24th week of 2015 patent applcation highlights part 62 |
Patent application number | Title | Published |
20150163051 | ENCRYPTION DEVICE, ENCRYPTION METHOD AND PROGRAM - A problem to be solved is to reduce processing time when a block cipher which refers to a table is implemented in software. | 2015-06-11 |
20150163052 | POWERLINE COMMUNICATION NETWORK ANALYZER - A powerline communication (PLC) network analyzer can join a PLC network by authenticating and associating with a central coordinator of the PLC network. The network analyzer can receive an encryption key from the central coordinator and dissociate from the PLC network. The network analyzer can capture and decrypt network traffic from the PLC network while remaining dissociated. The network analyzer can also create one or more virtual stations for the PLC network. The virtual stations can join the PLC network through the central coordinator and generate network traffic for the PLC network. | 2015-06-11 |
20150163053 | RELAY APPARATUS, METHOD, AND SYSTEM - A relay apparatus includes: a memory; and one or more processors coupled to the memory and configured to: generate second encrypted data by performing a second encryption process using a second key shared with a providing destination apparatus in a second network on first encrypted data which is generated by a node apparatus in a first network performing a first encryption process using a first key on data, generate decrypted data by performing a decryption process using the first key on the second encrypted data, and transmit the decrypted data to the providing destination apparatus. | 2015-06-11 |
20150163054 | UPDATING KEY INFORMATION - A method of providing key information from a sender to one or more receivers, the method comprising: obtaining initial key information comprising a plurality of units that assume respective values; forming encoded key information from the initial key information, wherein the encoded key information comprises a plurality of encoded units that correspond to respective units of the initial key information, wherein said forming comprises, for each unit of the initial key information, selecting an encoding from a plurality of invertible encodings associated with said unit and encoding said value assumed by said unit with said selected encoding to form the corresponding encoded unit; and providing the encoded key information to said one or more receivers. | 2015-06-11 |
20150163055 | Disrupting Offline Password Attacks - Methods and systems for disrupting password attacks using compression are described. A user password may be stored on a mobile computing device. The password may be compressed, for example, using a Huffman compression algorithm, and may be subsequently encrypted using a short secret as a key. The user password may be stored as the compressed and encrypted key. The compressed and encrypted password may be stored such that a brute force password attack, for example, using every possible short secret, would reveal too may possible matches to allow an attacker to select the real password. | 2015-06-11 |
20150163056 | Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication - A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a wireless network. The first shared secret key K can be encrypted with a first key, and the second shared secret key K can be encrypted with a second key. The module can (i) receive the first key, (ii) decrypt the first shared secret key K with the first key, and (iii) subsequently authenticate with the wireless network using the plaintext first shared secret key K. The wireless network can authenticate the user of the module using a second factor. The module can then (i) receive the second key, (ii) decrypt the second shared secret key K, and (iii) authenticate with the wireless network using the second shared secret key K. The module can comprise a mobile phone. | 2015-06-11 |
20150163057 | SYSTEMS AND METHODS FOR PREVENTING TRANSMITTED CRYPTOGRAPHIC PARAMETERS FROM COMPROMISING PRIVACY - A method for secure cryptographic communication comprises transmitting information that identifies a group key from a first device to a second device. The method further comprises, in the first device, using the group key to encrypt an input vector, transmitting the encrypted input vector, encrypting privacy-sensitive information using a device key, an encryption algorithm, and the input vector, and transmitting the encrypted privacy-sensitive information to the second device. | 2015-06-11 |
20150163058 | TECHNIQUES FOR ENSURING AUTHENTICATION AND INTEGRITY OF COMMUNICATIONS - Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response. | 2015-06-11 |
20150163059 | METHOD OF GENERATING A PUBLIC KEY FOR AN ELECTRONIC DEVICE AND ELECTRONIC DEVICE - A method for generating a public key for an electronic device is provided, wherein the method comprises generating a public key | 2015-06-11 |
20150163060 | METHODS, SYSTEMS AND APPARATUS FOR PUBLIC KEY ENCRYPTION USING ERROR CORRECTING CODES - This invention provides improved security of the McEliece Public Key encryption system adding features which make full use of random number generation for given message and cryptogram parameters. Different embodiments of the invention are described which enable the level of security to be traded-off against cryptogram size and complexity. Message vectors are encoded with a scrambled generator matrix, using matrix multiplication to form codeword vectors. Shortened corrupted codewords are generated by corrupting each codeword vector and omitting a predefined number of bits, whereby a cryptogram is formed from the shortened corrupted codewords. Measures are included to defeat attacks based on information set decoding. A number of different applications are given. | 2015-06-11 |
20150163061 | METHODS AND SYSTEMS OF DATA SECURITY IN BROWSER STORAGE - Mechanisms and methods are provided for managing OAuth access in a database network system, and extending the OAuth flow of authentication to securely store the OAuth encrypted refresh token in the storage available with current browsers or any other non-secure storage on user system. | 2015-06-11 |
20150163062 | TRANSMITTING A DOCUMENT - A method of transmitting a document from a computing device to a printing device using a document server comprising, at the server, receiving user credentials from a user of an authorized computing device, receiving encrypted data defining the document from the authorized computing device, receiving information indicating the intended recipients of the data, receiving user credentials from an authorized printing device, and delivering the encrypted data to an authorized recipient. | 2015-06-11 |
20150163063 | SAFE COMMUNICATION METHOD WITH CARD - Disclosed is a safe communication method with a card, comprising: conducting mutual authentication between a card and an entity other than the card; and after the authentication has passed, the entity other than the card sending a communication command of a corresponding security level, and the card executing a corresponding operation according to the corresponding security level, and then sending a communication success response to the entity other than the card. The method solves the problem that communication data may be monitored or intercepted. | 2015-06-11 |
20150163064 | CRYPTOGRAPHICALLY AUTHENTICATED COMMUNICATION - A system for cryptographically authenticated communication, wherein an activation signal is sent from a communications device to a memory device ( | 2015-06-11 |
20150163065 | IDENTITY AUTHENTICATION METHOD AND APPARATUS AND SERVER - The present disclosure provides an identity authentication method and apparatus and a server. Embodiments may avoid inconvenience of input of authentication information via the input device and easy occurrence of errors in the prior art and thereby improve efficiency and reliability of identity authentication in the following manner: the authentication end encrypts the obtained token with a private key to obtain a signature so that the authentication end can send to the server the first identity identifier, the token and the signature generated according to the public key corresponding to the private key such that the server obtains the second identity identifier according to the token and the signature, and performs identity authentication according to the first identity identifier and the second identity identifier. | 2015-06-11 |
20150163066 | TELECONFERENCING SYSTEM AND METHOD - A network-initiated teleconferencing system and method. In one embodiment, teleconference setup information is received pursuant to a setup request for a teleconference generated by an organizer using a messaging module. A messaging server system associated with the messaging module is monitored to obtain retrieve teleconference state information. Relative to a scheduled time, notifications are sent to personal communication devices of one or more participants (external participants, internal participants, or a combination thereof), including the organizer, for receiving consent. Upon receiving one or more consent confirmations from the one or more participants indicative of accepting a call initiated by a network, a call handling process may be invoked to initiate calls to the one or more participants for establishing the teleconference at the scheduled time. | 2015-06-11 |
20150163067 | CONTROL OF COMPUTING DEVICE USE DURING CONFERENCES - Systems and methods for control of computing device use during conferences are disclosed. According to an aspect, a method includes receiving a communication that defines a rule for controlling use of a computing device during a conference associated with the computing device. The method also includes determining occurrence of the conference. Further, the method includes applying the rule to control use of the computing device during occurrence of the conference in response to determining occurrence of the conference. | 2015-06-11 |
20150163068 | CONTROL OF COMPUTING DEVICE USE DURING CONFERENCES - Systems and methods for control of computing device use during conferences are disclosed. According to an aspect, a method includes receiving a communication that defines a rule for controlling use of a computing device during a conference associated with the computing device. The method also includes determining occurrence of the conference. Further, the method includes applying the rule to control use of the computing device during occurrence of the conference in response to determining occurrence of the conference. | 2015-06-11 |
20150163069 | VIRTUAL PRIVATE MEETING ROOM - A conference session is established. Different unique identifications and persistent dedicated virtual private network conference rooms are assigned to different recipients. A conference session using one of the persistent dedicated virtual private network conference rooms assigned to a recipient is established using a communication device with a processor and memory and in response to an instruction from the recipient assigned the persistent dedicated virtual private network conference room. A network resource is allocated to the conference session established, based on a participant in the conference session logging in to the conference session using one of the unique identifications. | 2015-06-11 |
20150163070 | METHOD AND APPARATUS FOR MANAGING AN INTERACTIVE NETWORK SESSION - Methods for controlling online session inactivity timeouts between a user terminal and a server involves the server polling the user's local terminal to determine whether the user presence at the terminal can be confirmed if there is a period of inactivity within the session. If so, or if the server can otherwise confirm that the terminal is secured from use by other users, then the user session is maintained. Otherwise, the user session is allowed to timeout due to inactivity. The server may issue an alert to the user whenever a timeout is imminent, and may restore any information entered by the user prior to the timeout, if the user later returns and validates his identification. | 2015-06-11 |
20150163071 | WIRELESS TRANSMISSION DEVICE, WIRELESS TRANSMISSION SYSTEM, COMMUNICATION LINE SELECTION METHOD - In order to continue transmission of extra traffic in the absence of an unused transmission path, a transmission system of the present invention is a wireless transmission system comprising two or more wireless transmission devices are connected via a plurality of wireless transmission paths. The wireless transmission device is a wireless transmission device for transmitting traffic to another wireless transmission device via a wireless transmission path selected from a plurality of connected wireless transmission paths. The wireless transmission system comprises a switching control unit which judges, when a fault has occurred in the wireless transmission path for transmitting the traffic, whether the traffic is transmittable with use of the wireless transmission path in which the fault has occurred, namely, a faulty transmission path, and which selects the faulty transmission path, as the wireless transmission path for transmitting the traffic, when judging that the traffic is transmittable. | 2015-06-11 |
20150163072 | Virtual Port Extender - A system, method, and a computer readable medium for transmitting a packet in a network are provided. An overlay network is a virtual network that transmits a packet between a plurality of controlling bridges and a plurality of port extenders. A port extender connects to multiple servers in the server rack and a controlling bridge transmits packets over a network outside of the servers in the server rack. A mapping between virtual ports of a port extender and a controlling bridge is provided, such that the mapping enables the packet transmission in the overlay network. | 2015-06-11 |
20150163073 | MASSIVE MIMO CHANNEL ESTIMATION - In an embodiment, a method of channel estimation is provided. The method includes determining a parametric model for a channel between a first transceiver and a second transceiver and transmitting a pilot signal to the second transceiver. The receiving transceiver is configured to determine a parameter of the parametric model based at least on the pilot signal and to estimate a channel transfer function coefficient for the channel based on the parameter and the parametric model. | 2015-06-11 |
20150163074 | POWER-LINE COMMUNICATION COUPLING - In some embodiments, a system includes a power system coupled to a power bus, and a power line communication (PLC) gateway coupled in series with the power bus. In other embodiments, a system includes first and second power circuits coupled in series with a power bus, and first and second power-line communication circuits coupled in series with the power bus. In additional embodiments, a system includes a power converter coupled to a power bus and having one or more switching frequencies, and a power-line communication circuit coupled to the power bus and having one or more communication frequencies, where at least one of the switching frequencies is substantially greater than at least one of the communication frequencies. | 2015-06-11 |
20150163075 | METHODS AND APPARATUS FOR SIGNALING ON A DIFFERENTIAL LINK - Methods and apparatus are disclosed for transitioning a receiver from a first state to a second state using an in-band signal over a differential serial data link. | 2015-06-11 |
20150163076 | ITERATIVE METHOD FOR SYNTHESIZING DIGITAL FILTERS FOR SHAPING A SIGNAL - An iterative method for synthesizing digital filters comprises the following steps: generation of a transmit filter intended to be applied to a signal to be transmitted; and generation of a receive filter intended to be applied to a received signal. The method comprises the following iteratively executed steps: convolution of the transmit filter and the receive filter in order to generate a transmission filter; determination of a criterion that is representative of the level of intersymbol interference on said transmission filter and whether the level of intersymbol interference is higher than a given level; calculation of an equalizing filter for the intersymbol interference; replacement of the transmit filter with the convoluted transmit filter having the equalizing filter or the replacement of the receive filter with the convoluted receive filter having the equalizing filter. | 2015-06-11 |
20150163077 | POWER AND AREA EFFICIENT RECEIVER EQUALIZATION ARCHITECTURE WITH RELAXED DFE TIMING CONSTRAINT - An exemplary receiver equalizer includes a first decision feedback equalizer (DFE) sampler coupled to a summer, the first DFE to latch an equalized output of the summer. The first branch includes a second DFE sampler coupled to the first DFE sampler, the second DFE to latch an output of the first DFE sampler. The first branch includes a third DFE sampler coupled to the second DFE sampler, the third DFE to latch an output of the second DFE sampler. The summer coupled to the first, second, and third DFE samplers of the first branch, the summer to integrate the output of said DFE samplers, the received signal, and equalized outputs from one or more other branches, wherein the integrating occurs over a plurality of unit intervals (UIs). | 2015-06-11 |
20150163078 | Signal Correction Method and Receiving Machine - The present invention discloses a signal correction method and a receiving machine, pertaining to the radio communication field. The method includes: acquiring M channels of first signals; performing adaptive processing for each channel of first signals among the M channels of first signals to output M channels of first correction signals; making a decree according to the M channels of first correction signals to obtain M channels of decree results; using a decree result with a same value and with a largest quantity among the M channels of decree results as a feedback signal; receiving M channels of second signals; and separately performing adaptive processing, according to the feedback signal, for each channel of second signals among M channels of second signals to output M channels of second correction signals. | 2015-06-11 |
20150163079 | MULTI-BAND RADIO-FREQUENCY DIGITAL PREDISTORTION - Systems and methods for radio frequency digital predistortion in a multi-band transmitter are disclosed. In one embodiment, the multi-band transmitter includes a digital upconversion system configured to digitally upconvert digital input signals to provide digital radio frequency signals. Each digital input signal and thus each digital radio frequency signal corresponds to a different band of a multi-band transmit signal to be transmitted by the multi-band transmitter. The multi-band transmitter also includes a radio frequency digital predistortion system configured to digitally predistort the digital radio frequency signals to provide predistorted digital radio frequency signals, and a combiner configured to combine the predistorted digital radio frequency signals to provide a multi-band predistorted digital radio frequency signal. | 2015-06-11 |
20150163080 | METHOD AND DEVICE FOR DETERMINING AVAILABLE SPECTRUMS - A method and device for determining available spectrums is disclosed in embodiments of the present invention. By applying the technical solution of the embodiments of the present invention, with consideration on the bi-directionality of the interference between wireless communication systems, when introduction of the cognitive system is required, the corresponding frequency will be determined as an available frequency only in the case the incumbent system and the cognitive system can be simultaneously guaranteed to meet the corresponding coexistence criterion among the corresponding frequency and adjacent frequencies thereof, thus ensuring that the determined available frequency band guarantees that the normal operation of the incumbent system is not interfered by the cognitive system while ensuring that the newly-introduced cognitive system can also operate normally without interference of the incumbent system, thereby improving the communication quality of the wireless communication systems. | 2015-06-11 |
20150163081 | COMMUNICATION SYSTEM - A master apparatus includes a guard interval length determination portion that requests a plurality of slave apparatuses to cause the slave apparatuses to transmit respective OFDM signals of regular sequence in order without being mutually overlapped. The OFDM signal is obtained by adding a guard interval having a specified initial length to a regular valid symbol that is obtained by applying OFDM modulation to a regular data. A correlator outputs a cross correlation value between the regular sequence and a reception sample sequence. The guard interval length determination portion stores as a delay time a time interval from when the cross correlation value exceeds a first threshold value to when the cross correlation value exceeds a second threshold value. A common length of the guard interval is determined based on the maximum delay time among the delay times with respect to the respective slave apparatuses. | 2015-06-11 |
20150163082 | APPARATUS AND METHOD FOR SENDING AND RECEIVING BROADCAST SIGNALS - Disclosed is an apparatus for transmitting a broadcast signal, comprising: an input formatting module configured to de-multiplex an input stream into at least one Data Pipe (DP); a BICM module configured to perform error correction processing on data of the at least one DP; a signal frame building module configured to map the data of the DP to symbols within a signal frame; and an OFDM generation module configured to generate a transmission broadcast signal by inserting a preamble into the signal frame and performing OFDM modulation, wherein the OFDM generation module comprises a pilot signal insertion module configured to insert a pilot signal comprising Continual Pilots (CP) and Scattered Pilots (SP) into the transmission broadcast signal, and wherein the CPs are inserted into every symbol of the signal frame, and location and number of the CPs are determined based on a Fast Fourier Transform (FFT) size. | 2015-06-11 |
20150163083 | APPARATUS FOR TRANSMITTING BROADCAST SIGNALS, APPARATUS FOR RECEIVING BROADCAST SIGNALS, METHOD FOR TRANSMITTING BROADCAST SIGNALS AND METHOD FOR RECEIVING BROADCAST SIGNALS - Disclosed is a method for transmitting broadcast signals, including: formatting input streams to a plurality of data pipes (DPs), wherein the formatting comprises allocating data packets to a payload of a baseband frame (BBF), and adding a header indicating a format of the payload of the baseband frame, and the header comprises at least one of first control information and second control information. | 2015-06-11 |
20150163084 | RECEIVING DEVICE, RECEIVING METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM STORING PROGRAM - A receiving device according to an embodiment of the present disclosure receives a signal in which a data symbol and invalidation data are arranged. The receiving device includes an amplifying unit that amplifies the input signal and a gain adjusting unit that adjusts gain of the amplifying unit in a section of the invalidation data. The present disclosure can be applied to a receiving device that receives a radio signal of an OFDM system. | 2015-06-11 |
20150163085 | CODING AND MODULATION APPARATUS USING NON-UNIFORM CONSTELLATION - A coding and modulation apparatus and method are presented. The apparatus ( | 2015-06-11 |
20150163086 | WIRELESS COMMUNICATION APPARATUS AND TRANSMISSION POWER CONTROL METHOD - A variable gain amplifier amplifies a baseband signal. A quadrature modulator quadrature-modulates the amplified baseband signal to generate a high-frequency signal. A power amplifier amplifies the generated high-frequency signal. An antenna transmits the amplified high-frequency signal. A detector detects the amplified high-frequency signal. A first nonvolatile memory stores the desired transmission power of the high-frequency signal to be transmitted from the antenna. A controller adjusts the gain of the variable gain amplifier depending on the output of the detector and the transmission power stored in the first nonvolatile memory. | 2015-06-11 |
20150163087 | TRANSPARENTLY INTERCEPTING AND OPTIMIZING RESOURCE REQUESTS - Systems and techniques for transparently intercepting and optimizing resource requests are described. Some embodiments can send a request to a server. In response to the request, the embodiments can receive a first script and at least a second script from the server, wherein the first script includes instructions for intercepting invocations to a set of functions, and wherein the second script includes at least one invocation to at least one function in the set of functions. The first script can then be executed, thereby causing subsequent invocations to each function in the set of functions to be intercepted by a corresponding resource optimization handler. Next, the second script can be executed. When the executing second script invokes a function in the set of functions, the invocation of the function can be intercepted, and a resource optimization handler corresponding to the function can be invoked instead of invoking the function. | 2015-06-11 |
20150163088 | System and Method to Monitor and Manage Imperfect or Compromised Software - A method of increasing integrity associated with a computer network, which includes determining a model operational parameter associated with an application operating at a predetermined integrity level on the computer network, the model operational parameter is associated with operation of a layer above the agent layer as the application operates at the predetermined integrity level and interacts with the layer above the agent layer, generating an operational model associated with the application performing at the predetermined integrity level, detecting a current operational parameter associated with the application operating at a current integrity level on the computer network, determining an exception associated with the operational model based on a comparison between the model operational parameter and the current operational parameter, and generating an instruction from the agent layer to resolve the exception, thereby increasing integrity of the computer network. A corresponding system and computer-readable device are also disclosed. | 2015-06-11 |
20150163089 | METHOD AND APPARATUS FOR MANAGING RESOURCES OF TRANSPORT NETWORK - Provided is a method and apparatus for managing resources of a transport network, the method including monitoring a fault occurring in a transfer path, and registering, when the fault occurs in the transfer path, a normal link of a second layer assigned to an operation path of a first layer in which the fault occurs. | 2015-06-11 |
20150163090 | SYSTEM FOR WIRELESS COMMUNICATION AND APPARATUS FOR WIRELESS COMMUNICATION - A system for wireless communication including: a first communication apparatus including a plurality of user plane processors, each user plane processor of the plurality of user plane processors being configured to forward data associated with a session that is associated with the user plane processor, to a terminal or from the terminal, and a control plane processor configured to transfer, when a first user plane processor is unavailable, the session that has been associated with the first user plane processor to a second user plane processor that is available. | 2015-06-11 |
20150163091 | Repair of Failed Network Routing Arcs Using Data Plane Protocol - A network includes multiple routing arcs for routing network traffic to a destination. Each arc comprising nodes connected in sequence by reversible links oriented away from a node initially holding a cursor toward one of first and second edge nodes through which the network traffic exits the arc. Each node includes a network device. The nodes in the arc detect a first failure in the arc. Responsive to the detecting the first failure, the nodes exchange first management frames over a data plane within the arc in order to transfer the cursor from the node initially holding the cursor to a first node proximate the first failure and reverse links in the arc as appropriate so that the network traffic in the arc is directed away from the first failure toward the first edge node of the arc through which the network traffic is able to exit the arc. | 2015-06-11 |
20150163092 | OPERATION MAGNAGEMENT DEVICE AND METHOD - An operation management device includes a processor that executes a procedure including: for plural nodes that includes plural nodes operating as virtual computers on one or more computers and that plural nodes that have a dependency relationship, deriving group information indicating the plural nodes having the dependency relationship on a basis of communication information from when the inter-node communication; and based on location information of the respective plural nodes included in the derived group information, determining operation information indicating that plural nodes included in the group information operate on a single computer, or operation information indicating that the plural nodes included in the group information respectively operate on plural computers, for the plural nodes included in the group information. | 2015-06-11 |
20150163093 | SYSTEM AND METHODS TO CONFIGURE SERVICE PROVIDERS FOR CLIENT APPLIANCES, AND FOR TRACKING AND PROVIDING SERVICE DATA - A system and methods to configure, track and provide device data for clients is disclosed. The system configures a device to interact according to client specified settings. The system also tracks relevant data from a service provider interaction with the client. The system is configured to provide the tracked data to a third party upon a validated request. For example, the system may store and provide the tracked data in the cloud, through a network. | 2015-06-11 |
20150163094 | METHOD OF AND APPARATUS FOR CONFIGURING A LINK IN A LABEL SWITCHING COMMUNICATION NETWORK - The present invention relates to a method of and apparatus for configuring a link in a label switching communication network. The method implemented in a network node comprises determining formation of a communication link between the network node and another network node and sending link formation information to a link manager. The method further comprises receiving link configuration information for the communication link from the link manager and configuring the communication link in response to the received link configuration information. | 2015-06-11 |
20150163095 | APPROACH FOR AUTOMATICALLY SETTING THE DEVICE INSTANCE OF A BACNET DEVICE - An approach for automatically setting the device instance of a device such as a unitary controller without reliance on a router and/or global controller, or something like a special extension to an associated router and/or global controller. The approach may be implementable entirely by logic in the unitary controller. | 2015-06-11 |
20150163096 | SYSTEM AND METHOD FOR CONFIGURING DEVICE SOCIALITY - Provided are a system and a method for configuring device sociality which constructs one or more networks through wired/wireless internet and configures device sociality for one or more devices included in one or more networks. | 2015-06-11 |
20150163097 | AUTOMATIC NETWORK FORMATION AND ROLE DETERMINATION IN A CONTENT DELIVERY FRAMEWORK - A computer in a content delivery network (CDN) may take on one or more roles within the CDN. A particular computer takes on a first at least one role within the CDN; and then, in response to a change in configuration information, takes on a second at least one role within the CDN, the second at least one role being distinct from the first at least one role. | 2015-06-11 |
20150163098 | Method, Apparatus and Computer Program Product for Providing Confirmed Over-The-Air Terminal Configuration - An apparatus for providing confirmed OTA terminal configuration includes a processing element configured to communicate configuration data to a mobile terminal. The processing element is also configured to initiate a. confirmation sequence to confirm proper receipt of the configuration data at the mobile terminal, and to receive information indicating whether the configuration data was properly received at the mobile terminal. | 2015-06-11 |
20150163099 | DATA INTEGRATION APPARATUS FOR USE IN SENSOR NETWORK - A data integration apparatus for use in a sensor network system is provided. The sensor network system includes a sensor network and an application server. The data integration apparatus receives text commands associated with access of the sensor network from the application server, and accomplishes the operations of the tabled data provided by the network node of the sensor network by using the text commands and the hardware configurations of the sensor network cooperatively. | 2015-06-11 |
20150163100 | LINK-LAYER LEVEL LINK AGGREGATION AUTOCONFIGURATION - A computing device identifies a plurality of network interface controllers (NICs) that are available for link aggregation. The computing device probes a network using a plurality of protocols to detect a topology of at least one network to which the plurality of NICs are connected. The computing device automatically establishes a link aggregation configuration including one or more of the plurality of NICs based on the determined network topology. | 2015-06-11 |
20150163101 | WORK MACHINE, MANAGEMENT SYSTEM AND MANAGEMENT METHOD - A work machine includes: an electronic device; a signal line to which the electronic device is connected; a memory unit which stores at least identification information for identifying the electronic device; a communication unit which wirelessly communicates to an outside of the work machine; and a processing unit, wherein when the identification information acquired from the electronic device via the signal line is different from the identification information stored in the memory unit, the processing unit stores the identification information acquired from the electronic device in the memory unit and transmits the acquired identification information to the outside of the work machine via the communication unit. | 2015-06-11 |
20150163102 | CLIENT-SERVER SYSTEM FOR NETWORK SERVICES AND APPLICATIONS FOR MOBILE TELECOMMUNICATIONS TERMINALS - A digital telecommunications client-server system where a network server communicates by a protocol with a digital application located on a mobile terminal. The digital application includes a navigation module, a presentation module, a decoder interpreter module and a transport module. The digital application interprets data received from a network server located in a mobile core telecommunications network and displays interpreted data on a screen of the mobile terminal, with the interpreted data relating to a service or application. The digital application interprets a request of a user entered into the mobile terminal in response to the interpreted data displayed on the screen of the mobile terminal, and sends from the mobile terminal data interpreted from the user's request to the telecommunications network. | 2015-06-11 |
20150163103 | CONTROLLING COMPUTER NODES THROUGH SOCIAL MEDIA - Some embodiments are directed to a computer node that communicates a report message containing information to a social media server to cause publishing of the information to other computer nodes tracking publishing on the social media server by the computer node. The computer node receives a response message from one of the other computer nodes through the social media server, and operates based on the response message. Related embodiments are directed to another computer node that communicates with a social media server to track information published by report messages from other computer nodes, generates a response message based on the information published by one of the other computer nodes, and communicates the response message to the social media server to cause publishing of content of the response message to the other computer nodes. | 2015-06-11 |
20150163104 | Sketch Based Monitoring of a Communication Network - A node of a communication network determines a hash-based sketch. The sketch may for example correspond to a Count-Min (CM) sketch. The sketch summarizes a number of occurrence of an event for a group of UEs. Further, the node receives information representing the number of occurrence of the event for said group of UEs from one or more further nodes of the communication network, e.g., in a further hash-based sketch. The node updates the sketch with the information received from the further and provides the updated sketch to the further nodes. | 2015-06-11 |
20150163105 | BROADBAND MODEM AND NETWORK TERMINATION WITH CHANNEL LEARNING AND METHODS FOR USE THEREWITH - Aspects of the subject disclosure may include, for example, a channel learning entity is configured to receive a priori network data via a transceiver. The channel learning entity generates at least one measurement of the communication environment based on the a priori network data, and generates first report data for transmission via the transceiver based on the at least one measurement of the communication environment. Other embodiments are disclosed. | 2015-06-11 |
20150163106 | SERVICE LEVEL VIEW OF AUDIOVISUAL CONFERENCE SYSTEMS - In an embodiment, a machine-readable volatile or non-volatile storage medium stores one or more sequences of instructions which, when executed by one or more processors, cause the one or more processors to perform monitoring a plurality of video conference locations, each of the locations comprising one or more video conference rooms, resulting in creating and storing monitored data; generating service level view data which when displayed on a video display unit concurrently comprises graphical representations of all the locations and all the rooms, and graphical representations of faults associated with each of the rooms. Rooms can include coder-decoders (codecs), cameras, video monitors, and network packet data routing or switching elements. Embodiments provide a holistic view of all video conference rooms in a deployment, with aggregated call usage, quality and fault data, with highly useful graphical management displays. | 2015-06-11 |
20150163107 | System and Method for Reduced Latency Reporting in an Ethernet Passive Optical Network (EPON) - A system and method for reduced latency reporting in an Ethernet passive optical network (EPON). Gate messages can be generated by a bridged fiber coax unit (FCU) in response to a first report message from a coax network unit (CNU). A second report message including a request for bandwidth can be transmitted to the optical line terminal (OLT) prior to receipt of upstream data at the FCU. | 2015-06-11 |
20150163108 | METHODS AND APPARATUS TO IDENTIFY NETWORK TOPOLOGIES - Methods and apparatus to identify network topologies are disclosed. An example method comprises determining a set of network nodes between a pair of designated nodes in a network based on a configuration of the network and locations of the designated nodes; determining valid combinations of the network nodes by determining whether the combination of available ones of the set of network nodes enables monitoring of the network according to the configuration of the network; and generating performance measurement commands for the valid combinations of the network nodes. | 2015-06-11 |
20150163109 | RPC CALL INTERCEPTION - A service proxy is described herein. The service proxy is configured to act as an intermediary between a client and a service. The service proxy may observe communications, modify communications, log communications, or the like, particularly so as to enhance the security and reliability of the host device. In some implementations, the service proxy may cooperate with an operating system to take over a named port object. In some implementations, the service proxy may receive messages as an intermediary between the client and the server. In some implementations, the service proxy may attach to a shared memory to intercept communications. In some implementations, the service proxy may be injected into a client process to appear to be the client itself. | 2015-06-11 |
20150163110 | Registration Reconciliation Influenced by Expired Registration Records - An approach is provided in which a registry service system correlates multiple registration records, one of which is expired, to a network resource. The registry service system generates a quality of correlation value based upon registration record confidences corresponding to the correlated registration records. In turn, the registry service system creates a resource record that includes the quality of correlation value and indicators corresponding to the correlated registration records. | 2015-06-11 |
20150163111 | MANAGING RESOURCES IN A DISTRIBUTED COMPUTING ENVIRONMENT - Methods, apparatuses, and computer program products for managing resources in a distributed computing environment that includes a plurality of resources and a resource recycling unit for storing discarded resources are provided. Embodiments include a management system maintaining within a resource recycling unit, a plurality of discarded resources of the distributed computing environment. Embodiments also include the management system receiving from a user, a request for a resource of the distributed computing environment and in response to receiving the request, selecting a first discarded resource from the plurality of discarded resources of the resource recycling unit. Embodiments also include the management system providing the selected first discarded resource to the user. | 2015-06-11 |
20150163112 | Relay Device - A line card monitors communicability between itself and first to third fabric cards, and when there is abnormality in the communicability with the second fabric card, detects the abnormality and configures settings to switch a frame transmitted to the second fabric card so as to be directed to the third fabric card as a result of the detection of the abnormality within a first period. A communicability test unit generates a test frame at every second period, transmits the test frame to the fabric card selected by a path selection unit, and receives the test frame returned from the fabric card. The second period is longer than the first period, and the communicability test unit evaluates the presence or absence of a fault based on the reception results for the first and second test frames. | 2015-06-11 |
20150163113 | COMMUNICATION CONTROL APPARATUS - A communication control apparatus that monitors a network connection status of a device on a network, includes a detection unit configured to detect a communication state of the network, a setting unit configured to set a period in accordance with the communication state detected by the detection unit, a reception unit configured to receive data from the device via the network, and a controller configured to execute a predetermined process in the case where the reception unit fails to receive data from the device over the period. | 2015-06-11 |
20150163114 | NETWORK CONTROLLER FOR DELAY MEASUREMENT IN SDN AND RELATED DELAY MEASUREMENT SYSTEM AND DELAY MEASUREMENT METHOD - A network controller for delay measurement in SDN and related delay measurement system and delay measurement method are provided. A probe packet is used to record the transmission of the probe packet between the network controller and network switches, to calculate a transport delay time between the network switches and hop delay time between the network switches, to obtain the delay of each link in the transmission path, which helps in finding out a critical hop in the SDN transmission path. Through the delay measurement mechanism according to the present disclosure, the critical hop will become a reference based on which a network manager adjusts a network framework, or a basis taken by an SDN control system to select a path. | 2015-06-11 |
20150163115 | METHOD OF MEASURING NETWORK TRAVERSAL TIME WHEN SETTING UP TCP CONNECTIONS - A method of measuring traversal time at a point of a network when setting up TCP (Transmission Control Protocol) connections, using recordings carried out according to a network protocol used to collect information on IP traffic, such as Netflow, the recordings including (i) a first recording generated by the synchronization request/response at this point of the network and (ii) the use of a field relating to a start instant (“StartTime”) of the first recording so as to date-stamp the synchronization request/response at this point of the network. | 2015-06-11 |
20150163116 | CLIENT-SIDE CLICK TRACKING - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for performing client-side click tracking. In one aspect, a method includes receiving, by a client, a resource from one or more servers. The resource includes (i) a link, (ii) click tracking code, and (iii) local storage monitoring code. The method includes invoking, by the client, the click tracking code and the local storage monitoring code, detecting, by the invoked click tracking code, a selection of the link, and generating, by the invoked click tracking code, a representation of the selection of the link. The method includes storing, by the invoked click tracking code, the representation of the selection of the link in a local storage on the client, determining, by the invoked local storage monitoring code, to communicate the representation of the selection of the link; and communicating, by the invoked local storage monitoring code, the representation of the selection of the link to the one or more servers. | 2015-06-11 |
20150163117 | Inspecting Operations of a Machine to Detect Elephant Flows - Some embodiments provide a system that detects whether a data flow is an elephant flow; and if so, the system treats it differently than a mouse flow. The system of some embodiments detects an elephant flow by examining, among other items, the operations of a machine. In detecting, the system identifies an initiation of a new data flow associated with the machine. The new data flow can be an outbound data flow or an inbound data flow. The system then determines, based on the amount of data being sent or received, if the data flow is an elephant flow. The system of some embodiments identifies the initiation of a new data flow by intercepting a socket call or request to transfer a file. | 2015-06-11 |
20150163118 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING PROGRAM - A disclosed information processing system includes an apparatus and an information processing apparatus including a service information memory unit storing service identification information identifying a service provided for the apparatus and program identification information for identifying a program required to be installed in the apparatus, a correspondence setup unit storing the apparatus identification information for identifying the apparatus and the service identification information upon a receipt of a usage request in which the apparatus identification information and the service identification information are designated, a communication unit requesting installation of a program related to the program identification information stored in the service information memory unit, and a program administrating unit returning the program related to the program identification information designated in the acquisition request, in response to the acquisition request for the program from the apparatus, wherein the program causes the apparatus to send information related to the apparatus. | 2015-06-11 |
20150163119 | REMOTE MONITORING AND CONTROLLING OF NETWORK UTILIZATION - A non-transitory computer-readable storage medium storing instructions which, when executed by processors, cause the processors to perform: at a management computer, receiving, from a gateway located in a managed network, device information about devices in the managed network; for a particular device: determining a match between the device capabilities of the particular device and features of a particular network software application configured to control the particular device, and determining a particular protocol endpoint configured to communicate control instructions from the particular network software application to the particular device; receiving, from the gateway, aggregated data that reflects network utilization by the devices located in the managed network; for the particular device: based at least in part on the aggregated data, using the particular network software application, determining control instructions for the particular device; causing the particular protocol endpoint to transmit the control instructions for the particular device to the device. | 2015-06-11 |
20150163120 | Pro-Active MPIO Based Rate Limiting To Avoid iSCSI Network Congestion/Incast For Clustered Storage Systems - In an embodiment, a method of managing inbound throughput for at least one storage read request can include analyzing, at a server, a given storage read request to determine required network throughput at network ports of the server. Each of the storage read requests can be directed to a storage device. The method can further include queuing, at the server, the given storage read request if the required throughput of the given storage read request combined with throughput of outstanding storage read requests previously sent to the storage device saturates the available bandwidth of the network ports of the server. The method can additionally include sending the given storage request from the server to the storage device if the required throughput of the storage read request along with throughput of the outstanding read requests is below the level of available bandwidth of the network ports of the server. | 2015-06-11 |
20150163121 | DISTRIBUTED MONITORING, EVALUATION, AND RESPONSE FOR MULTIPLE DEVICES - Data is collected from a set of devices. The data is associated with the devices, mobile application programs (apps), web applications, users, or combinations of these. A norm is established using the collected data. The norm is compared with data collected from a particular device. If there is a deviation outside of a threshold deviation between the norm and the data collected from the particular device, a response is initiated. | 2015-06-11 |
20150163122 | Workload Management - A messaging system comprises a plurality of connected components and including a schema defining fields for messages, at least one field defined as non-essential. A mechanism for operating the messaging system comprises the steps of collecting one or more performance metrics for one or more components of the messaging system, determining that at least one performance metric has crossed a predetermined threshold, informing one or more components of the messaging system that a surge in workload has occurred, and the informed components removing non-essential fields from transmitted messages and/or not processing non-essential fields from received messages. | 2015-06-11 |
20150163123 | APPARATUS FOR TESTING DATA COMMUNICATIONS ON TWO WIRE COMBINED POWER AND DATA NETWORK SYSTEMS FOR AUTOMATION - Apparatus for testing data communications on two wire combined power and data network systems for automation, comprising a control means and connection means adapted to connect said apparatus to a subject network segment, in which said control means comprises data signal output means adapted to impart a test data signal to said subject segment via said connection means, and a data signal disruption digital output digital input attribute modifier means adapted to vary one or more physical layer attributes of said test data signal which affect its functional quality and/or to vary one or more physical layer attributes of said subject segment which are capable of affecting the functional quality of data signals carried thereon. | 2015-06-11 |
20150163124 | SYSTEM AND METHOD FOR DYNAMICALLY TESTING NETWORKED TARGET SYSTEMS - A method and system for conducting performance hybrid traffic testing of a networked target system (NTS) are disclosed. The method comprises initializing at least one private cloud source (PRCS) to generate traffic within a private network security system (PRNSS); initializing at least one public cloud source (PUCS) to generate traffic outside of the PRNSS; customizing the traffic within the PRNSS and the traffic outside of the PRNSS; gathering information respective of the performance of the at least one PUCS and the at least one PRCS; and generating a performance testing report respective of the gathered information. | 2015-06-11 |
20150163125 | APPARATUS AND METHOD FOR COMPUTING END-TO-END PATHS THROUGH A NETWORK COMPRISING A PLURALITY OF NETWORK DOMAINS - A network architecture is provided for enabling end-to-end paths to be computed across a plurality of network domains. The network architecture comprises a plurality of child path computation elements associated with a plurality of respective network domains, each child path computation element adapted to compute a path segment within its respective network domain. A parent path computation element adapted to compute an end-to-end path across a plurality of network domains in conjunction with the plurality of respective child path computation elements. | 2015-06-11 |
20150163126 | METHOD FOR ROUTING DATA TRAFFIC IN A COMMUNICATION NETWORK - A method for routing data traffic in a communication network having a source entity, a destination entity, and a plurality of routers for routing the data traffic from the source entity to the destination entity according to link-state-routing according to a shortest-path-first-algorithm, includes transmitting load information of the at least one data traffic interface to a routing management entity and control information, about a low load period of the at least one data traffic interface to the first router (DR), wherein a low load period is related to a data traffic interface of the first router (DR). The method further includes switching, by the first router (DR), into a dosing-state as an energy-saving state during the low load period, and issuing, by the first router (DR) before entering the dosing-state, an operational state message. | 2015-06-11 |
20150163127 | DISTANCE-BASED ROUTING IN AN INFORMATION-CENTRIC NETWORK - One embodiment of the present invention provides a computing system. The computing system includes a processor and a computer-readable storage medium. The computer-readable storage medium stores instructions which when executed by the processor cause the processor to perform a method. The method comprises identifying an identifier of an anchor node associated with a name in an update message received from a neighbor node. The anchor node stores a content object identifiable based on the name independent of the anchor node. The method also comprises determining a valid next-hop neighbor in the ICN for the name based on a sequence number of the update message generated by the anchor node and lexicographic order of an identifier of the neighbor node; and determining whether the anchor node is a designated anchor node based on the validity of the next-hop neighbor and a routing metric for the anchor node. | 2015-06-11 |
20150163128 | DATA RE-ROUTING FOR SPECIFIC END USER AVOIDANCE - Embodiments of the present invention provide a method, system and computer program product for data routing alteration to avoid a specified end user. In an embodiment of the invention, a method for data re-routing for specific end user avoidance includes receiving a request to route a file to a primary location and identifying an end user excluded from accessing the document. The method also includes computing a likelihood that the excluded end user may contemporaneously access the primary location. Finally, the method includes responding to a determination that the excluded end user is likely to contemporaneously access the primary location by taking corrective measures to re-route the file to an alternate location. | 2015-06-11 |
20150163129 | METHOD AND APPARATUS FOR SETTING DETOUR PATH IN WIDEBAND HIGH FREQUENCY WIRELESS SYSTEM USING CENTRALIZED MAC PROTOCOL - Provided is a method and apparatus for setting a detour path in a wideband high frequency wireless system using a centralized Media Access Control (MAC) protocol. Here, in a wireless system using the centralized MAC protocol where a time synchronization and a band allocation may be performed by a single central control unit, when a signal blockage occurs while a data communication is being performed via a direct path between a source device and a destination device, the detour path may be quickly provided. | 2015-06-11 |
20150163130 | METHOD ENABLING FAST SWITCHING BETWEEN MULTICAST TREES - Presented are a system and method of detecting a multicast tree link failure and performing a fast switch from the failed multicast tree communication path to a secondary multicast tree communication path. The methods are suitable for leaf nodes in a multiprotocol label switching network. The method generates a count of communication path failure detection packets and a count of communication path failure detection packets plus other packets and compares the counts to determine the status of the link. The system includes two counter components and a comparison component. | 2015-06-11 |
20150163131 | ONLINE APPLICATION TESTING OF GROWN APPLICATION CAPACITY - A capability for online application testing of grown application capacity is presented. The capability for online application testing of grown application capacity enables grown application capacity of a cloud-based application to be tested and validated while the application remains online for handling of live application traffic. The capability for online application testing of grown application capacity enables grown application capacity of a cloud-based application to be tested and validated with minimal impact or risk to the application traffic of the application or the existing application capacity of the application. The capability for online application testing of grown application capacity may support online testing of grown application capacity for various mechanisms for growing application capacity of a cloud-based application (e.g., horizontal growth mechanisms, vertical growth mechanisms, pseudo-vertical growth mechanisms, or the like). | 2015-06-11 |
20150163132 | Parallel Distributed Network Management - A method of parallel processing by networked devices, in which distributed data in a network is accessed in parallel to provide results. Commands and queries by a user station define a set of such distributed data. The networked devices access the distributed data in portions, individually process each portion, conduct peer-to-peer communication to aggregate results from processing each portion, and individually determine whether and when to report results. Making effective use of network assets (such as processing and storage at each node), making effective use of concurrency of network assets, limiting bandwidth use between network assets and user stations, and limiting use of assets (such as processing and storage) at user stations. | 2015-06-11 |
20150163133 | LOAD SHARING OF MPLS PSEUDO-WIRES - A first switch at a first edge of an MPLS network establishes a VPLS pseudo-wire over a plurality of label switched paths (LSPs) of the MPLS network that couple the first switch to a second switch at a second edge of the MPLS network. The first switch further load balances data to be transmitted across the VPLS pseudo-wire over the plurality of LSPs. The first switch accomplishes this by maintaining at a first table an indication that the VPLS pseudo-wire traffic is to be transmitted over the plurality of LSPs and further identifying in the first table a pointer to a second table maintaining a plurality of LSP entries corresponding to the respective plurality of LSPs. The first switch then identifies at the second table a pointer to a third table maintaining a plurality of entries, wherein each of the plurality of entries identifies a next hop index. The first switch receives a packet to be transmitted over the VPLS pseudo-wire, computes a hash value on at least one or more portions of the received packet, selects one of the plurality of entries in the third table according to the computed hash value, retrieves the next hop index from the selected one of the plurality of entries in the third table, selects an entry in a fourth table according to the retrieved next hop index, and retrieves from the selected entry in the fourth table an egress port number associated with an egress port to which the received packet is to be directed for transmission across the VPLS pseudo-wire. | 2015-06-11 |
20150163134 | ROUTING PROTOCOLS FOR POWER LINE COMMUNICATIONS (PLC) - Systems and methods for routing protocols for power line communications (PLC) are described. In some embodiments, a method may include transmitting a one-hop broadcast request message to a plurality of PLC devices in a mesh network and receiving a response from each of the devices. The method may also include selecting one of the devices as a bootstrapping agent, sending a join request to a bootstrapping server through the bootstrapping agent, and, in response to successfully joining the network, setting the bootstrapping agent as a next hop toward a bootstrapping server. In another embodiment, a method may include maintaining a routing table for a plurality of PLC devices in a mesh network, receiving a join request from a PLC device, accepting the request, and updating the table to add a record corresponding to the PLC device; the record setting the bootstrapping agent as a penultimate hop toward the PLC device. | 2015-06-11 |
20150163135 | Method, Network Device and System for Sending And Receiving Packet - Embodiments of the present invention provide a method, network device, and system for sending and receiving a packet. The method includes fragmenting, by a first network device, a first Hello packet. Each Hello fragment packet has a fragment ID and a content identifier. The first network device sends fragment brief information of the first Hello packet to a second network device. The fragment brief information of the first Hello packet includes fragment information of each Hello fragment packet. The first network device sends the Hello fragment packet corresponding to the first Hello packet if the first network device receives a request packet sent by the second network device. | 2015-06-11 |
20150163136 | INFORMATION PROCESSING APPARATUS, ACTIVATING APPARATUS, ACTIVATING SYSTEM, AND ACTIVATING METHOD - An information processing apparatus includes a storage configured to store an IP address of a router in association with identification information corresponding to each of first apparatuses, the router connecting a first network and a second network differing from the first network, the first apparatuses being connected to the second network, and a transmitter configured to transmit a predetermined packet including the identification information to the IP address of the router via the first network in response to reception of an operation request for a corresponding one of the first apparatuses, where the predetermined packet is used for transmitting a magic packet including a MAC address corresponding to the identification information included in the predetermined packet in the second network. | 2015-06-11 |
20150163137 | OVERLAY CAPABILITIES EXCHANGE USING DCBX - A method for overlay network capabilities exchange for reserving high priority handling of packets, for example, FCoE and other sensitive packets in an overlay network is achieved by determining a transport protocol port map, wherein the port map creates a correlation between one or more inner protocols and one or more outer transport protocol port numbers. The method includes determining a priority bit re-map table, wherein the priority bit re-map table creates a correlation between one or more outer transport protocol port numbers and one or more levels of priority. A combined table, may be determined wherein the combined table creates a correlation between one or more inner packet protocols, one or more outer transport protocol port numbers, and one or more levels of priority. The combined table is advertised to the other computing devices in a network and connected to the network. | 2015-06-11 |
20150163138 | PACKET TRANSMISSION SYSTEM, METHOD AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM OF THE SAME - A packet transmission system is provided that includes packet switching modules each having a memory unit to store packet flow tables and a control module coupled to the packet switching modules. The control module includes a memory to store computer executable commands and a processor. The process executes the commands to perform the operations outlined below. A flow entry corresponding to a target packet switching module is generated. A residual memory amount of the memory unit of the target packet switching module is determined to be lower than a threshold value. A redirection packet switching module is selected from the other packet switching modules. A redirection flow entry is added to the packet flow tables in the target packet switching module and a processing flow entry is added to the packet flow tables in the redirection packet switching module according to the flow entry. | 2015-06-11 |
20150163139 | Forwarding Packet in Stacking System - A first Virtual Device (VD) of a first member device connects to a first VD of a second member device via a stacking link that is established between the first member device and the second member device. A VD number of the first VD in the first member device is the same as that of the first VD in the second member device. When a unicast packet is received via a service port, the first VD of the first member device searches in a forwarding table of the first VD in the first member device. When the unicast packet is to be forwarded to another member device the search of the forwarding table, the first VD of the first member device forwards the unicast packet via the stacking link. | 2015-06-11 |
20150163140 | METHOD AND SYSTEM FOR DYNAMIC USAGE OF MULTIPLE TABLES FOR INTERNET PROTOCOL HOSTS - A network switch has a plurality of data tables accessible to a plurality of networking protocols. Each of the plurality of data tables contains a plurality of entries. One of the plurality of data tables is selected in which to reserve a respective one of the plurality of entries as an entry for use by one of the plurality of networking protocols. The utilization of each of the plurality of data tables is compared responsive to an operation of the one of the plurality of networking protocols that causes a need to reserve the entry, and one of the plurality of data tables is selected in which to reserve the entry, based on the comparison. | 2015-06-11 |
20150163141 | FIFO Affinity for Multiple Ports - A mechanism is provided in a data processing system for shared buffer affinity for multiple ports. The mechanism configures a physical first-in-first-out (FIFO) buffer with a plurality of FIFO segments associated with a plurality of network ports. The plurality of network ports share the physical FIFO buffer. The mechanism identifies a FIFO segment under stress within the plurality of FIFO segments. The mechanism reconfigures the physical FIFO buffer to assign a portion of buffer space from a FIFO segment not under stress within the plurality of FIFO segments to the FIFO segment under stress. | 2015-06-11 |
20150163142 | DETECTING AN ELEPHANT FLOW BASED ON THE SIZE OF A PACKET - Some embodiments provide a forwarding element that inspects the size of each of several packets in a data flow to determine whether the data flow is an elephant flow. The forwarding element inspects the size because, in order for the packet to be of a certain size, the data flow had to already have gone through a slow start in which smaller packets are transferred and by definition be an elephant flow. When the forwarding element receives a packet in a data flow, the forwarding element identifies the size of the packet. The forwarding element then determines if the size of the packet is greater than a threshold size. If the size is greater, the forwarding element specifies that the packet's data flow is an elephant flow. | 2015-06-11 |
20150163143 | Reducing Network Latency During Low Power Operation - In an embodiment, a method includes identifying a core of a multicore processor to which an incoming packet that is received in a packet buffer is to be directed, and if the core is powered down, transmitting a first message to cause the core to be powered up prior to arrival of the incoming packet at a head of the packet buffer. Other embodiments are described and claimed. | 2015-06-11 |
20150163144 | DETECTING AND HANDLING ELEPHANT FLOWS - Some embodiments provide a forwarding element that detects and handles elephant flows. In detecting, the forwarding element of some embodiments monitors statistics or measurements relating to a data flow. In handling, the forwarding element marks each packet associated with a detected elephant flow in some manner to differentiate it from a packet associated with a mouse flow. Alternatively, the forwarding element of break elephant flows into a number mouse flow by facilitating in sending packets associated with the detected elephant flow along different paths. | 2015-06-11 |
20150163145 | REPORTING ELEPHANT FLOWS TO A NETWORK CONTROLLER - Some embodiments provide a system that detects whether a flow is an elephant flow; and if so, the system treats it differently than a mouse flow. The system of some embodiment detect elephants based on one or more of the following: statistics associated with a flow, packet segment size, and invoked system calls. Also, some embodiments use one or more various methods to handle elephant flows. Examples of such methods include marking each packet belonging to an elephant with a particular marking, breaking the elephants into mice, reporting the elephant to a network controller, and selectively choosing a route for each packet belonging to the elephant. | 2015-06-11 |
20150163146 | PACKET FORWARDING APPARATUS AND METHOD USING FLOW SUBGROUP BASED PATH SELECTION FOR DYNAMIC LOAD BALANCING - A packet forwarding apparatus has a path selection device used to generate a path selection signal for selecting a destination path from egress paths of an egress path group. The path selection device has a flow group based path selection circuit and a flow subgroup based path selection circuit. The flow group based path selection circuit sets the path selection signal based on a flow group into which a packet is categorized when a dynamic load balancing function is not applied to forwarding of the packet. The flow subgroup based path selection circuit sets the path selection signal based on a flow subgroup into which the packet is categorized when the dynamic load balancing function is applied to forwarding of the packet. Flows associated with the egress path group are categorized into flow subgroups, the flow subgroups are categorized into flow groups, and each flow includes packets with same tuple(s). | 2015-06-11 |
20150163147 | Framework for Traffic Engineering in Software Defined Networking - System and method embodiments are provided for traffic engineering (TE) in software defined networking (SDN). The embodiments enable a complete end-to-end TE solution between a user equipment (UE) and a source/destination across a radio access network (RAN). In an embodiment, a method in a network component for TE in a SDN includes receiving TE information from a first core network component in a core network, a RAN component, wherein the RAN is communicably coupled to the core network, wherein the TE information includes a TE objective; and determining a TE decision between at least one UE and a second core network component in the core network according to the TE information and the TE objective, wherein the TE decision comprises information for at least one end-to-end path solution between the at least one UE and the second core network wherein the path traverses the core network and the RAN. | 2015-06-11 |
20150163148 | Packet Scheduling in a Communication Network - A method and apparatus for packet scheduling over a communication link in a communication network. A data packet scheduler accords scheduling weights to at least two sets of data packets to be transmitted, and the sending of the sets of data packets is scheduled in accordance with the scheduling weights. When it is determined that a change in available bandwidth over the communication link has occurred, the scheduler dynamically adjusts the scheduling weight for each set of data packets on the basis of the available bandwidth. This ensures more efficient resource sharing control and resource guarantees when the available bandwidth changes. | 2015-06-11 |
20150163149 | SCTP BUNDLING - A method for transmitting upper layer application messages into a SCTP packet in which messages are bundled into a packet comprising a SCTP header and a payload. The method comprises receiving messages from an upper layer application; processing messages through a first process stage in which messages may be added to a first buffer for bundling and then to a secondary process stage in which the bundled messages/messages may be further stored in a second buffer until receiver window and congestion window properties are found to be allowable for transmission; transmitting a SCTP packet of bundled messages; receiving an upper layer application message; resolving the time criticality of the message; if high time criticality, transmitting further the message in a payload portion of a SCTP packet to the secondary stage, otherwise processing the message in the first stage so as to potentially bundle the message with other messages. | 2015-06-11 |
20150163150 | METHOD AND SYSTEM OF SERVICE PLACEMENT FOR SERVICE CHAINING - A method for placing services at network devices is disclosed. A network contains a plurality of network devices and the network offers a set of services to subscribers. Each subscriber of the network utilizes a subset of the set of service, where an order of the services is not predefined. The method starts with ordering the services from the most utilized service to the least utilized, and selects services from the most utilized to the least utilized. For each service, a network device is selected so that placing the service adds a least sum of additional delay based on services already placed in the network, and a path for each subscriber utilizing the service is updated to include the service, where the path is an ordered chain of services, and where the service is inserted in the path to result in minimum addition to delay to the subscriber. | 2015-06-11 |