Patent application number | Description | Published |
20080259944 | METHOD AND APPARATUS OF PROVIDING RESOURCE ALLOCATION AND ADMISSION CONTROL SUPPORT IN A VPN - Method and apparatus for effectively supporting resource allocation and admission control of a Virtual Private Network in a service provider network. | 10-23-2008 |
20090262646 | Transport protocol for efficient aggregation of heterogeneous losssy paths - A transport protocol that achieves improved performance in an environment where paths are lossy and a plurality of paths are employed to transfer data, essentially in parallel, from a source to a destination. The protocol is implemented with the aid of an aggregate flow manager (AFM) at the source that considers and controls the data flow through the plurality of paths. With some preselected regularity the AFM determines a number of packets to be included in a Forward Error Correction (FEC) block of packets, creates the block, and transmits the segments of the block over the plurality of paths. As necessary, the destination sends information to the source of what additional information needs to be sent. This additional information might be reactive error correcting (RFEC) packets, or a retransmission of the missed packets. | 10-22-2009 |
20100008233 | METHODS AND APPARATUS TO DEPLOY AND MONITOR NETWORK LAYER FUNCTIONALITIES - Example methods and apparatus to deploy and monitor network layer functionalities are disclosed. A disclosed example method includes receiving an Internet Protocol (IP) packet at an input of a server, the IP packet being received from a communicatively coupled router, identifying the IP packet as a production IP packet or a non-production IP packets, when the IP packet is the non-production IP packet, manipulating data within the IP packet to monitor network layer functionality, forwarding the manipulated non-production IP packet to the router, and when the IP packet is the production IP packet, forwarding the production IP packet to the router without manipulating data within the IP packet. | 01-14-2010 |
20100008240 | METHODS AND APPARATUS TO MONITOR NETWORK LAYER FUNCTIONALITIES - Example methods and apparatus to monitor network layer functionalities are disclosed. A disclosed example method includes receiving a first probe packet at an input of a first server, the first probe packet being received from a router, the first probe packet being generated and transmitted from a second server that is one-hop away from the first server in a network, determining if the first server is a final destination of the first probe packet, and if the first server is not the final destination of the first probe packet, generating a second probe packet and transmitting the second probe packet to the router for transmission toward the final destination. | 01-14-2010 |
20100008363 | METHODS AND APPARATUS TO DISTRIBUTE NETWORK IP TRAFFIC - Example methods and apparatus to distribute network IP traffic are disclosed. A disclosed example method includes receiving a first IP control packet at an input of a first server, the first IP control packet being received from a first router, selecting a second router within a router array associated with the first router to send the first IP control packet, the first server selecting the second router by matching a destination IP address of the first IP control packet to a first IP address subspace associated with the second router, transmitting the first IP control packet to the second router, and updating a forwarding table in the first router by associating the destination IP address of the first IP control packet with a first control path from the first router to the second router. | 01-14-2010 |
20100070824 | System and Method for Improving Transport Protocol Performance in Communication Networks Having Lossy Links - Providing transport protocol within a communication network having a lossy link. The receiver distinguishes between packets received with non-congestion bit errors and packets having been not at all received due to congestion. When packets are received with non-congestion bit errors, the receiver sends selective acknowledgments indicating that the packets were received with bit errors while suppressing duplicate acknowledgments to prevent the invocation of a congestion mechanism. | 03-18-2010 |
20100097928 | METHOD AND APPARATUS FOR INCREASING SURVIVABILITY IN IP NETWORKS - A method and apparatus for increasing the capability of a network topology model having a plurality of nodes connected by existing links to maintain service continuity in the presence of faults. The steps of the method include adding new links to the network topology model to protect against single node failures, and adjusting link weights for the network topology model to reduce at least one of a cost of network operation and an imbalance in link utilizations. Preferably, the link weights are adjusted to reduce the imbalance in link utilizations without deteriorating the cost of network operation. The link weights are preferably adjusted to reduce the cost of network operation without increasing the imbalance in link utilizations. Preferably, the link weights are adjusted to reduce the cost of network operation without increasing the imbalance in link utilizations while keeping the utilization for each link below a specific threshold. In addition, links can be added to the network topology model to reduce the cost of network operation. | 04-22-2010 |
20100146040 | System and Method for Content Validation - A method of obtaining content includes receiving a playfile. The playfile includes a chunk ID corresponding to a chunk of the content, a packet ID corresponding to a packet of the chunk, and a hash of the packet. The method further includes obtaining the chunk from a peer, determining a calculated hash for the packet, and discarding the chunk when the calculated hash does not match the hash in the playfile. | 06-10-2010 |
20100313251 | Method and Apparatus for Coordinating a Change in Service Provider Between a Client and a Server with Identity Based Service Access Management - A method of configuring a network access device connected to an access network connected to a plurality of service networks, the network device having a first network address allocated to a subscriber of services of a first service provider provided by a first service network, with a new network address allocated to a second subscriber of services of either the first service provider, or a second service provider provided by a second service network. The method comprises the steps of: sending a request from the network access device to the access network with user credentials for the second subscriber requesting access to the first service provider or a change to the second service provider; receiving a response from the access network; and initiating a network address change request using a configuration protocol. In this manner, a second network address allocated to the second subscriber of services of either the first or second service providers is assigned to the network access device to enable the network access device to communicate data packets to the service network providing the selected service. | 12-09-2010 |
20100316046 | Method for performing gate coordination on a per-call basis - Network resources for a call between a calling party and a called party are allocated. The network resources for the call are reserved based on a reservation request. The network resources are reserved before any one network resource from the reserved network resources is committed. The reserved network resources for the call are committed when a called party indicates acceptance for the call. | 12-16-2010 |
20110099437 | Loss Tolerant Transmission Control Protocol - A particular device includes a transmitter. The transmitter is adapted to estimate a packet erasure rate for packets of a data window to be transmitted to a receiver. The transmitter is adapted to determine a number of proactive forward error control (FEC) packets for the data window based on the estimated packet erasure rate. The transmitter is adapted to determine a packet size for the packets in the data window based on a window size of the data window and the determined number of proactive FEC packets. The transmitter is also adapted to transmit the data window to the receiver. The packets in the transmitted data window have a size corresponding to the determined packet size and include the determined number of proactive FEC packets. | 04-28-2011 |
20110106961 | Synchronization of Clients to Maximize Multicast Opportunities - A content delivery system includes a unicast content delivery module, a multicast content delivery module, and a content monitor module. The unicast content delivery module is configured to provide content using a unicast protocol, and the multicast content delivery module is configured to provide the content using a multicast protocol. The content monitor module is configured to receive requests from a plurality of clients for the content, count the requests to determine if the number of requests exceeds a threshold, and instruct the plurality of clients to receive the content from the multicast content delivery module when the number of requests exceeds the threshold. | 05-05-2011 |
20110122764 | Cross-layer reconfiguration method for surviving multiple-link network failures - A second link in a network is reconfigured after failure of a first link, so that multiple-link failures may be survived. After receipt of an OSPF link state advertisement (LSA) indicating use of a backup path b | 05-26-2011 |
20110231661 | Content Distribution with Mutual Anonymity - A method for transferring content includes requesting the content from a serving peer and sending the content to a requesting peer. Requesting the content includes sending a request to a tracker, receiving a request token, a path identifier, and a first peer identifier from the tracker, and sending a request message to a second peer. The first peer identifier includes an identity of a first peer, and the request message includes the request token, the path identifier, and the first peer identifier. Sending the content includes receiving the request token and the path identifier from a third peer, sending a return message to a fourth peer, and transferring the content from the serving peer to the requesting peer through a transfer path. The return message includes the path identifier and a second peer identifier. The second peer identifier includes an identity of a fifth peer. The transfer path includes at least the second, fourth, and fifth peers. | 09-22-2011 |
20110286342 | METHODS AND APPARATUS TO ROUTE PACKETS IN A NETWORK - Methods and apparatus to route packets in a network are disclosed. A disclosed example method includes receiving a packet in a packet aggregator, accessing a forwarding table to determine a router within a router array to which the packet is to be forwarded, transmitting the packet to the determined router via a first interface of the packet aggregator, identifying a second interface within the router to which the packet is to be forwarded, forwarding the packet from the router via the second interface to a virtual interface within the packet aggregator, and statically forwarding the packet from the packet aggregator to a destination based on the virtual interface that received the packet. | 11-24-2011 |
20110286457 | METHODS AND APPARATUS TO ROUTE CONTROL PACKETS BASED ON ADDRESS PARTITIONING - Methods and apparatus to route control packets based on address partitioning. A disclosed example method includes receiving a packet in a server, determining the packet is a control packet, forwarding the packet to a processor, identifying via the processor an address prefix of the packet, accessing a forwarding table and determining via the processor at least one of a router or an outgoing interface that corresponds to the identified address prefix, transmitting the packet from the processor to the server via the outgoing interface, and statically forwarding the packet from the server to the router based on an interface that received the packet from the processor. | 11-24-2011 |
20120096081 | System and Method for Content Validation - A method includes receiving at a directory server a notification from a client system, where the notification indicates that the first client received a corrupt packet of a playfile from a first peer. The method also includes determining if the first peer is a poor quality peer, updating a first peer score for the first peer if the first peer is not a poor quality peer, identifying a second peer that is not on a blacklist, and providing a peer identification associated with the second peer to the client system. | 04-19-2012 |
20120120801 | NETWORK-FRIENDLY TRANSMISSION CONTROL PROTOCOL (TCP) METHODS, APPARATUS AND ARTICLES OF MANUFACTURE - Example methods, apparatus and articles of manufacture to route policy requests are disclosed. A disclosed example method includes sending bandwidth probe packets at a probing rate, receiving a packet containing an indication representative of whether the probe packets triggered congestion, and selecting a transmission rate for sending data packets based on the probing rate and the indication. | 05-17-2012 |
20120158983 | Synchronization of Clients to Maximize Multicast Opportunities - A content monitor includes a processor that at least receives requests from a plurality of clients for content, instructs each client to retry their respective request at a first later time if the request is received before a first time, counts the requests to determine if a number of the requests exceeds a threshold if the request is received before a second time, instructs each client to retry their respective request at a second later time if the counted number of requests does not exceed a first threshold, instructs each client to join a multicast group to receive the content when the number of requests exceeds the first threshold, and counts a number of late clients joining the multicast group after a first portion of the content has been sent to the multicast group. | 06-21-2012 |
20120252473 | METHOD FOR PERFORMING GATE COORDINATION ON A PER-CALL BASIS - Network resources for a call between a calling party and a called party are allocated. The network resources for the call are reserved based on a reservation request. The network resources are reserved before any one network resource from the reserved network resources is committed. The reserved network resources for the call are committed when a called party indicates acceptance for the call. | 10-04-2012 |
20120269058 | Cross-Layer Reconfiguration Method for Surviving Multiple-Link Network Failures - A second link in a network is reconfigured after failure of a first link, so that multiple-link failures may be survived. After receipt of an OSPF link state advertisement (LSA) indicating use of a backup path b | 10-25-2012 |
20130028089 | System and Method for Improving Transport Protocol Performance in Communication Networks Having Lossy Links - Providing transport protocol within a communication network having a lossy link. The receiver distinguishes between packets received with non-congestion bit errors and packets having been not at all received due to congestion. When packets are received with non-congestion bit errors, the receiver sends selective acknowledgments indicating that the packets were received with bit errors while suppressing duplicate acknowledgments to prevent the invocation of a congestion mechanism. | 01-31-2013 |
20130104175 | Using Video Viewing Patterns to Determine Content Placement - A method includes receiving demand information for a first segment of a media content item and receiving demand information for a second segment of the media content item. The method includes assigning the first segment to a first set of distribution nodes of a media content distribution system based at least partially on the demand information for the first segment and based at least partially on a first cost function and assigning the second segment to a second set of distribution nodes of the media content distribution system based at least partially on the demand information for the second segment and based at least partially on a second cost function. The media content distribution system includes a plurality of distribution nodes and each distribution node is configured to provide media content items to at least some of a plurality of endpoints. | 04-25-2013 |
20130107884 | METHODS AND APPARATUS TO DISTRIBUTE NETWORK IP TRAFFIC | 05-02-2013 |
20130139232 | Method and Apparatus for Coordinating a Change in Service Provider Between a Client and a Server with Identity Based Service Access Management - A method of configuring a network access device connected to an access network connected to a plurality of service networks, the network device having a first network address allocated to a subscriber of services of a first service provider provided by a first service network, with a new network address allocated to a second subscriber of services of either the first service provider, or a second service provider provided by a second service network. The method comprises the steps of: sending a request from the network access device to the access network with user credentials for the second subscriber requesting access to the first service provider or a change to the second service provider; receiving a response from the access network; and initiating a network address change request using a configuration protocol. In this manner, a second network address allocated to the second subscriber of services of either the first or second service providers is assigned to the network access device to enable the network access device to communicate data packets to the service network providing the selected service. | 05-30-2013 |
20130290468 | Methods and Apparatus to Migrate Virtual Machines Between Distributive Computing Networks Across a Wide Area Network - Methods and apparatus to migrate virtual machines between distributive computing networks across a network are disclosed. A disclosed example method includes establishing a data link across a network between a first distributive computing network and a second distributive computing network, the first distributive computing network including a virtual machine operated by a first host communicatively coupled to a virtual private network via a first virtual local area network, communicatively coupling a second host included within the second distributive computing network to the virtual private network via a second virtual local area network, and migrating the virtual machine via the data link by transmitting a memory state of at least one application on the first host to the second host while the at least one application is operating. | 10-31-2013 |
20140040206 | PIPELINED DATA REPLICATION FOR DISASTER RECOVERY - Pipelined data replication for disaster recovery is disclosed. An example pipelined data replication method for disaster recovery disclosed herein comprises sending replicated first data from a primary processing environment to a secondary processing environment for backup by the secondary processing environment, the replicated first data being a replica of first data in the primary processing environment, processing the first data in the primary processing environment prior to the backup of the replicated first data by the secondary processing environment being confirmed, and preventing a result of the processing of the first data from being released by the primary processing environment until the backup of the replicated first data by the secondary processing environment is confirmed. | 02-06-2014 |
20140164646 | Synchronization of clients to maximize multicast opportunities - A content monitor includes a processor that at least receives requests from a plurality of clients for content, instructs each client to retry their respective request at a first later time if the request is received before a first time, counts the requests to determine if a number of the requests exceeds a threshold if the request is received before a second time, instructs each client to retry their respective request at a second later time if the counted number of requests does not exceed a first threshold, instructs each client to join a multicast group to receive the content when the number of requests exceeds the first threshold, and counts a number of late clients joining the multicast group after a first portion of the content has been sent to the multicast group. | 06-12-2014 |
20150029906 | SYSTEM AND METHOD FOR REDUCING INTER-CELLSITE INTERFERENCE IN FULL-DUPLEX COMMUNICATIONS - Disclosed herein are systems, methods, and computer-readable storage devices for reducing inter-cellsite interference during full-duplex communication. A system receives a channel amplitude and a phase estimate between a first station and a second station, the first station and the second station creating inter-cellsite interference on a channel during full-duplex communications. The system calculates a level of the inter-cellsite interference between the first station and the second station based on the channel amplitude and the phase estimate and generates a cancellation signal based on the inter-cellsite interference. The system then communicates the cancellation signal to the first station for transmission with additional data during additional full-duplex communications. | 01-29-2015 |
20150071087 | Methods, Systems, and Products for Voice-Over Internet Protocol Calls - Network resources for a call between a calling party and a called party are allocated. The network resources for the call are reserved based on a reservation request. The network resources are reserved before any one network resource from the reserved network resources is committed. The reserved network resources for the call are committed when a called party indicates acceptance for the call. | 03-12-2015 |