30th week of 2015 patent applcation highlights part 62 |
Patent application number | Title | Published |
20150207658 | Soft Bit Un-Uniform Quantization Method, Apparatus, Computer Program and Storage Medium - The embodiments of the present disclosure disclose a soft bit un-uniform quantization method, apparatus, computer program and storage medium. The soft bit un-uniform quantization method comprises: determining a threshold value; obtaining a quantization step according to the threshold value; obtaining a first data after a QAM demodulating and before a Turbo decoding in a wireless communication system; and performing a soft bit un-uniform quantization on the first data to obtain a quantization result according to the threshold value and the step. According to the present disclosure, the data after the QAM demodulating and before the Turbo decoding may obtain a distinguished Euclidean distance value and thus the performance can be improved greatly. | 2015-07-23 |
20150207659 | CORRECTION OF IMBALANCES IN A COMPLEX INTERMEDIATE FREQUENCY MIXER - A complex intermediate frequency mixer (IFM) for frequency translating a received complex intermediate frequency, IF, signal, wherein the received complex IF signal comprises at least two frequency bands located at upper-side and lower-side of 0 Hz, is provided. The complex intermediate frequency mixer comprises a first, second, third and fourth mixer (M | 2015-07-23 |
20150207660 | CLIENT-SIDE URL REDIRECTION - A method may include, by a processor, receiving a request from a client system for a first web page, transmitting to the client system the first web page comprising one or more navigation controls that invoke one or more uniform resource locators (URLs) that are subject to redirection, sending to the client system a redirection table that comprises at least one URL pattern and a corresponding redirected URL model, receiving a second request from the client system for a second web page referenced by a rewritten URL based on the redirected URL model in place of a selected URL included on the first web page; and sending data corresponding to the rewritten URL to the client system. | 2015-07-23 |
20150207661 | SYSTEM AND METHOD FOR PROVIDING PRIORITY BASED ACCESS TO RESOURCES FOR APPLICATIONS - A method and system for providing an enterprise grade runtime on communication devices, for priority based application management. The system provides priority based resource access for applications that are registered as enterprise applications. The system further performs a priority based resource utilization wherein selected resources are monitored and managed to ensure optimum resource utilization. The system also ensures that selected enterprise applications are always ON. | 2015-07-23 |
20150207662 | NETWORK CONTROL SOFTWARE NOTIFICATION WITH ADVANCE LEARNING - Techniques are disclosed for notifying network control software of new and moved source MAC addresses. In one embodiment, a switch detects packets sent by a new or migrated virtual machine, and sends a copy of a detected packet to the network control software as a notification. The switch further learns the source MAC address, thereby permitting the entry to be used for normal forwarding prior to validation of the entry and the VM associated therewith by the network control software. Until the network control software has validated the VM, the switch may periodically retry the notification to the network control software. “No_Redirect” and “Not_Validated” flags may be used to indicate whether a notification has already been attempted and thus no retry is necessary, and that the VM associated with the VM has not yet been validated, respectively. | 2015-07-23 |
20150207663 | NETWORK CONTROL SOFTWARE NOTIFICATION AND INVALIDATION OF STATIC ENTRIES - Techniques are disclosed for notifying network control software of new and moved source MAC addresses. In one embodiment, a switch may redirect a packet sent by a new or migrated virtual machine to the network control software as a notification. The switch does not forward the packet, thereby protecting against denial of service attacks. The switch further adds to a forwarding database a temporary entry which includes a “No_Redirect” flag for a new source MAC address, or updates an existing entry for a source MAC address that hits in the forwarding database by setting the “No_Redirect” flag. The “No_Redirect” flag indicates whether a notification has already been sent to the network control software for this source MAC address. The switch may periodically retry the notification to the network control software, until the network control software validates the source MAC address, depending on whether the “No_Redirect” is set. | 2015-07-23 |
20150207664 | NETWORK CONTROL SOFTWARE NOTIFICATION WITH DENIAL OF SERVICE PROTECTION - Techniques are disclosed for notifying network control software of new and moved source MAC addresses. In one embodiment, a switch may redirect a packet sent by a new or migrated virtual machine to the network control software as a notification. The switch does not forward the packet, thereby protecting against denial of service attacks. The switch further adds to a forwarding database a temporary entry which includes a “No_Redirect” flag for a new source MAC address, or updates an existing entry for a source MAC address that hits in the forwarding database by setting the “No_Redirect” flag. The “No_Redirect” flag indicates whether a notification has already been sent to the network control software for this source MAC address. The switch may periodically retry the notification to the network control software, until the network control software validates the source MAC address, depending on whether the “No_Redirect” is set. | 2015-07-23 |
20150207665 | NETWORK CONTROL SOFTWARE NOTIFICATION WITH DENIAL OF SERVICE PROTECTION - Techniques are disclosed for notifying network control software of new and moved source MAC addresses. In one embodiment, a switch may redirect a packet sent by a new or migrated virtual machine to the network control software as a notification. The switch does not forward the packet, thereby protecting against denial of service attacks. The switch further adds to a forwarding database a temporary entry which includes a “No_Redirect” flag for a new source MAC address, or updates an existing entry for a source MAC address that hits in the forwarding database by setting the “No_Redirect” flag. The “No_Redirect” flag indicates whether a notification has already been sent to the network control software for this source MAC address. The switch may periodically retry the notification to the network control software, until the network control software validates the source MAC address, depending on whether the “No_Redirect” is set. | 2015-07-23 |
20150207666 | NETWORK CONTROL SOFTWARE NOTIFICATION AND INVALIDATION OF STATIC ENTRIES - Techniques are disclosed for notifying network control software of new and moved source MAC addresses. In one embodiment, a switch may redirect a packet sent by a new or migrated virtual machine to the network control software as a notification. The switch does not forward the packet, thereby protecting against denial of service attacks. The switch further adds to a forwarding database a temporary entry which includes a “No_Redirect” flag for a new source MAC address, or updates an existing entry for a source MAC address that hits in the forwarding database by setting the “No_Redirect” flag. The “No_Redirect” flag indicates whether a notification has already been sent to the network control software for this source MAC address. The switch may periodically retry the notification to the network control software, until the network control software validates the source MAC address, depending on whether the “No_Redirect” is set. | 2015-07-23 |
20150207667 | NETWORK CONTROL SOFTWARE NOTIFICATION WITH ADVANCE LEARNING - Techniques are disclosed for notifying network control software of new and moved source MAC addresses. In one embodiment, a switch detects packets sent by a new or migrated virtual machine, and sends a copy of a detected packet to the network control software as a notification. The switch further learns the source MAC address, thereby permitting the entry to be used for normal forwarding prior to validation of the entry and the VM associated therewith by the network control software. Until the network control software has validated the VM, the switch may periodically retry the notification to the network control software. “No_Redirect” and “Not_Validated” flags may be used to indicate whether a notification has already been attempted and thus no retry is necessary, and that the VM associated with the VM has not yet been validated, respectively. | 2015-07-23 |
20150207668 | G.8032 ETHERNET MULTIPLE FAULT RECOVERY MECHANISMS - A method, network element, and network provide detecting a failure on both ports of a major ring at a network element that has an interconnecting sub-ring terminating thereon; causing a block at an associated sub-ring termination port of the interconnecting sub-ring responsive to the failure on both the ports of the major ring; and monitoring the failure and clearing the block responsive to a recovery of one or both ports from the failure. The method, network, and network element include G.8032 multiple concurrent or simultaneous fault recovery mechanisms that traffic being transported between an interconnected major ring and a sub-ring to be successfully delivered in the event of dual concurrent faults on the major ring. | 2015-07-23 |
20150207669 | DATA REDUNDANCY IN A DATA LAYERED ARCHITECTURE NETWORK - A method and apparatus for providing data redundancy in a data layered architecture network. An enhanced redundancy data backend node stores data designated as dynamic data in a first memory. It also stores data designated as static data in a second memory having a higher latency and/or higher volume than the first memory. Data therefore has a lower memory footprint, as only dynamic data need be regularly updated. | 2015-07-23 |
20150207670 | Relay System and Switching Device - When a fabric switch detects a fault in its own link, the fabric switch transmits a first fault notification frame containing a fault link identifier representing the detected fault to a plurality of port switches. When the fabric switch receives a second fault notification frame from a plurality of port switches, it floods the second fault notification frame. When a port switch detects a fault in its own link, it transmits a second fault notification frame containing a fault link identifier to the plurality of fabric switches. Also, when the port switch receives the fault notification frame at all of its own links, it sets the LAG based on the fault link identifier. | 2015-07-23 |
20150207671 | METHOD AND SYSTEM FOR DEPLOYING MAXIMALLY REDUNDANT TREES IN A DATA NETWORK - A method and system is disclosed to compute and distribute a generalized almost directed acyclic graph (GADAG). The method includes computing, by a network element, a GADAG for the network, where the GADAG is a graph abstraction of the network, where the plurality of network elements are the vertices of the GADAG and links connecting the plurality of network elements are the directed edges of the GADAG. The method continues with assembling a GADAG descriptor based on the computed GADAG, and distributing the GADAG descriptor to a plurality of network elements, where each of the plurality of network elements utilizes the GADAG descriptor to compute maximally redundant trees for forwarding traffic. The method also includes leveraging layer 2 attributes and features for layer 2 deployments and updating redundant trees upon topology change events such that traffic outage is avoided or minimized. | 2015-07-23 |
20150207672 | APPARATUS AND METHOD FOR DETECTIONG CAUSE OF RADIO LINK FAILURE OR HANDOVER FAILURE IN MOBILE COMMUNICATION SYSTEM - A terminal, a Base Station (BS) and a method for detecting a cause of a Radio Link Failure (RLF) or handover failure are provided. The method includes determining whether an RLF or a handover failure occurs, performing a process of a connection re-establishment or connection establishment to enter a connection mode after encountering the RLF or the handover failure, and transmitting an RLF information report to a BS after entering the connection mode. | 2015-07-23 |
20150207673 | COMMUNICATION DEVICE, COMMUNICATION SYSTEM, METHOD FOR DETERMINING PATH, AND PROGRAM - A communication device communicates with a counterpart device via a working path or any of a plurality of backup paths. The communication device includes: a plurality of selection units which select either one of two paths, the plurality of selection units including a main selection unit and an auxiliary selection unit being different from the main selection unit; and a path determination unit which determines a path selected by one of the plurality of selection units which has last performed path selection to be a path to be used for communicating with the counterpart device. The main selection unit selects one path from between the working path and one of the plurality of backup paths. The auxiliary selection unit selects one path from between a path selected by one selection unit of the plurality of selection units and one of the plurality of backup paths, the one selection unit being different from the auxiliary selection unit. | 2015-07-23 |
20150207674 | Control Method and Device for Protecting Connectivity between Ethernet Ring Network Nodes, and First Node - A control method and apparatus for protecting connectivity between Ethernet ring network nodes, and a first node. The control method comprises: the first node supporting an Ethernet ring network protection technology interacting with the second node supporting the Ethernet ring network protection technology and near the first node, to detect link connectivity, where there is at least one third node not supporting the Ethernet ring network protection technology between the first node and the second node, and there is no node supporting the Ethernet ring network protection technology between the first node and the second node; when the first node detects a link fault, blocking a port connecting the first node to a failure link end; the first node sending a link fault alarm protocol frame to other nodes supporting the Ethernet ring network protection technology, to perform protection switchover. | 2015-07-23 |
20150207675 | Path Control System, Control Apparatus, Edge Node, Path Control Method, And Program - A path control system, includes: a forwarding network in which each forwarding node belongs to a group and forwards a packet based on a sub-label corresponding to the group; an edge node that adds a label including a plurality of sub-labels based on information contained in a received packet; and a control apparatus that performs path control of the forwarding network by controlling a combination of sub-labels added by the edge node and by controlling forwarding processing performed based on the sub-labels by the forwarding node(s). When a failure has occurred in a communication path, the control apparatus causes the edge node to change a sub-label corresponding to a failure section of the communication path in which a failure has occurred out of sub-labels added to a packet received after the failure, and causes the forwarding node(s) to forward a packet along a path that does not go through the failure section. | 2015-07-23 |
20150207676 | NETWORK ELEMENT AND A CONTROLLER FOR MANAGING THE NETWORK ELEMENT - A method for configuring network elements of a software-defined network includes receiving ( | 2015-07-23 |
20150207677 | SUBSCRIBER MANAGEMENT AND NETWORK SERVICE INTEGRATION FOR SOFTWARE-DEFINED NETWORKS HAVING CENTRALIZED CONTROL - Subscriber management and network service integration for an access network is described in which a centralized controller provides seamless end-to-end service from a network to access nodes. For example, a method includes dynamically establishing a control channel between the centralized controller and an access node, and establishing a transport label switched path (LSP) transport network packets between the access node and the network node. The access node sends, via the control channel, an endpoint indication message that indicates that an endpoint that has joined the network at the access node. The access node receives a pseudo wire request message via the control channel to install forwarding state for creating a pseudo wire for providing one or more network services to the endpoint. The access node receives a direct switch message via the control channel to configure the access node to map traffic received from the endpoint to the pseudo wire. | 2015-07-23 |
20150207678 | Method and Apparatus for Managing Physical Network Interface Card, and Physical Host - A method and an apparatus for managing one or more physical network interface cards and a physical host are provided. One or more virtual network interface cards are created, where each of the virtual network interface cards has a standard network interface card feature and an operation interface; the one or more virtual network interface cards are separately associated with one or more function modules of the physical network interface cards; and the physical network interface cards are managed by managing the one or more virtual network interface cards. In this way, differences in underlying hardware are shielded for an upper layer, and convenient and efficient centralized management are provided, thereby further improving network resource utilization. | 2015-07-23 |
20150207679 | METHOD AND APPARATUS FOR CHANGING INPUT TYPE IN INPUT SYSTEM USING UNIVERSAL PLUG AND PLAY - A method of controlling a receiving input device is provided. The method includes receiving input data corresponding to a first input type from a transmitting input device; changing an input type from the first input type to a second input type; informing the transmitting input device of the change of input type; receiving a report descriptor indicating whether the transmitting input device can transmit input data corresponding to the second input type or not from the transmitting input device; and receiving input data corresponding to the second input type from the transmitting input device or another transmitting input device according to the report descriptor. | 2015-07-23 |
20150207680 | DEVICE, SYSTEM AND METHOD OF CONFIGURING A RADIO TRANSCEIVER - Some demonstrative embodiments include devices, systems and/or methods of configuring a radio transceiver. For example, some embodiment include a radio virtual machine (RVM) to configure a radio transceiver, the RVM including a radio processor to execute a first code configuring one or more transceiver functionalities independent of a configuration of the radio transceiver, and to generate a second code based on the configuration of the radio transceiver and the first code, wherein the second code is to be executed by the radio transceiver to configure the one or more transceiver functionalities for the radio transceiver. | 2015-07-23 |
20150207681 | ENFORCING DEVICE SETTINGS FOR MOBILE DEVICES - The present invention extends to methods, systems, and computer program products for enforcing device settings for mobile devices. Generally, a computer system enforces appropriate mobile device settings (e.g., policy and/or configuration settings) prior to permitting a mobile device to access maintained data. The computer system receives a request from a mobile device. The computer system determines that current mobile device settings are not appropriate for accessing the maintained data. The computer system sends device settings, representing a new mobile device configuration that is appropriate accessing the maintained data, to the mobile device. The computer system receives an indication that the mobile device is configured in accordance with the device settings. The computer system permits the mobile device to access the maintained data in response to receiving the indication that the mobile device is configured in accordance with the device settings. | 2015-07-23 |
20150207682 | SERVER PROFILE TEMPLATES - Methods, systems, and computer-readable media with executable instructions stored thereon are provided for applying server profile templates. A method includes providing a user interface (UI) to define a template The template includes a template identifier, a common configuration, and a list of server profiles which share the common configuration. The method further includes using the UI to create a number of server profiles. The template is applied to server profiles such that changes to the common configuration are replicated across all associated server profiles, including associated server profiles with different physical connections. | 2015-07-23 |
20150207683 | NETWORK ENTITY REGISTRY FOR NETWORK ENTITY HANDLES INCLUDED IN NETWORK TRAFFIC POLICIES ENFORCED FOR A PROVIDER NETWORK - A provider network may implement network entity registry for network entity handles included in network traffic policies enforced for a provider network. Network entity entries may be maintained in a network entity registry that specify network address information for network entity handles included in network traffic control policies. Network traffic control policies may be enforced by a network traffic controller. When an update to an network entity entry is received, the network entity entry may be updated and network address information specified in the network entity entry may be provided to a subset of network traffic controls implemented in a provider network for those network traffic controls enforcing network traffic policies including the network entity handle for the updated network entity entry. Network entity entries may, in some embodiments, not be updated by a network entity entry owner. | 2015-07-23 |
20150207684 | TECHNIQUES FOR CLOUD CONTROL AND MANAGEMENT - Techniques for cloud control and management are provided. The control, creation, and management of workloads in distributed infrastructures are coordinated via a master Configuration Management Database (CMDB). The master CMDB is also used to unify the multiple distributed infrastructures so that the workloads are rationalized. Moreover, data centers are coordinated with the distributed infrastructures so the configuration settings and policies included in the master CMDB are enforced and synchronized throughout the network. | 2015-07-23 |
20150207685 | POLICY DECISION FUNCTION ADDRESSING METHOD, NETWORK ELEMENT AND NETWORK SYSTEM - A policy decision function (PDF) addressing method includes: receiving a PDF allocation request that contains a user equipment (UE) identifier (ID) from a second network element (NE); obtaining ID information of a PDF associated with the UE ID according to pre-registered addressing information of the PDF, where the addressing information of the PDF is an association between the UE ID and the ID information of the PDF, and the PDF associated with the UE ID is accessed by a first NE; and sending the obtained ID information of the PDF to the second NE. | 2015-07-23 |
20150207686 | Wireless end-user device with differentiated network access and access status for background and foreground device applications - A wireless end-user device has wireless wide-area network (WWAN) and wireless local-area network (WLAN) modems. One or more processors classify when an application is interacting in the device foreground with a user. For a time period when data for Internet service activities is communicated through the WWAN modem, the processors use a differential traffic control policy to selectively block and allow network access for an application based on whether the application is classified as interacting in the device foreground with a user. The processors provide a network access condition to the application through an application program interface (API), and thus can indicate that Internet data service is unavailable to that particular application based on the classification. A different policy may apply to WLAN modem usage and/or to different WWAN networks. | 2015-07-23 |
20150207687 | COMPUTER ECOSYSTEM PROVIDING DEVICE ANNOUNCEMENTS OF SESSION NEEDS AND RULE-BASED ESTABLISHMENT OF NETWORK SHARING BASED THEREON - A home network can be dynamically reconfigured when IP connected or wireless devices are requesting network access makes it easier for consumers to keep their current viewing, listening, or Internet sessions alive and functioning properly. Home network use can be managed by any device on the home network if desired, not just a central home router, through series of messages that are exchanged by each device updating its priority status. | 2015-07-23 |
20150207688 | NETWORK SYSTEM, OPERATING METHOD THEREOF, AND SWITCH - An operating method of a network system includes setting a plurality of first connection ports from among a plurality of connection ports of a first switch as belonging to a first loop group; receiving, through the first switch, a topology change notification; determining, through the first switch, whether the topology change notification is received via one of the first connection ports; and under a condition that the topology change notification is received via one of the first connection ports, outputting, through the first switch, the topology change notification via the other one/ones of the first connection ports, and not via the connection port/ports which do/does not belong to the first loop group. With such operation, broadcasting the topology change notification can be avoided, so as to increase the efficiency, bandwidth, and stability of the network system. | 2015-07-23 |
20150207689 | Connection Device, Program, and Connection Method - Provided is a technology for enabling smooth execution of a plurality of pieces of application software which perform communication via a communication path. A connection device includes: a storage unit which stores type priority level information for specifying a priority level assigned in advance for each type of a process, usable communication system information for specifying a usable communication system for each process, and sharing propriety information for specifying whether or not the communication system is sharable among a plurality of processes during the same period of time; a plurality of communication units which communicate to and from another device with use of the communication systems different from one another; and a communication system allocation control unit configured to: use the usable communication system information to identify the communication system usable by the process to be started to be executed; and allocate, when the identified communication system is not sharable and a process in execution that is different from the process already uses the identified communication system, the process to use the communication system based on the priority levels. | 2015-07-23 |
20150207690 | NAMING SYSTEM LAYER - A facility for publishing information in a distributed network without a central management infrastructure is described. In various embodiments, the facility receives an indication of a new node and a destination node, the new node omitted from a contact list associated with the destination node, the contact list having an approximately logarithmic distribution of neighboring nodes; introduces the new node to the destination node via a permanent circuit; and causes the destination node to add the new node to the contact list when adding the new node improves the logarithmic distribution of neighboring nodes. | 2015-07-23 |
20150207691 | PRELOADING CONTENT BASED ON NETWORK CONNECTION BEHAVIOR - Methods for preloading content based on user content browsing behavior and network connectivity behavior are provided. In one aspect, a method includes receiving an indication of predicted content to be requested by a user of a mobile device, and determining network connectivity behavior for a local area network connection of the mobile device. The method also includes identifying at least a subset of the predicted content to load to the mobile device based on the network connectivity behavior of the local area network connection of the mobile device, and loading the subset of the predicted content while the mobile device is connected to the local area network. Systems and machine-readable media are also provided. | 2015-07-23 |
20150207692 | SYSTEM AND METHOD FOR DEPICTING BACKLINK METRICS FOR A WEBSITE - A system and method for displaying metrics indicating the geographical source of backlinks to at least one of a website and a web page is presented. A plurality of backlinks are identified for a web page. Each of the plurality of backlinks includes a uniform resource locator (URL). For each backlink in the plurality of backlinks, the backlink is translated into an Internet protocol (IP) address, a geographical location associated with the IP address is identified, and the backlink is allocated to at least one of a plurality of geographical regions using the geographical location. A visual representation of at least one of the plurality of geographical regions and an indication of a number of backlinks allocated to the at least one of the plurality of geographical regions is displayed. | 2015-07-23 |
20150207693 | INHERITANCE BASED NETWORK MANAGEMENT - Systems and methods for normalization of physical interfaces having different physical attributes are provided. According to one embodiment, information regarding multiple network devices is presented to a network manager. The network devices have substantially identical function. Two physical interfaces of two network devices that are to be normalized are identified. The physical interfaces are normalized by creating a virtual interface (VI) to which both correspond. A policy applicable to the VI is received. Configuration files, in which policies or rules contained therein are expressed in terms of the VI, are created for the network devices while they are offline. Physical interface configurations for the physical interfaces are resolved during installation of the network devices by resolving references to the VI in the configuration files into the respective physical interfaces. | 2015-07-23 |
20150207694 | SELECTIVE LOCKING OF OPERATIONS ON JOINT AND DISJOINT SETS - A management controller in a distributed network switch may operate on sets of ports such that sets of ports containing a same port are processed serially, and sets that do not contain any of the same ports can be processed in parallel. When receiving a set of ports for processing, the management controller organizes the ports into lanes that each correspond to a unique port. If any of the lanes overlap, subsequent port sets are blocked from proceeding until the lanes of preceding port sets are cleared. If no lanes overlap, the sets may be deemed disjoint, and subsequent port sets may be processed in parallel. | 2015-07-23 |
20150207695 | ROLE-SPECIFIC SUB-NETWORKS IN A CONTENT DELIVERY FRAMEWORK - A method, operable in a content delivery network (CDN) having a plurality of content delivery (CD) services, includes making an association between a first property and at least one subnetwork of said content delivery framework; using said association to implement policies associated with said first property within the CDN, wherein the at least one subnetwork is responsible for at least one CD role for said first property; and modifying said association during operation of the CDN. | 2015-07-23 |
20150207696 | Predictive Anomaly Detection of Service Level Agreement in Multi-Subscriber IT Infrastructure - A predictive service level agreement (SLA) anomaly detection mechanism is provided for multi-subscriber IT infrastructure. Also, a method of filtering and prioritizing SLA anomaly alerts is provided. Furthermore, a method of constructing a skeleton network given historical and real-time monitoring data and a method of constructing a shadow baseline for each metric in a skeleton network are provided. | 2015-07-23 |
20150207697 | PROVISIONING PERSISTENT, DYNAMIC AND SECURE CLOUD SERVICES - Systems and methods may provide for confirming, by a loader module having administrative rights with respect to a computing device, the operability of an activator module on the computing device. Additionally, the activator module may be used to manage an installation status of one or more service agents or software components on the computing device and making them persistent. In one example, confirming the operability of the activator module includes conducting a presence verification and/or authentication of the activator module, wherein a replacement activator module may be downloaded to the computing device if the presence verification and/or authentication is unsuccessful. | 2015-07-23 |
20150207698 | Proxy server for providing an adaptive wireless ambient service to a mobile device - A proxy server is disclosed for providing a wireless ambient service to a mobile end-user device operating on a Wireless Wide Area Network (WWAN). An ambient service has a primary policy that allows a user to directly access primary ambient content, but not other content, through the service. A secondary policy allows the user to access, as ambient content, content outside of the primary policy. The secondary policy allows the access of the content outside of the primary policy based on an association with primary content. The ambient service proxy server implements the policies of the service. | 2015-07-23 |
20150207699 | Consumer Choice for Broadband Application and Content Services - Novel tools and techniques might provide for implementing application, service, and/or content access control. Based at least in part on a consumer's choice of applications, services, content, and/or content providers—particular in exchange for a subsidy on content and/or network access fees provided to the consumer by chosen content providers—, a computing system may determine whether access to applications, services, and/or content not associated with the chosen content providers (“other content”) should be allowed or restricted. If restricted, the computing system might utilize various network access techniques and/or technologies to block the consumer's access to the other content, to allow access to the other content on a charge per access basis, or to allow access to the other content at reduced network access speeds. In some embodiments, an access provider (e.g., an Internet service provider, etc.) might perform both determination and implementation of content access and restriction. | 2015-07-23 |
20150207700 | Evaluation of Radio Network Performance - A method and network node ( | 2015-07-23 |
20150207701 | DETERMINING DATA ASSOCIATED WITH PROXIMATE COMPUTING DEVICES - A computing system is described that determines a location of a first computing device at a particular time. Responsive to determining that a second computing device is located within a threshold distance of the location of the first computing device at the particular time, the computing system identifies, based on contextual information associated with a user of the first computing device and contextual information associated with a user of the second computing device, at least one data file that the user of the first computing device is likely to access at the particular time. The computing system then outputs, for transmission to the first computing device, an indication of the at least one data file. | 2015-07-23 |
20150207702 | MANAGING PROCESSING BRANCHES IN AN OPERATOR GRAPH - Embodiments of the disclosure provide a method and system for processing data such as a stream of tuples. One embodiment is directed toward a method for managing a stream of tuples. The method can include receiving the stream of tuples to be processed by a plurality of stream operators operating on one or more computer processors. The method can include routing the stream of tuples to a plurality of output ports, the output ports each communicate with a processing branch. The method can include receiving performance data of the stream of tuples from a measuring stream operator that measures the processing branch. The method can include determining weights to assign to each output port based on the performance data. The method can also include modifying the routing of the stream of tuples through the plurality of output ports as a function of the weight of each output port. | 2015-07-23 |
20150207703 | ABSTRACTION MODELS FOR MONITORING OF CLOUD RESOURCES | 2015-07-23 |
20150207704 | PUBLIC OPINION INFORMATION DISPLAY SYSTEM AND METHOD - The present invention discloses a system and a method for presenting network hotspot information and relates to the field of network information technologies. The system comprises: a web page capturing module configured to capture a web page containing network hotspot information on a current network; a web page analyzing module configured to analyze the web page to acquire body information of the web page; a region identification module configured to perform region identification on the body information to acquire a corresponding region which the body information belongs to and perform quantity statistics on the web pages belonging to the same region; and a presenting module configured to present a result of the quantity statistics in a manner of map coloring. The system and the method according to the present invention may objectively and intuitively reflect the network hotspot information in various regions through performing the region identification on the web page containing network hotspot information. | 2015-07-23 |
20150207705 | METHOD FOR FILE ACTIVITY MONITORING - A method is disclosed for forming a human intelligible log file. A server is provided in communication with a network. A first computer system is also provided in communication with the network. A first user authorizes themselves to the server from the first computer via the network. Data is accessed by a first application in execution on the first computer system, the data accessed within the first session. An entry is stored within a log file on the server as a single log entry therein and other than uniquely associated with the application an indication of the first user, the first file, and a file operation. | 2015-07-23 |
20150207706 | METHOD FOR SCALABLE DISTRIBUTED NETWORK TRAFFIC ANALYTICS IN TELCO - Exemplary methods for performing distributed data aggregation include receiving Internet Protocol (IP) traffic from only a first portion of the network. The methods further include utilizing a big data tool to generate a summary of the IP traffic from the first portion of the network, wherein a summary of IP traffic from a second portion of the network is generated by a second network device utilizing its local big data tool. The methods include sending the summary of the IP traffic of the first portion of the network to the third network device, causing the third network device to utilize its local big data tool to generate a summary of the IP traffic of the first and second portion of the network based on the summaries received from the first and second network devices, thereby allowing the IP traffic in the network to be characterized in a distributed manner. | 2015-07-23 |
20150207707 | NETWORK BANDWITH REGULATION USING TRAFFIC SCHEDULING - Disclosed herein are systems and methods for regulating network bandwidth by means of monitoring network traffic, predicting network loads, and scheduling traffic utilizing traffic reporting and bandwidth reservation mechanisms. These systems and methods may reduce network congestion and support more efficient processing by network applications. Traffic reporting may comprise broadcasting control messages to network nodes indicating appropriate times to send and receive messages. Network nodes may use traffic reports (e.g., control messages) to proactively regulate their use of the network. Bandwidth reservation may allow network nodes to do productive processing while waiting to send and receive data, and may decrease mean wait times. Reservations may be implemented in a synchronous or asynchronous manner. In an exemplary embodiment, the reservation mechanism may emulate a traditional stream socket API. Embodiments enabling enhanced TV applications to run more effectively over cable TV out-of-band networks are described. | 2015-07-23 |
20150207708 | Data Usage Monitoring for Media Data Services used by Applications - A wireless end-user device contains a wireless modem, a network stack configurable to receive and transmit network data via the wireless modem, a media service manager, and a service classification agent. The media service manager manages network data transfers for media objects as requested by multiple applications. Even though the media service manager manages the network data transfers, the service classification agent provides a capability to associate network data usage for the network data transfers with the applications that requested the service from the media service manager. | 2015-07-23 |
20150207709 | LOGGING INCIDENT MANAGER - Systems, methods, and other embodiments associated with intelligently processing log messages are described. In one embodiment, a computer-implemented method includes analyzing, by a logging appliance that includes at least hardware, communications received from a plurality of handlers to determine whether at least one of the communications indicates an error has been encountered by one of a plurality of components associated with the plurality of handlers. The method includes scheduling a subset of the plurality of handlers to provide reports that include a detailed set of log messages in response to detecting the error. The subset of the plurality of handlers includes handlers that are associated with the error. | 2015-07-23 |
20150207710 | Call Quality Estimation by Lost Packet Classification - Described are: a method, an apparatus, and a tangible computer-readable storage medium comprising instructions to instruct one or more processors to carry out a method. One set of methods is for the transmit side of a communication link and another set of methods is for the receive side. A transmit side method includes assigning one of a set of classifications to media, e.g., voice/audio packets transmitted in a sequence, different classifications impacting differently a measure of perceptual quality calculated at the receive side if packets of the respective classifications are lost. A present packet is sent to the receive side containing the classification of a previous packet. | 2015-07-23 |
20150207711 | METHOD FOR ISOLATED ANOMALY DETECTION IN LARGE-SCALE DATA PROCESSING SYSTEMS - Distributed detection of isolated anomalies, without resulting in overloading an anomaly management system in case of large-scale anomalies occurring and that does not rely on user intervention. Isolated anomalies are detected through insertion of devices rendering a service in different quality of service buckets, and if a device changes from one (or source) quality bucket to another (or destination) quality bucket, the device counts the number of devices in the destination quality bucket that have made the same move. | 2015-07-23 |
20150207712 | METHOD, APPARATUS, AND SYSTEM FOR MEASURING NETWORK DELAY - A method, an apparatus, and a system for measuring a network delay are disclosed. The method includes: acquiring delay measurement information obtained by measuring a service flow by at least one target logical port TLP, where the delay measurement information includes: timestamp information, a service flow identifier, and a TLP identifier; and transmitting the delay measurement information to a measurement control point MCP, so that the MCP determines details about a network delay according to the timestamp information, the service flow identifier, and the TLP identifier. Embodiments of the present application further provide an apparatus and a system for measuring a network delay. Embodiments of the present application achieve direct and accurate delay measurement of a service flow in scenarios of point to point transmission or point to multipoint transmission on the network, and reflect details about a real delay of the service flow. | 2015-07-23 |
20150207713 | MODIFYING NETWORK SITE BEHAVIOR USING SESSION-LEVEL PERFORMANCE METRICS - Disclosed are various embodiments for modifying network site behavior. At least one session-level performance metric associated with a client is determined. The one or more session-level performance metrics are determined from one or more latency times. Each one of the latency times represents a time elapsed between a sending of a network page request in the client and a rendering in the client of a network page received from a network page server in response to the network page request. A response to a next network page request from the client is modified according to the one or more session-level performance metrics in order to adjust a next latency time for the client. | 2015-07-23 |
20150207714 | USE OF COMMON PUBLIC RADIO INTERFACE OVER ASYMMETRIC NETWORKS - Communication between a Radio Equipment Control (REC) and a Radio Equipment (RE) in a wireless network uses a Common Public Radio Interface connection. When the Radio Equipment Control and the Radio Equipment are located remote from each other, and are connected by an asymmetric transport network, such as an Optical Transport Network, path delay data is transmitted in the Common Public Radio Interface data frames. This allows the CPRI end nodes to correct for path delay asymmetry using the path delay data. | 2015-07-23 |
20150207715 | RECEIVING APPARATUS, TRANSMITTING APPARATUS, COMMUNICATION SYSTEM, CONTROL METHOD FOR RECEIVING APPARATUS, CONTROL METHOD FOR TRANSMITTING APPARATUS, AND RECORDING MEDIUM - A receiving apparatus includes a receiving unit configured to receive encoded data in packets from a transmitting apparatus through a plurality of transmission paths including a first transmission path and a second transmission path, and a notifying unit configured to notify the transmitting apparatus of information describing a time period from reception of a first packet containing data in units of decoding through the first transmission path to reception of a second packet containing data in the units of decoding through the second transmission path. | 2015-07-23 |
20150207716 | Monitoring Device, Distributed System Including the Monitoring Device and Method of Monitoring A Distributed System - A monitoring device for a distributed system includes a signal receiver for receiving a service signal for a service provided by a service provider to a receiving location, and an operating condition indicator which indicates to the service provider an operating condition of the service at the receiving location based on the received service signal. | 2015-07-23 |
20150207717 | System and Method for a Software Defined Protocol Network Node - A software designed protocol (SDP) network node includes a receiver, and a processor operatively coupled to the receiver. The receiver receives instructions, and receives packets. The processor updates a configuration of the SDP network node in accordance with the received instructions, and processes the received packets. | 2015-07-23 |
20150207718 | OVERLOAD PROTECTION OF A TRANSFORMER LOADED LINE DRIVER - A method of identifying and correcting each of the changes that may occur with wire pairs between the transmitter and receiver in Ethernet 10GBase-T cabling is provided. The method includes four wire pairs A, B, C and D, a polarity swapping and scrambler state machine that determine if the chosen pair matches the requirements for pair A. A slave Tap state machine generates a rule for correct B, C and D patterns based on a pair chosen as pair A. The cables B, C and D are iteratively swapped to rearrange the pair mapping into the polarity swap state machine, and a deskew state machine identifies the latency difference between the different pairs. If the rules are not satisfied, a new pair A is designated at the swapping state machine and the process is repeated until the rules are satisfied. | 2015-07-23 |
20150207719 | METHOD AND SYSTEM FOR PORT PERFORMANCE RANKING IN MULTI-PROTOCOL SWITCH - A system and method for port performance ranking in a multi-protocol switch includes monitoring one or more first parameters, the one or more first parameters associated with operating condition of one or more ports of the multi-protocol switch. Each of the one or more first parameters is compared with an associated predefined criterion to determine deviation from the associated predefined criterion. One or more eligible ports is determined from the one or more ports based on non-deviation of each of the one or more first parameters from the associated predefined criterion. For each of the one or more eligible ports, each of one or more second parameters is compared with an associated predefined threshold, the one or more second parameters associated with port traffic statistics. The one or more eligible ports are ranked based on the comparison between each of the second parameters and the associated predefined threshold. | 2015-07-23 |
20150207720 | METHOD AND SYSTEM FOR USING A DOWNLOADABLE AGENT FOR A COMMUNICATION SYSTEM, DEVICE, OR LINK - Described is a method performed by a downloadable agent, the method comprising: collecting WAN performance information, wherein the downloadable agent is executable on a computing device coupled to a LAN of a broadband subscriber, wherein the LAN is coupled by another device to a WAN; and transmitting the WAN performance information to a machine; wherein the machine is operable to: store and analyze the performance information to generate an analysis result; and report the analysis result to at least one of the broadband subscriber and its service provider. Described is a corresponding system which comprises a database; and a server coupled to the database, the server operable to: receive WAN performance information from a downloadable agent; store the information in the database, analyze the information to generate an analysis result; and report the analysis result to at least one of the broadband subscriber and the broadband subscriber's service provider. | 2015-07-23 |
20150207721 | METHOD AND SYSTEM FOR GENERATING MULTI-PROTOCOL FAULT MANAGEMENT PACKET BY USING FPGA - Disclosed is a method for generating a multi-protocol fault management (FM) packet by using a field-programmable gate array, including: setting information related to FM in a plurality of local maintenance entity group end points (LMEPs); performing a polling process of the plurality of LMEPs according to the packet types after obtaining send instructions related to a certain packet type; determining a protocol type of the plurality of LMEPs; obtaining information related to the protocol type; acquiring information related to the packet type under the protocol type; generating a corresponding number of FM packets in accordance with the information related to the protocol type and the at least one set of field information related to the packet types; and outputting the FM packets. The method enables transmission of CCM, LCK and AIS packets under ETH, ITU and IETF packets to be achieved. Therefore, compatibility and competitiveness of products are improved. | 2015-07-23 |
20150207722 | SMART DUMPING OF NETWORK SWITCH FORWARDING DATABASE - Techniques are provided for retrieving entries from a routing table or a forwarding database in a distributed network switch. The forwarding database includes match and mask registers used to compare routing entries and return matching routing entries to a requesting management controller. The forwarding database uses a separate timeout value associated with the forwarding database to avoid timeout errors for general register operations, and allows for an asynchronous dump operation of routing entries. | 2015-07-23 |
20150207723 | SMART DUMPING OF NETWORK SWITCH FORWARDING DATABASE - Techniques are provided for retrieving entries from a routing table or a forwarding database in a distributed network switch. The forwarding database includes match and mask registers used to compare routing entries and return matching routing entries to a requesting management controller. The forwarding database uses a separate timeout value associated with the forwarding database to avoid timeout errors for general register operations, and allows for an asynchronous dump operation of routing entries. | 2015-07-23 |
20150207724 | DYNAMIC CONTROL CHANNEL ESTABLISHMENT FOR SOFTWARE-DEFINED NETWORKS HAVING CENTRALIZED CONTROL - Dynamic control channel establishment for an access network is described in which a centralized controller provides seamless end-to-end service from a core-facing edge of a network to access nodes. For example, a method includes receiving, by the centralized controller, a discover message originating from a network node, which includes an intermediate node list that specifies a plurality of network nodes the discover message traversed from the network node to an edge node, determining, based on the plurality of nodes specified by the discover message, a path from the edge node to the network node, allocating each of a plurality of Multi-protocol Label Switching (MPLS) labels to a respective outgoing interface of each of the plurality of network nodes, and outputting one or more control messages for configuring the network node, wherein the control messages are encapsulated within a label stack comprising the allocated plurality of labels. | 2015-07-23 |
20150207725 | SIMULTANEOUS ACKNOWLEDGMENTS FOR MULTICAST PACKETS - In one embodiment, a multicast communication is received at a particular node of a plurality of nodes receiving the multicast communication in a network. The particular node selects a subset of subcarriers using a probabilistic data structure, such that each of the plurality of nodes selects a respective subset of subcarriers using the probabilistic data structure. The particular node transmits an acknowledgement of receipt of the multicast communication on the subset of subcarriers selected by the particular node. The transmission occurs simultaneously with transmissions of acknowledgements from the other of the plurality of nodes. | 2015-07-23 |
20150207726 | NETWORK ELEMENT FOR A DATA TRANSFER NETWORK - A network element ( | 2015-07-23 |
20150207727 | PREDICTING ROUTE UTILIZATION AND NON-REDUNDANT FAILURES IN NETWORK ENVIRONMENTS - A network analysis module may obtain information including but not limited to network traffic and topology information for a network environment including multiple separate networks and physical connections between the networks. The module generates a network topology model including but not limited to extreme-case failure or break information according to the network topology information, and applies the historical network traffic information to the network topology model to predict future expected normal traffic load and extreme-case traffic load for each route over the physical connections between the networks. Output may include one or more reports for each route, each report indicating the historical and predicted traffic levels for both normal and extreme-case scenarios of a respective route. | 2015-07-23 |
20150207728 | VERIFYING DATA PLANE PATHS BASED ON A VALIDATED SECURE CONTROL PLANE - In one embodiment, a plurality of packets is sent from an origin device along a communication path toward a destination device. Each packet includes a lifespan indicator which is incrementally increased for each subsequently sent packet. A plurality of response messages are received at the origin device from a plurality of intermediate devices, respectively. A plurality of secure path objects included in the plurality of response messages, respectively, is determined. Additionally, the plurality of secure path objects are validated based on validation information accessible by the origin device. Validation results of the plurality of secure path objects are checked to determine whether a packet that is sent from the origin device and received by the destination device travels along a particular communication path as dictated by control plane information. | 2015-07-23 |
20150207729 | TYING DATA PLANE PATHS TO A SECURE CONTROL PLANE - In one embodiment, a router located at an exit edge of an autonomous system (AS) receives a data packet in a data plane, and determines a destination of the data packet and an associated AS-path information to the destination. The router may then insert the AS-path information into the data packet, and forwards the data packet with the AS-path information toward the destination, such that a receiving device in a destination AS can validate whether the data packet was routed through a path that was secure from a control plane perspective based on a collection of one or more insertions of AS-path information. | 2015-07-23 |
20150207730 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSOR, INFORMATION PROCESSING METHOD, PROGRAM, AND INFORMATION STORAGE MEDIUM - It is made possible for a user to set whether to download data used by a program without waiting for the acceptance of a download permission or download the data in response to the acceptance of the download permission via a screen that allows for making the setting for a plurality of programs. An input/output control section ( | 2015-07-23 |
20150207731 | SYSTEM AND METHOD OF FORWARDING IPMI MESSAGE PACKETS BASED ON LOGICAL UNIT NUMBER (LUN) - Certain aspects direct to a system having at most four service processors (SP's). Each of the at most four SP's is assigned with a logical unit number (LUN) of 0 to 3. When the SP receives a message packet, the SP identifies the message packet based on the header of the message packet. The header uses a LUN field to identify a corresponding SP as a destination of the message packet. For the LUN 0 SP, when the message packet is identified as a request message packet for the LUN 0 SP, the SP processes the request message packet to generate a corresponding response message packet. When the message packet is identified as a request message packet for other SP's (LUN 1-3), the SP saves a copy of the header of the request message packet for later response use, and forwards the request message packet to the destination. | 2015-07-23 |
20150207732 | BROADBAND ACCESS FOR VIRTUAL PRIVATE NETWORKS - Communications between a source and a destination include receiving, at an egress edge device from an ingress edge device, an upper layer packet including a virtual private network identification identifying a destination. The upper layer packet is authenticated at the egress edge device using the virtual private network identification by comparing the virtual private network identification against an expectation for the upper layer packet. Upon authentication, the upper layer packet is decapsulated into a lower layer packet for the destination. | 2015-07-23 |
20150207733 | UPDATING ROUTING INFORMATION BASED ON CLIENT LOCATION - A system, method, and computer-readable medium for updating request routing information associated with client location information are provided. A content delivery network service provider receives a DNS query from a client computing device. The DNS query corresponds to a resource identifier for requested content from the client computing device. The content delivery network service provider obtains a query IP address corresponding to the client computing device. Based on routing information associated with the query IP address, the content delivery network service provider routes the DNS query. The process further includes monitoring performance data associated with the transmission of the requested resource and updating routing information associated with the query IP address based on the performance data for use in processing subsequent requests form the client computing device. | 2015-07-23 |
20150207734 | METHOD FOR SENDING AN ACKNOWLEDGEMENT TO AN INGRESS MESH POINT IN A MESH NETWORK AND A MEDIUM ACCESS CONTROL FRAME FORMAT - The present invention relates to a method for confirming the delivery of a data packet in a mesh network by sending an acknowledgement (ACK) to an ingress mesh point (IMP). A mesh network comprises a plurality of mesh points that are wirelessly linked together. A data packet sent by a station (STA) is received by an IMP. A MAC frame is generated for transmission of the data packet and the frame is forwarded to an egress mesh point (EMP) in order to provide a service by the mesh network. The MAC frame includes a field comprising an IMP address and an EMP address. When the EMP, (or optionally an intermediate mesh point), receives a data packet successfully, the EMP or the intermediate mesh point sends an ACK to the IMP or preceding mesh point. | 2015-07-23 |
20150207735 | PACKET ROUTING APPARATUS, INTERFACE CIRCUIT AND PACKET ROUTING METHOD - A packet routing apparatus includes a plurality of interface units each includes, a first memory in which a plurality of routing information used in a routing of a packet are stored, a second memory in which the plurality of routing information are stored, the number of the routing information stored in the second memory being smaller than the number of the routing information stored in the first memory, and a retrieval unit configured to detect a packet length of the packet received at any of the plurality of ports, perform the routing based on the plurality of routing information stored in the second memory when the detected packet length is less than a predetermined value, and perform the routing based on the plurality of routing information stored in the first memory when the detected packet length is greater than or equal to the predetermined value. | 2015-07-23 |
20150207736 | Multi-Domain Source Routed Forwarding Based on Collaborating Network Controllers - Efficient and scalable source routed forwarding can be achieved in multi-domain networks by substituting path identifiers for intra-domain hop lists in source route hop lists. The path identifiers are then replaced with the corresponding intra-domain hop lists at the ingress edge nodes of each corresponding domain. The path identifiers do not specify individual hops along an intra-domain path segment, and are therefore typically shorter than the intra-domain hop lists. To facilitate multi-domain source routed forwarding techniques, routing tables in edge nodes of the corresponding domains are updated to associate the path identifiers with the corresponding intra-domain hop lists during (or immediately following) inter-domain path computation. | 2015-07-23 |
20150207737 | MAINTAINING ROUTING INFORMATION IN MEMORY CONSTRAINED ROUTERS - A router in an embodiment associates a corresponding digital code of a set of digital codes to a respective portion of a network address of set of network addresses used in routing information. The routing information is stored in a memory with each digital code substituted for the respective portion of the network address. Memory reduction is obtained as a result. In an embodiment implemented in the context of IPv6 having a prefix and a host identifier for each network address, the portion of a network address corresponds to the prefix. The routing information is stored in the form of a prefix table and topology information. The prefix table stores a mapping of each digital code to a corresponding prefix. The topology information indicates a manner in which each host system and router are connected to each other. Packets are forwarded by examining such routing information. | 2015-07-23 |
20150207738 | SCALING EGRESS NETWORK TRAFFIC - In an embodiment, a method is provided. The method of this embodiment provides generating one or more packets of data, the one or more packets of data being associated with a connection; and associating the one or more packets with one of a plurality of transmit queues based, at least in part, on the connection associated with the one or more packets. | 2015-07-23 |
20150207739 | OVERSUBSCRIPITION MONITOR - Aspects of oversubscription monitoring are described. In one embodiment, oversubscription monitoring includes accumulating an amount of data that arrives at a network component over at least one epoch of time. Further, a core processing rate at which data can be processed by the network component is calculated. Based on the amount of data and the core processing rate, it is determined whether the network component is operating in an oversubscribed region of operation. In one embodiment, when the network component is operating in the oversubscribed region of operation, certain quality of service metrics are monitored. Using the monitored metrics, a network operation display object may be generated for identifying or troubleshooting network errors during an oversubscribed region of operation of the network component. | 2015-07-23 |
20150207740 | METHODS AND DEVICE FOR PROCESSING DIGITAL DATA FRAMES AND TRANSPORT FRAMES FOR REDUCTION OF TRANSPORT BANDWIDTH - A device (D | 2015-07-23 |
20150207741 | APPARATUS FOR HYBRID ROUTING IN SDN NETWORKS TO AVOID CONGESTION AND ACHIEVE GOOD LOAD BALANCING UNDER FLUCTUATING TRAFFIC LOAD - A controller having an application optimally routing traffic to balance fluctuating traffic loads in a SDN network. A processor is configured to control the data plane to establish routing through the plurality of routers, wherein the processor is configured to establish hybrid routing comprising both explicit routing and destination-based routing. The processor utilizes a set of traffic matrices representing the fluctuating traffic load over time. A destination-based multi-path routing algorithm is configured to improve load balancing of the traffic load based on the set of representative traffic matrices. The destination based routing is calculated based on linear programming. The processor comprises a traffic categorization algorithm configured to identify a set of key flows, wherein the processor is configured to explicitly route the set of key flows. The processor is configured such that the set of key flows consume a small fraction of a ternary content-addressable memory (TCAM), and such that the set of key flows provide a routing decision for a large portion of the traffic load. | 2015-07-23 |
20150207742 | METHODS FOR OPTIMIZING DATA FOR TRANSMISSION AND DEVICES THEREOF - A method, non-transitory computer readable medium and data optimizing computing device for optimizing data for transmission obtaining data set for transmission. One or more configuration rules associated with the obtained data set are obtained. The obtained data set is optimized based on the obtained one or more configuration rules for transmission. A client code and a server code associated with the optimized data set are generated. At least one of the generated client code is transmitted to a client computing device or the server code is transmitted to a server computing device. | 2015-07-23 |
20150207743 | Congestion Control Method For Dynamically Maximizing Communication Link Throughout - A congestion control system and method for dynamically maximizing a communication link throughput is presented. The method involves monitoring and managing a variable number of streams from one or more URLs and their respective download fragment size in order to maximize the changing link capacity. The number of participating streams is adjusted according to total link congestion status. | 2015-07-23 |
20150207744 | SYSTEM AND METHOD FOR MULTI-PAIR CONFIGURATION OVER EXISTING CABLING INFRASTRUCTURE - A system and method for multi-pair configuration over existing cabling infrastructure. In one embodiment, a network device is configured through a selective activation of one or more physical layer devices that are coupled to a respective one or more of the conductor pairs that are identified in a diagnostic process. Aggregation can be performed on the data streams carried over the activated conductor pairs. | 2015-07-23 |
20150207745 | ON-BOARD WIRELESS DEVICE AND COMMUNICATION SYSTEM - An on-board wireless device used in a subject vehicle and transmitting a vehicle information of the subject vehicle to a periphery vehicle positioned around the subject vehicle, includes a transmitting circuit successively transmitting the vehicle information of the subject vehicle via a vehicle-to-vehicle communication at a transmission interval, a transmission interval setting section setting the transmission interval that is variable for transmitting the vehicle information, and a generation section generating the vehicle information to be transmitted by the transmitting circuit. The generation section includes, in the vehicle information, a transmission interval related information based on which the transmission interval set by the transmission interval setting section is specified. The transmitting circuit transmits the vehicle information that includes the transmission interval related information to the periphery vehicle. | 2015-07-23 |
20150207746 | PERFORMING PATH-ORIENTED SYSTEMS MANAGEMENT - A method is disclosed for transmitting system management requests to computer systems along a network path using a network control protocol, such as RSVP. For example, an originating node may send a single system management request along a path to a destination node using a network control protocol. Each computer system along the network path may analyze the network control protocol message to determine whether the message contains a system management request. If a system management request is found in the message, the computer system may perform the system management function identified in the request, and respond to it. | 2015-07-23 |
20150207747 | QUEUE SCHEDULING METHOD AND APPARATUS - A queue scheduling method and apparatus is disclosed in the embodiments of the present invention, the method comprises: one or more queues are indexed by using a first circulation link list; one or more queues are accessed respectively by using the front pointer of the first circulation link list, and the value acquired from subtracting a value of a unit to be scheduled at the head of the queue from a weight middle value of each queue is treated as the residual weight middle value of the queue; when the weight middle value of one queue in the first circulation link list is less than the unit to be scheduled at the head of the queue, the queue is deleted from the first circulation link list and the weight middle value is updated with the sum of a set weight value and the residual weight middle value of the queue; the queue deleted from the first circulation link list is linked with a second circulation link list. The present invention enables the scheduling to support any number of queues, and supports the expansion of the number of queues under the circumstances that the hardware implementation logic core is not changed. | 2015-07-23 |
20150207748 | SYSTEMS AND METHODS FOR PRIORITIZING AND SCHEDULING PACKETS IN A COMMUNICATION NETWORK - Systems and methods provide a parameterized scheduling system that incorporates end-user application awareness and can be used with scheduling groups that contain data streams from heterogeneous applications. Individual data queues within a scheduling group can be created based on application class, specific application, individual data streams or some combination thereof. Application information and Application Factors (AF) are used to modify scheduler parameters such as weights and credits to differentiate between data streams assigned to a scheduling group. Dynamic AF settings may adjust relative importance of user applications to maximize user Quality of Experience (QoE) in response to recurring network patterns, one-time events, application characteristics, protocol characteristics, device characteristics, service level agreements, or combinations thereof. Scheduling parameters may be dynamic and incorporate the notions of “duration neglect” and “recency effect” in an end-user's perception of video quality in order to optimally manage video traffic during periods of congestion. | 2015-07-23 |
20150207749 | STREAMING OPERATOR WITH TRIGGER - One or more operators in a flow graph of a streaming application may include one or more triggers that indicate when action needs to be taken for the operator. A streams manager monitors performance of a streaming application and receives a notification when a trigger in an operator fires. In response to a trigger firing, the streams manager determines an appropriate action corresponding to the trigger. When the trigger indicates an adjustment of cloud resources are needed, the streams manager formulates a cloud resource request to a cloud manager. In response, the cloud manager adjusts the cloud resources for the operator to improve performance of the streaming application. A trigger may specify a trigger action for an operator, and may additionally specify a trigger action for one or more other affected operators. The firing of a trigger in one operator can therefore result in adjusting resources to multiple operators. | 2015-07-23 |
20150207750 | MANAGEMENT OF UNRETURNED SYSTEM POOL RESOURCES - Techniques are provided for providing computing resources from a pool a plurality of networked computing systems to a consumer. The method includes determining that the consumer's resource usage exceeds a predetermined threshold. After a predetermined period of time, and upon determining that the consumer's resource usage continues to exceed the predetermined threshold, the method identifies one or more computing systems from the pool having capacity to host at least part of the amount of excess resource usage. The method further includes allocating resources on one or more computing systems selected from the identified computing systems to satisfy the amount of excess resource usage, and transferring at least the amount of excess resource usage to the selected one or more computing systems. | 2015-07-23 |
20150207751 | MANAGING PROCESSING BRANCHES IN AN OPERATOR GRAPH - Embodiments of the disclosure provide a method and system for processing data such as a stream of tuples. One embodiment is directed toward a method for managing a stream of tuples. The method can include receiving the stream of tuples to be processed by a plurality of stream operators operating on one or more computer processors. The method can include routing the stream of tuples to a plurality of output ports, the output ports each communicate with a processing branch. The method can include receiving performance data of the stream of tuples from a measuring stream operator that measures the processing branch. The method can include determining weights to assign to each output port based on the performance data. The method can also include modifying the routing of the stream of tuples through the plurality of output ports as a function of the weight of each output port. | 2015-07-23 |
20150207752 | MANAGEMENT OF UNRETURNED SYSTEM POOL RESOURCES - Techniques are provided for providing computing resources from a pool a plurality of networked computing systems to a consumer. The method includes determining that the consumer's resource usage exceeds a predetermined threshold. After a predetermined period of time, and upon determining that the consumer's resource usage continues to exceed the predetermined threshold, the method identifies one or more computing systems from the pool having capacity to host at least part of the amount of excess resource usage. The method further includes allocating resources on one or more computing systems selected from the identified computing systems to satisfy the amount of excess resource usage, and transferring at least the amount of excess resource usage to the selected one or more computing systems. | 2015-07-23 |
20150207753 | METHOD, APPARATUS, AND SYSTEM FOR ASSIGNING TRIBUTARY PORT NUMBER - Embodiments of the present invention relate a method, an apparatus, and a system for assigning a tributary port number. The method includes: receiving a service path request message including a service type for establishing a service path used to bear a Lower Order ODU service; determining an OTU link; determining a free tributary slot resource in the OTU link; if a MSI bytes in the OTU link indicates a service type, assigning a tributary port number other than tributary port numbers used by Lower Order ODU services having the same type as the Lower Order ODU service in the OTU link; or if the MSI bytes in the OTU link does not indicate a service type, assigning a tributary port number other than tributary port numbers used by all types of Lower Order ODU services in the OTU link; and sending a service path acknowledgment message to the neighboring node. | 2015-07-23 |
20150207754 | LOAD BALANCING FOR MESH COMPUTING - Techniques for load balancing in a network of nodes can include a first node receiving and/or generating a request having an identifier, task description, and information regarding an entity originating the request. The first node can either perform the task and report back to the originating entity of the completion of the task, or forward the request to a random one of a plurality of other nodes with which the first node is communicatively connected. | 2015-07-23 |
20150207755 | DYNAMIC PLANNING METHOD FOR SERVER RESOURCES OF DATA CENTER - A dynamic planning method for server resources of a data center is provided. The data center includes multiple pods and each pod includes multiple racks configurable with multiple servers. In the method, a rack having a remaining space larger than or equal to d is searched from the pods and used for configuring d servers. If the rack cannot be configured with the d servers, a single pod reallocation is executed on one of the pods to empty a rack so that the remaining space of the rack is larger than or equal to d and configurable with the d servers. If there is no rack that can be emptied, a cross-pod reallocation is executed to empty corresponding server positions of corresponding racks in the pods so that the remaining space of the corresponding server positions is larger than or equal to d and configurable with the d servers. | 2015-07-23 |
20150207756 | ELECTRONIC INFORMATION CACHING - Electronic information is made more readily available to one or more access requestors based on an anticipated demand for the electronic information using a process, system or computer software. For instance, electronic information stored on a first storage medium is identified for transport (e.g., in response to a request of at least one of the access requestors), and the electronic information is transported accordingly. Afterwards, a determination is made to store the electronic information on a second storage medium that is more accessible to the access requestors than the first storage medium. The determination is based on an anticipated demand of the access requestors for the electronic information. The anticipated demand is determined based at least on information that is not particular to any single access requestor. The electronic information then is stored on the second storage medium and the access requestors are provided access to the electronic information from the second storage medium. | 2015-07-23 |
20150207757 | SHARED RESOURCE ALLOCATION CONTROL - A compilation of potentially shared resources is received. The potentially shared resources are analyzed to determine compatibility among the shared resources. A user accessible list of acceptable combinations of potentially shared resources is generated. | 2015-07-23 |