Patent application number | Description | Published |
20080267116 | Routing method and system for a wireless network - A method and system for selecting a route in a wireless network for the transmission of a data packet between wireless nodes in said network using a modified link-state routing algorithm wherein only a limited number of broadcast messages are generated to synchronize the link-state database throughout the wireless network. A subset of nodes called portal nodes within the network are elected to do the broadcasting for the entire network. Each portal node broadcasts an announcement of its identity to all of the wireless nodes. Each wireless node responds to these broadcasts to select one of the portal nodes as its root portal node. It then identifies a unicast route back to its root portal node, and sends a link-state register message to this portal node. These link-state register messages received by each portal node are aggregated by them and are broadcast to each of the wireless nodes for storage. When a data packet is thereafter received by a wireless node from a neighboring node, it detects if the data packet satisfies one of a plurality of predetermined conditions and rebroadcasts the data packet to neighboring wireless nodes if none of the conditions is satisfied. | 10-30-2008 |
20090213730 | Backhaul failover method and system for a wireless network - A method and corresponding system for providing for recovering from a failure of a wired link used for communication between the first access point and a wired network. The first access point has at least two radios including a first radio and a second radio each for providing a wireless communications link. The method including selectively configuring the radios in an access mode for enabling a communications path with a corresponding client node to enable each client node to have a communication path via the first access point to the wired network, wherein the first and second radios are enabled to be associated with a first and second client node, respectively. The method and system includes providing communications paths for the client nodes to the wired network in response to detection of loss of the wired link to the first access point by selectively reconfiguring the second radio to a backhaul mode. | 08-27-2009 |
20090292917 | SECURE TRANSPORT OF MULTICAST TRAFFIC - Secure tunneled multicast transmission and reception through a network is provided. A join request may be received from a second tunnel endpoint, the join request indicating a multicast group to be joined. Group keys may be transmitted to the second tunnel endpoint, where the group keys are based at least on the multicast group. A packet received at the first tunnel endpoint may be cryptographically processed to generate an encapsulated payload. A header may be appended to the encapsulated payload to form an encapsulated packet, wherein the header includes information associated with the second tunnel endpoint. A tunnel may be established between the first tunnel endpoint and the second tunnel endpoint based on the appended header. The encapsulated packet may be transmitted through the tunnel to the second tunnel endpoint. The second tunnel endpoint may receive the encapsulated packet. Cryptographic processing of the encapsulated packet may reveal the packet having a second header. The packet may then be forwarded on an interface toward at least one multicast recipient identified in the second header. | 11-26-2009 |
20100014416 | SYSTEMS AND METHODS FOR ROUTING DATA IN A COMMUNICATIONS NETWORK - A network device includes a group of interfaces. Each interface is associated with at least one other interface of the group of interfaces and a group of network addresses. Each interface is configured to monitor at least one of the group of network addresses with which the each interface is associated or the at least one other interface with which the each interface is associated, and determine whether to logically shut down based on the monitoring. | 01-21-2010 |
20100195529 | ENFORCING ACCESS CONTROL ON MULTICAST TRANSMISSIONS - Systems, apparatus, methods, and computer program products for multicast access control are provided to analyze incoming data based on a source zone and a destination zone of the incoming data. Appropriate access control rules are applied to incoming data based on the results of the analysis. Additional implementations of a multicast access control include using a proxy rendezvous point operable to function as a rendezvous point in place of a physical rendezvous point. | 08-05-2010 |
20100278181 | POINT-TO-MULTI-POINT/NON-BROADCASTING MUTLI-ACCESS VPN TUNNELS - A system establishes a virtual private network (VPN) tunnel to a destination and determines a next hop for the VPN tunnel. The system inserts the next hop, and an address associated with the destination, into an entry of a first table. The system inserts the next hop, and a tunnel identifier corresponding to the established VPN tunnel, into an entry of a second table. The system associates one or more security parameters, used to encrypt traffic sent via the VPN tunnel, with the tunnel identifier. | 11-04-2010 |
20100325486 | SYSTEMS AND METHODS FOR PROVIDING REDUNDANCY IN COMMUNICATIONS NETWORKS - A system includes a first network device and a second network device. The first network device includes a group of first logical portions and is configured to detect a problem with one of the first logical portions, and transmit a message identifying the one first logical portion. The second network device includes a group of second logical portions, where the group of second logical portions corresponds to the group of first logical portions. The second network device is configured to receive the message from the first network device, and activate the one second logical portion corresponding to the one first logical portion in response to receiving the message. | 12-23-2010 |
20110047154 | PROTECTION OF DATABASE OPERATIONS - A system protects database operations performed on a shared resource. The system may chunk memory to form a set of memory chunks which have memory blocks, at least some of the memory blocks including database objects. The system may configure at least one binary search tree using the memory chunks as nodes and buffer a set of pointers corresponding to the memory blocks. The system may further validate the buffered pointers and dereference validated buffered pointers. | 02-24-2011 |
20110310742 | GUARANTEED BANDWIDTH SHARING IN A TRAFFIC SHAPING SYSTEM - In one aspect the invention provides a method for allocating bandwidth in a network appliance where the network appliance includes a plurality of guaranteed bandwidth buckets used to evaluate when to pass traffic through the network appliance. The method includes providing a shared bandwidth bucket associated with a plurality of the guaranteed bandwidth buckets, allocating bandwidth to the shared bandwidth bucket based on the underutilization of bandwidth in the plurality of guaranteed bandwidth buckets and sharing excess bandwidth developed from the underutilization of the guaranteed bandwidth allocated to the individual guaranteed bandwidth buckets. The step of sharing includes borrowing bandwidth from the shared bandwidth bucket by a respective guaranteed bandwidth bucket to allow traffic to pass immediately through the network appliance. | 12-22-2011 |
20120058728 | DISTRIBUTED CHANNEL SELECTION FOR WIRELESS NETWORKS - Wireless networking devices scan for available channels and gather data about the channels and the RF environment. Using this information, each wireless networking device determines a cost value for each available channel and a quality value for its overall RF neighborhood. Each wireless networking device select the channel with the best cost value as a candidate channel for use. The wireless networking devices may submit channel requests to the arbiter for approval. If two or more wireless networking devices are requesting the same channel, the arbiter assigns the channel to the wireless networking device with the worst RF neighborhood quality. The arbiter informs the wireless networking devices if their channel requests are approved. If a wireless networking device's channel request is not approved, the wireless networking device will rescan the remaining available channels to select a different candidate channel to be approved. | 03-08-2012 |
20120137358 | POINT-TO-MULTI-POINT/NON-BROADCASTING MULTI-ACCESS VPN TUNNELS - A system establishes a virtual private network (VPN) tunnel to a destination and determines a next hop for the VPN tunnel. The system inserts the next hop, and an address associated with the destination, into an entry of a first table. The system inserts the next hop, and a tunnel identifier corresponding to the established VPN tunnel, into an entry of a second table. The system associates one or more security parameters, used to encrypt traffic sent via the VPN tunnel, with the tunnel identifier. | 05-31-2012 |
20120144191 | SECURE TRANSPORT OF MULTICAST TRAFFIC - A request to receive multicast data, associated with a multicast group, may be transmitted. The request may be transmitted via a tunnel. Group keys may be received in response to the request. The group keys may be based on the multicast group. An encapsulated packet may be received via another tunnel. The encapsulated packet may be processed, using the group keys, to obtain a multicast packet associated with the multicast data. The multicast packet may be forwarded to at least one multicast recipient. | 06-07-2012 |
20120304251 | FIREWALL SECURITY BETWEEN NETWORK DEVICES - A security device may be interconnected, via multiple links, between multiple network devices in a network. The firewall device may include multiple input interfaces that receive data units from a first network device destined for a second network device of the multiple network devices, identify a session associated with each of the data units, and process the data units in accordance with the identified sessions and a security policy. | 11-29-2012 |
20130294245 | Predictive and Nomadic Roaming of Wireless Clients Across Different Network Subnets - Wireless access points detect neighboring wireless access points in different subnets. Upon connecting with a wireless client, a wireless access point determines predictive roaming information for the wireless client. Predictive roaming information identifies the wireless client; its home network subnet; and includes connection information associated with the wireless client. The wireless access point forwards the predictive roaming information associated with a wireless client to neighboring wireless access points while the wireless client is still connected with the wireless access point. Neighboring wireless access points store received predictive roaming information. Upon connecting with a wireless client, a neighboring wireless access point determines if the wireless client matches the stored predictive roaming information. If so, the neighboring wireless access point uses the predictive roaming information to quickly connect with the wireless client and to establish a tunnel to redirect network traffic associated with the wireless client through to its home subnet. | 11-07-2013 |
20140146902 | ANTENNA PATTERN MATCHING AND MOUNTING - A technique for improving wireless communication characteristics involving matching transmitter antenna patterns to receiver antenna patterns. In a specific implementation, the transmitter antenna pattern adapts to changing parameters, such as when a smartphone is initially held in a first orientation and is later held in a second orientation. Because the transmitter antenna pattern matches receiver antenna patterns, signal quality between stations improves. In some implementations, antennas are organized and mounted to maximize spatial diversity to cause peak gains in different directions. | 05-29-2014 |
20140153663 | ANTENNA PATTERN MATCHING AND MOUNTING - A technique for improving wireless communication characteristics involving matching transmitter antenna patterns to receiver antenna patterns. In a specific implementation, the transmitter antenna pattern adapts to changing parameters, such as when a smartphone is initially held in a first orientation and is later held in a second orientation. Because the transmitter antenna patterns match the receiver antenna patterns, signal quality between stations improves. In some implementations, antennas are organized and mounted to maximize spatial diversity to cause peak gains in different directions. | 06-05-2014 |
20140160929 | AIRTIME-BASED PACKET SCHEDULING FOR WIRELESS NETWORKS - Airtime usage may be used as a factor in controlling network traffic flow to and from client devices via a wireless network interface. Received packets or other data are assigned to a quality of service profile. Additionally, a cost value for communicating the received data is determined at least in part based on an actual or estimated airtime usage for the received packet. The cost value is used to allocate wireless network airtime to data. The allocation of wireless network airtime may be varied dynamically based on operating conditions. The cost value may be based on factors including the airtime used to communicate data; whether the data is a retransmission; and wireless network overhead. The cost value of data may also be different depending on whether the data is being sent from a client device or to a client device. | 06-12-2014 |
20140192774 | PREDICTIVE ROAMING BETWEEN SUBNETS - A network device of a subnet determines predictive roaming information for a wireless client. Predictive roaming information can identify the wireless client and a home network subnet of the wireless client. The network device provides predictive roaming information associated with a wireless client to neighboring subnets. Neighboring subnets store received predictive roaming information, and use the predictive roaming information if the wireless client roams to them. | 07-10-2014 |
20140219128 | AIRTIME-BASED PACKET SCHEDULING FOR WIRELESS NETWORKS - Airtime usage may be used as a factor in controlling network traffic flow to and from client devices via a wireless network interface. Received packets or other data are assigned to a quality of service profile. Additionally, a cost value for communicating the received data is determined at least in part based on an actual or estimated airtime usage for the received packet. The cost value is used to allocate wireless network airtime to data. The allocation of wireless network airtime may be varied dynamically based on operating conditions. The cost value may be based on factors including the airtime used to communicate data; whether the data is a retransmission; and wireless network overhead. The cost value of data may also be different depending on whether the data is being sent from a client device or to a client device. | 08-07-2014 |
20140269564 | PREVENTING ASYMMETRIC ROUTING USING NETWORK TUNNELING - Various implementations described herein relate to routing network data traffic using network tunnels. In some implementations, one or more tunnels are established between a remote gateway device and a central gateway system. The central gateway system receives data traffic-to-tunnel information from the remote gateway device, and the central gateway system incorporates the data traffic-to-tunnel information in a data traffic-to-tunnel mapping. The data traffic-to-tunnel information comprises n-tuple of network flow information, network flow tags, application-to-tunnel binding information, or the like. The central gateway system receives first data traffic from the remote gateway and forwards the first data traffic to a server. Subsequently, the central gateway system receives second data traffic and forwards the first data traffic to the remote gateway device over one or more select tunnels selected from the established tunnels. The select tunnels can be selected based on based at least in part on the data traffic-to-tunnel mapping. | 09-18-2014 |
20140280967 | BUILDING AND MAINTAINING A NETWORK - Techniques and systems for establishing and maintaining networks. The technique includes assigning a network device to an interregional redirector system and load balancer systems. The network device can be assigned based upon the regions or subregions of the network device. The technique includes the load balancer systems assigning the network device to network device management engines. The status of the network device management engines can be monitored to determine if one of the network device management engines has failed. In the event that a network device management engine has failed, the network device can be assigned to a different network device management engine. | 09-18-2014 |
20140317276 | APPLICATION BASED DATA TRAFFIC ROUTING USING NETWORK TUNNELING - Various implementations described herein relate to routing network data traffic using network tunnels. In some implementations, one or more tunnels are established between a remote gateway device and a central gateway device central gateway system. The remote gateway device can receive data traffic from one or more client devices and analyzed the data traffic. Based at least in part on the resulting analysis, the remote gateway device identified an application or an application type associated with the data traffic. The remote gateway device can select one or more select tunnels, from the one or more tunnels, based at least in part on the identification of the application or the application type associated with the data traffic. Eventually, the remote gateway device can route the data traffic to the central gateway system using the one or more select tunnels. | 10-23-2014 |