12-13-2012 |
20120320788 | Method and Apparatus for Snoop-and-Learn Intelligence in Data Plane - An approach is provided where incoming packets are received at a data plane and header fields are extracted from the incoming packet. Flows from a flow data store are matched with the extracted header fields from the incoming packet. Packet descriptor data associated with the incoming packet is marked in the selected incoming packet forming a marked ingress packet with marking performed when the matching fails. The marked ingress packet is forwarded to a control plane that retrieves flow-related data related to the marked ingress packet and updates the marked packet descriptor data using the retrieved flow-related data, thereby forming an updated marked packet. The control plane passes the updated marked packet back to the data plane for further processing to update the flow data stored in the flow data store. | 12-20-2012 |
20140019982 | CORE-AFFINE PROCESSING ON SYMMETRIC MULTIPROCESSING SYSTEMS - Embodiments of a symmetric multi-processing (SMP) system can provide full affinity of a connection to a core processor when desired, even when ingress packet distribution, protocol processing layer and applications may autonomously process packets on different cores of the SMP system. In an illustrative embodiment, the SMP system can include a server application that is configured to create a plurality of tasks and bind the plurality of tasks to a plurality of core processors. One or more of the plurality of tasks are configured to create a corresponding listening endpoint socket, bind and listen on a protocol address that is common to the plurality of tasks. | 01-16-2014 |
20140297774 | SYSTEM FOR MANAGING CONFIGURATION UPDATES IN CLUSTER OF COMPUTATIONAL DEVICES - A system for managing configuration updates in a cluster of computational devices that includes a master device and a set of participant devices. The master device receives a first configuration command from a user, executes it and updates a configuration version number to a current configuration version number. Thereafter, the master device transmits a multicast message including the current configuration version number to the participant devices. A first participant device sends a configuration request to the master device for transmitting the first configuration command. Thereafter, the first participant device receives the first configuration command from the master device and updates its configuration version number to the current configuration version number. | 10-02-2014 |
20150052575 | Steering Traffic Among Multiple Network Services Using a Centralized Dispatcher - A network service dispatcher is provided that transparently navigates network traffic through network service appliances utilizing sub-session connection information generated in accordance with policies pertaining to a client-server session. The network service dispatcher intercepts a first data packet of a new session between two computer systems and generates sub-session connection information that navigates the data packet through one or more network service appliances in a manner transparent to the client or server. In turn, the network service dispatcher utilizes the sub-session connection information to navigate subsequent forward or reverse data packets in the session without performing a policy-based search for each data packet. | 02-19-2015 |
20150180783 | METHOD AND SYSTEM FOR AVOIDING NEW FLOW PACKET FLOOD FROM DATA PLANE TO CONTROL PLANE OF A NETWORK DEVICE - A mechanism is provided by which communication is reduced between a data plane of a network device and a control plane associated with that network device upon introduction of a new flow. A holding table is provided for every active flow table in the data plane. The holding table holds flow contexts for new flows not found in the associated active flow table, while awaiting flow information from the control plane. Each flow context includes a queue of subsequent data packets associated with the flow, which are held from the control plane pending receipt of the flow information from the control plane. A timeout mechanism compensates for packet loss between the network device and control plane. When the data plane receives the flow information from the control plane, the data plane then processes all the queued packets, deletes the flow context, and enters the data into an associated flow table. | 06-25-2015 |
20150350154 | Using Distributed Network Elements to Send Authoritative DNS Responses - This disclosure describes a network element controller that communicates with a bank of network elements over a software defined network (SDN) to provide DNS responds to external users. The network elements, such as switches and routers, reside within a computer perimeter network or data center and intercept DNS requests from resolving DNS servers that are destined for an authoritative name server. The network elements, in turn, send a DNS response to the resolving DNS servers on behalf of the authoritative name server, which include a corresponding DNS record and a source address of the authoritative name server. In one embodiment, the network element controller proactively programs DNS records on each of the network elements included in the perimeter network. | 12-03-2015 |