Patent application number | Description | Published |
20100027503 | METHOD AND APPARATUS FOR REDUCING DATA LOSS DURING HANDOVER IN A WIRELESS COMMUNICATION SYSTEM - Techniques for buffering and resending data in order to reduce data loss during handover are described. A network controller may determine whether or not to buffer data for a user equipment (UE). The network controller may continuously buffer a predetermined amount of latest data sent to a serving Node B if a decision is made to buffer the data for the UE. In one design, the network controller may send data for the UE to a source Node B, perform handover of the UE from the source Node B to a target Node B, resend to the target Node B a portion of the data sent previously to the source Node B, and send new data for the UE to the target Node B. e.g., after the resent data. The buffer and resend feature may be selectively enabled or disabled for each data flow for the UE. | 02-04-2010 |
20100167779 | HANDLING OF MAC-HS/EHS RESET IN ENHANCED SERVING CELL CHANGE - Systems and methodologies are described that effectuate and/or facilitate MAC-hs/ehs resets in an enhanced serving cell. In accordance with various aspects set forth herein, systems and/or methods are provided that identify transmission power control bits included in active set update messages received from source or target base stations, ascertain whether or not transmission power control values included in the active set update messages differ from transmission power control values that the system currently operates under, and performs serving cell changes and where necessary media access control status resets based on an examination of a transmission power control combination index. | 07-01-2010 |
20110044292 | Apparatus and Method for Increasing Reliability of Serving Cell Change - Methods and apparatus are described herein to manage a serving cell change. A HS-SCCH monitored set is maintained to store entries for all pending serving cell change requests. The HS-SCCH for each entry is monitored for a timer period. Once a change request has been confirmed for one entry, monitoring for the other entries continues until expiration of the associated timers. | 02-24-2011 |
20120155429 | Minimizing Call Drops During a Serving Cell Change - A method for minimizing call drops during a serving cell change is disclosed. A first measurement report message is received from a user equipment (UE) requesting to change an active set of the UE. A second measurement report message is received from the UE indicating a change of a best cell and requesting a change of a serving cell to a target cell. The second measurement report message is processed before the first measurement report message is completely processed. | 06-21-2012 |
Patent application number | Description | Published |
20090161685 | METHOD, SYSTEM AND NODE FOR BACKPRESSURE IN MULTISTAGE SWITCHING NETWORK - The present invention provides a backpressure method, system, and intermediate stage switching node of a multistage switching network and an intermediate stage switching node. The method includes: (i) the intermediate stage switching node receives a first backpressure information; and (ii) the intermediate stage switching node sends at least part of the first backpressure information to an upper stage switching node, wherein there is no response sent by the intermediate switching node to at least part of the first backpressure information. | 06-25-2009 |
20100246431 | LINK STATE DETECTION METHOD AND SYSTEM - A link state detection method is disclosed in an embodiment of the present invention. The method includes: obtaining link state information from the lowest level SE to the mid-level SE; notifying to the mid-level SE the link state information from the lowest level SE to the mid-level SE; obtaining accessibility information from the mid-level SE to the lowest level SE according to the link state information from the lowest level SE to the mid-level SE, and link state information from the mid-level SE to the first level SE; notifying the first level SE the link state information from the mid-level SE to the first level SE, and the accessibility information from the from the mid-level SE to the lowest level SE; obtaining the accessibility information from the first level SE to the lowest level SE according to the link state information and the accessibility information sent by the mid-level SE. | 09-30-2010 |
20110032934 | MULTI-STAGE SWITCH FABRIC - A multi-stage switch fabric (SF) is provided. The multi-stage SF includes a line card chassis (LCC) and a fabric card chassis (FCC). The FCC includes a stage-1 switch element (S1), a stage-2 switch element (S2), and a stage-3 switch element (S3), where the S3 corresponds to the S1, and the S2 is coupled to the S1 and S3 respectively. The LCC includes an interface component and a line card (LC) coupled to the interface component, where the interface component is coupled to the S1 and S3 in the FCC respectively. Through the technical solution under the present invention, when a switch element generates flow control information and requires another switch element or an LC to respond to the flow control information, a timely response can be received. | 02-10-2011 |
20110038371 | MULTI-STAGE SWITCH SYSTEM - A multi-stage switch system includes a line card chassis (LCC) and a fabric card chassis (FCC). The LCC is configured with multiple line cards (LCs) and the FCC is configured with a stage-2 switch element (S | 02-17-2011 |
Patent application number | Description | Published |
20090172774 | METHOD AND SYSTEM FOR DISTRIBUTING SECURITY POLICIES - A method and system for distributing and enforcing security policies is provided. A firewall agent executing at a host computer system that is to be protected receives security policies for the enforcement engines responsible for enforcing the security policies on the host computer system. A security policy has rules that each provide a condition and action to be performed when the condition is satisfied. A rule also has a rule type that is used by the distribution system to identify the security components that are responsible for enforcing the rules. To distribute the security policies that have been received at a host computer system, the firewall agent identifies to which enforcement engine a rule applies based in part on rule type. The firewall agent then distributes the rule to the identified enforcement engine, which then enforces the rule. | 07-02-2009 |
20130007183 | Methods And Apparatus For Remotely Updating Executing Processes - Methods, apparatus, and computer-accessible storage media for remotely updating an executing process that receives I/O requests on I/O port(s), stores write data to a write log on local storage, and uploads data from the write log to remote storage. An update for the process is detected and downloaded, and an updated process is instantiated from the update. The current process is directed to perform a shutdown for update during an update window. In response, the current process saves its current configuration, flushes an in-memory portion of the write log to local storage, and releases its I/O port(s). The updated process loads the saved configuration, detects that the port(s) have been released, and starts accepting I/O requests on the ports. During flushing, the current process flushes current data in memory while continuing to append new write data, stops accepting new write requests, and then flushes the new write data. | 01-03-2013 |
20130007219 | Shadowing Storage Gateway - Methods, apparatus, and computer-accessible storage media for shadowing data stored on a local store to a remote store provided by a service provider. A gateway may be configured as a shadowing gateway on a customer network in response to receiving configuration information. The shadowing gateway may receive reads and writes to the local store. The gateway passes the requests to the local store, and also uploads write data indicated by the writes to the service provider to update a snapshot of the local store maintained by the service provider on the remote store. The write data may be buffered to a write log for uploading, and may be uploaded as blocks according to a block storage format used by the service provider. The shadowing process may be transparent to processes on the customer network. The shadowed data may be used to recover data on the local store. | 01-03-2013 |
20130007854 | Storage Gateway Activation Process - Methods, apparatus, and computer-accessible storage media for activating a gateway to a remote service provider. The gateway serves as an interface between processes on a customer network and the provider, for example to store customer data to a remote data store. A gateway sends a public key and metadata describing the gateway to the provider. The gateway receives an activation key from the provider and exposes the activation key on the customer network. The customer obtains the key and communicates to the provider using the key to provide customer information including a name for the gateway and to authorize registration of the gateway. The provider provides the customer information to the gateway. The gateway requests security credentials from the provider using the customer information and the key. The provider sends a security credential to the gateway. The gateway may then obtain configuration information from the customer via the provider. | 01-03-2013 |
20140330784 | METHODS AND APPARATUS FOR CONTROLLING SNAPSHOT EXPORTS - Methods, apparatus, and computer-accessible storage media for controlling export of snapshots to external networks in service provider environments. Methods are described that may be used to prevent customers of a service provider from downloading snapshots of volumes, such as boot images created by the service provider or provided by third parties, to which the customer does not have the appropriate rights. A request may be received from a user to access one or more snapshots, for example a request to export the snapshot or a request for a listing of snapshots. For each snapshot, the service provider may determine if the user has rights to the snapshot, for example by checking a manifest for the snapshot to see if entries in the snapshot manifest belong to an account other than the customer's. If the user has rights to the snapshot, the request is granted; otherwise, the request is not granted. | 11-06-2014 |
20140337483 | REDUNDANT STORAGE GATEWAYS - Methods, apparatus, and computer-accessible storage media for providing redundant storage gateways. A client may create a storage gateway group and add storage gateways to the group. The client may assign one or more volumes on a remote data store to each the storage gateways in the group. Volume data for each storage gateway in the group may be replicated to at least one other storage gateway in the group. If one of the gateways in the group becomes unavailable, one or more other gateways in the group may take over volumes previously assigned to the unavailable gateway, using the replicated data in the group to seamlessly resume gateway operations for the respective volumes. Client processes that previously communicated with the unavailable gateway may be manually or automatically directed to the gateway(s) that are taking over the unavailable gateway's volumes. | 11-13-2014 |
20140351906 | STORAGE GATEWAY ACTIVATION PROCESS - Methods, apparatus, and computer-accessible storage media for activating a gateway to a remote service provider. The gateway serves as an interface between processes on a customer network and the provider, for example to store customer data to a remote data store. A gateway sends a public key and metadata describing the gateway to the provider. The gateway receives an activation key from the provider and exposes the activation key on the customer network. The customer obtains the key and communicates to the provider using the key to provide customer information including a name for the gateway and to authorize registration of the gateway. The provider provides the customer information to the gateway. The gateway requests security credentials from the provider using the customer information and the key. The provider sends a security credential to the gateway. The gateway may then obtain configuration information from the customer via the provider. | 11-27-2014 |
20140372381 | METHODS AND APPARATUS FOR DATA RESTORE AND RECOVERY FROM A REMOTE DATA STORE - Methods, apparatus, and computer-accessible storage media for restoring data from a snapshot to a data volume. The blocks in the volume may be treated as an implicit tree structure, for example a binary tree; each local block corresponds to a block on the snapshot. A local block on the volume may be marked, for example fingerprinted with metadata, to indicate that the local block has not been restored. Initially, the local block at the root node is marked. To restore a local block, the restore process may generate a list indicating all local blocks on a path from the root node of the tree to the target node that have not been restored. The marks in the local blocks are used in generating the list. For each block indicated in the list, children of the block are fingerprinted, and the block is restored from the snapshot. | 12-18-2014 |