40th week of 2017 patent applcation highlights part 84 |
Patent application number | Title | Published |
20170288931 | Method and Receiver in a Wireless Communication System - A receiver and method applied to the receiver, for estimating a normalized frequency offset value ε between a transmitter and the receiver in a wireless communication system, based on Orthogonal Frequency Division Multiplexing (OFDM), where the method includes receiving a first pilot signal (y | 2017-10-05 |
20170288932 | CARRIER FREQUENCY OFFSET ESTIMATION IN A RECEIVER - Systems and methods are directed to low cost and low power carrier frequency offset (CFO) estimation in a receiver. In-phase (I) and quadrature (Q) samples of a wireless signal are received by the receiver and a first phase and a second phase are extracted from the outputs of a first autocorrelator with a first time-lag and a second autocorrelator with a second time-lag. The extracted first and second phases are combined to generate an estimated CFO of high accuracy and wide estimation range. | 2017-10-05 |
20170288933 | WIRELESS SIGNAL RECEIVER - A satisfactory list detection (LD) receiver based on spatial modulation (SM) orthogonal frequency division multiplexing (OFDM) waveform is provided. In some embodiments, the LD receiver can implement a suboptimal LD detection process that relies on a reduced search space an optimal joint ML detection-based process for the SM-OFDM transmission mode. In some aspects, the overall search space for the optimal joint ML is determined by the total spectral efficiency, which can be divided into two information categories with two different search spaces defined by the number of bits of each category. As such, in some aspects, the LD receiver can permit detecting, with reduced complexity, antenna bits and data bits based on a determination of respective log-likelihood ratios. | 2017-10-05 |
20170288934 | METHOD FOR SIGNALING INFORMATION BY MODIFYING MODULATION CONSTELLATIONS - Methods and systems for communicating in a wireless network may distinguish different types of packet structures by modifying the phase of a modulation constellation, such as a binary phase shift keying (BPSK) constellation, in a signal field. Receiving devices may identify the type of packet structure associated with a transmission or whether the signal field is present by the phase of the modulation constellation used for mapping for the signal field. In one embodiment, the phase of the modulation constellation may be determined by examining the energy of the I and Q components after Fast Fourier Transform. Various specific embodiments and variations are also disclosed. | 2017-10-05 |
20170288935 | Method and Apparatus for Quadrature Signal Modulation - Methods and apparatus for facilitating wireless communication using digital Quadrature Amplitude Modulation are disclosed. A mapping module electronic component of a wireless communication device utilizes a signal constellation for quadrature modulating a signal for transmission or quadrature demodulating a received signal. The signal constellation includes multiple constellation symbols and associated bit sequences. Specific signal constellations are disclosed. The signal constellations may be obtained through an optimization procedure which accounts for both phase noise and power amplifier nonlinearity. | 2017-10-05 |
20170288936 | MESSAGE TRANSMISSION AND RECEPTION TECHNIQUE USING CHANNEL COMBINING AND SPLITTING - The present disclosure relates to a 5G or pre-5G communication system for supporting a higher data transmission rate than a 4G communication system such as LTE. The present disclosure provides a method for transmitting messages using a channel combining/splitting transmission scheme. The method comprises the steps of: splitting the messages into a first part to be transmitted to a first channel, which is a degradation channel, and a second part to be transmitted to a second channel, which is an enhancement channel, generating first modulation signals by performing a channel encoding and frequency quadrature amplitude modulation (FQAM) on the first part and generating second modulation signals by performing a channel encoding and quadrature amplitude modulation (QAM) on the second part, generating first transmission signals by combining the first modulation signals with a part of or all the second modulation signals and generating second transmission signals using the second modulation signals, and transmitting the generated first transmission signals and second transmission signals through the first channel and the second channel, respectively. | 2017-10-05 |
20170288937 | Authorization Processing Method, Device, and System - An authorization processing method, a device, and a system, where the method includes receiving an authorization request from a public client, where the authorization request includes a client identifier of the public client, a requested redirect uniform resource identifier (URI), and a requested authorization scope, obtaining authorization information of the public client according to the client identifier, obtaining an authorization scope corresponding to an authorization credential stored in the authorization information, obtaining authorization notification information of an owner of a resource according to the requested authorization scope when the requested authorization scope exceeds the authorization scope corresponding to the authorization credential, generating a first access token whose authorization scope corresponds to the requested authorization scope, and sending the first access token to the public client according to the requested redirect URI. Hence, the method effectively resolves a security threat problem in a process of authorizing the public client. | 2017-10-05 |
20170288938 | Secure Gateway - Gateway device ( | 2017-10-05 |
20170288939 | ABSTRACTION LAYER FOR STREAMING DATA SOURCES - Methods and systems for implementing an abstraction layer for streaming data sources are disclosed. A request to perform an operation based on one or more keys is received using a key-value interface. A streaming data source is selected based on the request. The operation is performed using the streaming data source, wherein the operation comprises storing or retrieving one or more values based on the one or more keys. | 2017-10-05 |
20170288940 | DATA GOVERNANCE: CHANGE MANAGEMENT BASED ON CONTEXTUALIZED DEPENDENCIES - A method for change management includes providing a dependency graph as an instantiation of a linked resource model in which a plurality of resources are linked by at least one dependency. The resources include at least one source resource and at least one target resource, each of the at least one dependency specifying preconditions on at least one of the at least one source resources for the dependency to be activated and an impact on at least one of the at least one target resources when the dependency is activated. A change to one of the plurality of resources is propagated to at least one other of the plurality of resources in the graph and information based on the propagation is output. | 2017-10-05 |
20170288941 | METHOD AND SYSTEM FOR MANAGING SERVERS ACROSS PLURALITY OF DATA CENTRES OF AN ENTERPRISE - The present disclosure relates to a method and system for managing the servers across a plurality of data centres of an enterprise. The servers of the plurality of data centres are managed by a server management system. The server management system obtains the server related data and network related data of a plurality of data centres and correlates the obtained server related data with the network related data to determine communication data. The communication data is used for generating a communication matrix which represents a relationship between the servers. Based on the communication matrix, the server management system creates one or more views of the servers to manage the servers of the plurality of data centres. | 2017-10-05 |
20170288942 | Portal for Provisioning Autonomous Software Agents - A computer system comprising one or more computer devices, the computer system providing a provisioning service of autonomous software agents (ASAs), the computer device comprising: a user interface generating component operable to provide a portal to a human user via a display, the portal having entry fields for receiving agent data from the human user; a storage interface component operable to access computer storage that stores autonomous software agents; and an access component operable to hold an association between the agent data and a network address of an agent, the network address defining a location of the computer storage in a computer network at which the agent is stored, whereby when an entity selects an agent based on the agent data, the access component enables automated access to the agent based on the network address. | 2017-10-05 |
20170288943 | Supplying Context Data to a Servicing Entity - A computer program product for providing context data to a servicing entity from a communication event conducted by a user terminal over a communications network the computer program product comprising an autonomous software agent stored on a computer readable storage medium, the autonomous software agent being configured when run to perform operations of receiving in a message conveyed in a communication event established between the software agent and the user terminal, a user intent and user context data; selecting a servicing entity located at a node of the communication network to perform an action corresponding to the intent; generating a message containing the context data; and transmitting the message containing the context data to the servicing entity. | 2017-10-05 |
20170288944 | ACTION ANALYTICS AND NOTIFICATION - Embodiments include method, systems and computer program products for action analytics and notification. Aspects include receiving, by a processor, data comprising user data, rules data, and external data; analyzing, by the processor, the data to generate an alert notification; and mapping the alert notification to at least one of a plurality of user devices based upon a device type of the at least one of the plurality of user devices. | 2017-10-05 |
20170288945 | METHODS AND SYSTEMS TO IMPROVE CORRELATION BETWEEN OVERLAY AND UNDERLAY NETWORKS IN DATA CENTERS - This disclosure relates generally to data centers and more particularly to methods and systems for improving correlation between overlay networks and underlay networks in data centers. In one embodiment, the method includes obtaining control information from a first network and control information of a second network of the plurality of networks, and correlating the control information of the first network and the second network to generate a relationship matrix. The method further includes determining one or more issues in the first network and the second network in response to generating of the relationship matrix, and performing one or more corrective actions to resolve the one or more issues in one or more of the first network and the second network. | 2017-10-05 |
20170288946 | PERFORMING A PROTOCOL, SUCH AS MICRO BIDIRECTIONAL FORWARDING DETECTION, ON MEMBER LINKS OF AN AGGREGATED LINK THAT USES AN ADDRESS OF THE AGGREGATED LINK - The problem of being unable to run microBFD using an IPv6 address over any member links of a layer | 2017-10-05 |
20170288947 | RESTORING A FLOW PATH IN RESPONSE TO A LINK FAILURE IN A SOFTWARE DEFINED NETWORK (SDN) - Examples disclosed herein relate to restoring a flow path in response to a link failure in a software defined network (SDN). In an example, a backup flow path for a flow may be configured in a network device, on a primary flow path of the flow. In response to determination of a link failure in the primary flow path, the network device configured with the backup flow path may be identified. In an example, the network device may be identified by sending, from a detecting network device that detects the link failure on the primary flow path, a message packet successively to each network device preceding the detecting network device on the primary flow path until the network device configured with the backup flow path is identified. The backup flow path may be used to route packets of the flow. | 2017-10-05 |
20170288948 | FAILURE HANDLING FOR ACTIVE-STANDBY REDUNDANCY IN EVPN DATA CENTER INTERCONNECT - Techniques are described for avoiding traffic black-holing in a multi-homed Ethernet virtual private networks (EVPNs) in which a customer device (CE) is multi-homed to a plurality of multi-homing provider edge devices (PEs) via respective links of an Ethernet segment. An overlay network is created over the Ethernet segment, and the multi-homing PEs of the EVPN are configured with a common anycast IP address for respective virtual network interfaces. Upon election as active designated forwarder (DF) for the EVPN, the DF PE of the multi-homing PEs advertises toward the customer network an IGP metric for the anycast IP address that is lower than the IGP metric(s) advertised by any of the non-DF standby PE routers segment to direct the CE to forward network packets from the customer network to the DF PE over the respective link of the Ethernet segment. | 2017-10-05 |
20170288949 | SYSTEMS AND METHODS FOR RAN-WLAN AGGREGATION - Methods and systems for controlling the transmission of data from a mobile device to a base station is provided. Data may be transmitted directly from the mobile device to the base station, or via a WLAN access point. | 2017-10-05 |
20170288950 | COMMUNICATION LINK MONITORING AND FAILOVER - The present disclosure relates to systems and methods for detection of a failed communication link and rerouting network traffic around the failure. One embodiment of a system consistent with the present disclosure may comprise a communication subsystem in communication with the data network and configured to transmit information to a recipient. The system may also include a confirmatory signal subsystem configured to generate a confirmatory signal. The confirmatory signal may be inserted into a stream of data to be transmitted to the recipient through a first communication path. Upon detection of a disruption in the confirmatory signal, a failover subsystem configured to reroute the stream of network data to be transmitted to the recipient through a second communication path. The second communication path may comprise one or more physical connections in the network that are distinct from the first communication path. | 2017-10-05 |
20170288951 | VEHICLE CONTROL SYSTEM, MOTOR DRIVE CONTROLLER, AND MANAGEMENT CONTROLLER - A vehicle control system includes electronic controllers and first and second communications networks. The electronic controllers control a vehicle including an internal combustion engine and a drive motor. The electronic controllers include a management controller to manage travel control of the vehicle and a motor drive controller to control the drive motor. The first and second communications networks connect the electronic controllers together. The electronic controllers communicate via the first and second communications networks. The motor drive controller is configured to stop the drive motor when it is determined that a fault has occurred in the first communications network and configured to transmit information indicating that the fault has occurred in the first communications network to the management controller via the second communications network. The management controller is configured to control the electronic controllers not to communicate via the first communications network in response to the information. | 2017-10-05 |
20170288952 | NETWORK POLICY CONFLICT DETECTION AND RESOLUTION - Example implementations relate to network policy conflict detection and resolution. For example, a system for network policy conflict detection and resolution can include a policy compilation engine to compile a plurality of network policies based on an intent format, a conflict detection engine to detect a conflict between a first network policy among the plurality of network policies and a second network policy among the plurality of network policies, using the intent format, and a conflict resolution engine to resolve the detected conflict between the first network policy and the second network policy. Further, the system for network policy conflict detection and resolution can include a translation engine to translate the resolution of the detected conflict to a protocol-specific format. | 2017-10-05 |
20170288953 | AUTOMATIC SETUP OF FAILURE DETECTION SESSIONS - For a network with host machines that are hosting virtual machines, a method for facilitating BUM (broadcast, unknown unicast, and multicast) traffic between a hardware switch (e.g., ToR switch) and the host machines is provided. The network has a set of host machines configured as a cluster of replicators for replicating BUM traffic from the hardware switch to the host machines. A set of network controllers establishes failure-detection tunnels for links between the hardware switch and the replicator cluster. The replicator cluster informs the set of controllers of a change in the membership of the replicator cluster to initiate an update to the active failure-detection sessions. The set of network controllers communicates with the replicator cluster and a ToR switch to establish bidirectional forwarding detection (BFD) sessions between one or more replicator nodes in the replicator cluster and the ToR switch. | 2017-10-05 |
20170288954 | AUTOMATIC LOCALIZATION OF A PHYSICAL NETWORK FAULT AT RUNTIME - A method is provided for localizing a physical network fault in a network having a plurality of network participants. The method comprises detecting by a first network participant and a second network participant that communication with a third network participant and the respective further participant of the first and second network participants is disrupted. In response to the detecting, the first network participant and second network participant automatically reduce their baud rate. The method comprises further establishing a connection between the first network participant and second network participant with use of the reduced baud rate, detecting by the first network participant and/or the second network participant that communication with the third network participant is not possible with use of the reduced baud rate, and storing information on the impossibility of communication with the third network participant. | 2017-10-05 |
20170288955 | NETWORK APPLIANCE HEALTH MONITOR - Systems and methods for monitoring failures of network devices and identifying potential sources of the failures by a device health monitor are provided. A device monitor receives a usage log of a network device over a network connection and analyzes an abnormal usage of the network device from the usage log. The device health monitor further retrieves environment information of the network device and analyzes a defect of the environment information of the network device by associating the abnormal usage with the environment information. The device health monitor sends a message regarding the defect of the environment information to an administrator of the network device. | 2017-10-05 |
20170288956 | NODE CONFIGURATION ASSIGNMENT USING A MOBILE COMMUNICATION DEVICE - A mobile communication device is used to assign a configuration to a designated compute node by wirelessly transmitting a configuration identifier to the designated compute node. The designated compute node receives the configuration identifier and provides the configuration identifier to a management node accessible over a network in order to receive configuration data associated with the configuration identifier. The designated compute node receives the configuration data and applies the configuration data to achieve the assigned configuration. This method may be used to configure a plurality of compute nodes, although each of the compute nodes may assigned the same or different configuration. | 2017-10-05 |
20170288957 | INPUT METHOD ENGINE MANAGEMENT FOR EDGE SERVICES - A method for managing deployment of input method engines (IMEs) to computing devices in proximate relation to endpoint devices within a data communication network includes receiving software logic data indicating deployment rules for deploying an IME executing on a first computing device in the data communication network to a second computing device in the data communication network. The method further includes receiving a software data structure identifying configuration preferences of a user of an endpoint device. The method further includes monitoring the usage of the IME. Monitoring may include obtaining usage data associated with the user's access to the IME through the second computing device. The method additionally includes determining, based on the monitoring and the software logic data and the software data structure, whether the threshold condition is satisfied and deploying the IME to the second computing device in when that the threshold condition is satisfied. | 2017-10-05 |
20170288958 | PROACTIVE INPUT METHOD ENGINE MANAGEMENT FOR EDGE SERVICES BASED ON CROWDSOURCING DATA - A method for preemptively deploying input method engines (IMEs) within a data communication network to computing devices in proximate relation to users includes: receiving software logic data indicating rules for deploying IMEs to a first computing device; receiving a software data structure identifying configuration preferences of a user, the configuration preferences associate the user with a configuration of one or more IMEs; identifying, based on the configuration preferences, a first IME deployed to execute on the first computing device, where the first IME was deployed to execute on the first computing device in response to the user's access to the first IME through the first computing device satisfying at least one of the rules; determining, based on the configuration preferences, that the user will access the first IME through a second computing device in the future and deploying the first IME to second computing device before the future access. | 2017-10-05 |
20170288959 | CONFIGURING ENTERPRISE WORKSPACES - Various examples relate to the configuration of enterprise workspaces that can be provided in computing devices. In some examples, a computing device is enrolled with a management service that controls operating of at least a portion of the computing device. A management component creates a user account with a distributor of the operating system based on an email address and a password. The user account is associated with an enterprise workspace of the computing device. | 2017-10-05 |
20170288960 | Cloud Action Center - Examples of the present disclosure describe systems and methods of providing cloud-based activity information. In aspects, a notification may be generated on a client device of a user. The notification may be transmitted to a cloud-based server via an activity feed. The cloud-based server may use the notification to identify a mapping of the user to multiple devices associated with the user. The cloud-based server may then forward the notification to one or more of the identified devices. In at least one example, when the user dismisses the notification using any of the identified devices, the notification is automatically dismissed on the remaining identified devices. | 2017-10-05 |
20170288961 | SYSTEMS AND METHODS FOR MANAGEMENT PLANE - CONTROL PLANE INTERACTION IN SOFTWARE DEFINED TOPOLOGY MANAGEMENT - Embodiments of the present invention provide systems and methods for a Session-level SDT component in the control plane to handle setup, recovery and mobility of individual session requests in real time. The Session-level SDT component may comprise path management that performs either stateless of stateful path switching for an ongoing session, whether download or uplink, according to the stateful requirements of the session. The path management may be in conjunction with user equipment mobility management operation; it may also be in conjunction with network scalability and automation operation, such as load balancing. | 2017-10-05 |
20170288962 | METHOD AND APPARATUS FOR CONFIGURING DIFFERENT THRESHOLDS FOR DIFFERENT SIGNALS IN WIRELESS COMMUNICATION SYSTEM - A method and apparatus for transmitting signals in a wireless communication system is provided. A base station (BS) operated in unlicensed band configures different thresholds for energy detection or carrier sensing for different signals, and transmits signals based on the configured thresholds. | 2017-10-05 |
20170288963 | User Guidance Data for Establishing A Desired End-State Configuration - Disclosed herein are systems, methods, and computer-readable media for generating and presenting, to an end user, user guidance data for achieving a desired end-state device or application configuration. End-state configuration source data may be provided to an application component. The application component may determine a desired end-state configuration from the source data, and may further determine a navigation path for transitioning from a current configuration state to the desired end-state configuration. The application component may then generate user guidance data to guide the user through the navigation path. | 2017-10-05 |
20170288964 | TELECOMMUNICATIONS SYSTEM FOR PROGRAMMABLE LOGIC CONTROLLER - A telecommunications system for a programmable logic controller (PLC) includes: a master module comprising a transmitter and a receiver; one or more slave modules configured to receive signals transmitted from the transmitter and transmit signals to the receiver in response to the transmitted signals; a signal conversion module configured to convert the signals transmitted between the master module and the slave modules into digital signals; a control module configured to control the signal conversion module and to determine whether there is an error in the signals transmitted between the master module and the slave modules based on the digital signals; a display module configured to display a result of the determination by the control module. | 2017-10-05 |
20170288965 | Systems and Methods for Automatic Device Detection - Described systems and methods enable an automatic device detection/discovery, particularly of ‘Internet of Things’ client devices such as wearables, mobile communication devices, and smart home appliances, among others. Device detection comprises assigning a target device to a device category, such as “tablet computer from an unknown manufacturer, running Android®”. Some embodiments determine multiple preliminary category assignments according to distinct inputs such as HTTP user agent data, DHCP data, mDNS data, and MAC data. Each preliminary category assignment may come with an associated score. A definitive category assignment may be made according to an aggregate score. Applications include computer security, software provisioning, and remote device management, among others. | 2017-10-05 |
20170288966 | User Guidance Data for Establishing A Desired End-State Configuration - Disclosed herein are systems, methods, and computer-readable media for generating and presenting, to an end user, user guidance data for achieving a desired end-state device or application configuration. End-state configuration source data may be provided to an application component. The application component may determine a desired end-state configuration from the source data, and may further determine a navigation path for transitioning from a current configuration state to the desired end-state configuration. The application component may then generate user guidance data to guide the user through the navigation path. | 2017-10-05 |
20170288967 | ENVIRONMENT MANAGER FOR CONTINUOUS DEPLOYMENT - Aspects of the embodiments are directed to designing a deployment environment for a continuous delivery tenant. Embodiments include receiving, via a natural language input, a set of parameters for building a deployment environment for an application; determining, by a natural language processing engine, a resource to satisfy a parameter of the set of parameters; identifying, for a resource, a resource provider for providing the resource; and installing, via a network interface, the application on the resource provider. | 2017-10-05 |
20170288968 | COMPILING NETWORK POLICIES - Example implementations relate to compiling network policies. In an example, a method includes dividing a plurality of network policies into an exclusive policy group and a non-exclusive policy group, compiling the policies in the exclusive policy group into a first plurality of orthogonal policies, compiling the policies in the non-exclusive policy group into at least a second plurality of orthogonal policies, where the compiling of each policy group occurs separately. | 2017-10-05 |
20170288969 | METHOD AND DEVICE FOR ESTIMATING A BANDWIDTH - Embodiments of the disclosure provide a method and apparatus for estimating a bandwidth. A transmitter receives an estimated bandwidth and a packet loss ratio estimation parameter; calculates a packet loss ratio as a function of the packet loss ratio estimation parameter; and determines whether the packet loss ratio is less than a preset packet loss ratio, and determines whether the estimated bandwidth is more than a preset bandwidth and more than a current transmit bandwidth; and if so, then the transmitter determines a bandwidth in a bandwidth interval as a new current transmit bandwidth, where the bandwidth interval is more than a preset multiple of the current transmit bandwidth but no more than the estimated bandwidth, where the preset multiple is more than or equal to 1.08 times. | 2017-10-05 |
20170288970 | MASS MAC WITHDRAWAL FOR EVPN-DCI USING VIRTUAL ESI - The techniques described are directed to providing mass withdrawal of media access control (MAC) routes for network devices in an Ethernet virtual private network data center interconnect (EVPN DCI). MAC routes to reach the learned MAC addresses are stored in routing tables with corresponding top-of-rack Ethernet segment identifier (TOR-ESI) values that represent the Ethernet segments from where the MAC addresses were learned. A provider edge (PE) network device may configure and advertise a virtual Ethernet segment identifier (vESI) that includes a plurality of TOR-ESI values. As Ethernet segments of the data center become unavailable, the corresponding TOR-ESI values may be withdrawn from the vESI to form an updated vESI. In this way, MAC routes having a TOR-ESI value that was withdrawn from the vESI may be removed from the routing tables in each of the network devices. | 2017-10-05 |
20170288971 | Constraint-Based Virtual Network Function Placement - A network function virtualization (NFV) orchestration manager utilizes characteristics of the particular host, such as the platform itself, the hypervisor and the network interface to determine virtual network function (VNF) deployment. Exemplary platform characteristics are latency, throughput, scalability and migration. Factors are developed for each characteristic to provide positive or negative values used in the determination so that each host receives values for each characteristic. Each VNF is associated with desirable characteristics. When a VNF is to be deployed, the NVF orchestration manager determines the host factors relevant to the VNF. After analyzing the hosts and comparing them to the VNF requirements, a host choice is determined and the VNF is deployed to that host, with a virtual machine (VM) being created if needed. In a similar manner, VNFs can be chosen for inclusion in a service function chain (SFC). | 2017-10-05 |
20170288972 | SYSTEMS AND METHODS FOR SERVICE AND SESSION CONTINUITY IN SOFTWARE DEFINED TOPOLOGY MANAGEMENT - Embodiments of the present invention provide systems and methods for a Session-level SDT component in the control plane to handle setup, recovery and mobility of individual session requests in real time. The Session-level SDT component may comprise path management that performs either stateless of stateful path switching for an ongoing session, whether download or uplink, according to the stateful requirements of the session. The path management may be in conjunction with user equipment mobility management operation; it may also be in conjunction with network scalability and automation operation, such as load balancing. | 2017-10-05 |
20170288973 | NETWORK SYSTEM, NETWORK MANAGEMENT METHOD, AND NETWORK MANAGEMENT DEVICE - A network management device retains path information of paths as a list of node identifying information to identify nodes, the path information including information on paths sharing a link regarding a relation in which one path shares a link with another path. According to the information on paths sharing a link, the network management device determines a path setup timing for a path to be the same for a group of one or more paths that do not share a same link with the path and determines a different path setup timing for a group of one or more paths that share a same link with the path than the timing for the group including the path, and executes path setup via communication devices existing on paths constituting each group of paths as per path setup timing determined for each group. | 2017-10-05 |
20170288974 | GRAPH-BASED FUSING OF HETEROGENEOUS ALERTS - Methods and systems for reporting anomalous events include intra-host clustering a set of alerts based on a process graph that models states of process-level events in a network. Hidden relationship clustering is performed on the intra-host clustered alerts based on hidden relationships between alerts in respective clusters. Inter-host clustering is performed on the hidden relationship clustered alerts based on a topology graph that models source and destination relationships between connection events in the network. Inter-host clustered alerts that exceed a threshold level of trustworthiness are reported. | 2017-10-05 |
20170288975 | RING NETWORK UPLINK DESIGNATION - Examples associated with ring network uplink designation are disclosed. One example includes detecting an operable connection between a member of a ring network and an external network. The operable connection may be detected by the member of the ring network. A signal is provided to a ring network management daemon. The signal may indicate the member of the ring network has the operable connection to the external network. A signal is received from the ring network management daemon. The signal may designate the ring network as an active uplink to the external network. The operable connection between the ring network and the external network is activated. Once activated, the operable connection may facilitate communication between members of the ring network and the external network. | 2017-10-05 |
20170288976 | MODULES REGISTRATION AND STATUS UPDATE OF MODULAR ASSEMBLY SYSTEM - A method for registering one of a plurality of assembly modules operatively coupled to one another in a modular assembly system is provided. A first message including a first identifier of the assembly module is received from one of the plurality of assembly modules. A second message including a second identifier for the assembly module is transmitted to the assembly module. The second identifier is generated based on at least the first identifier. A third message including the second identifier is received from the assembly module. In response to determining that the third message is received, the assembly module is registered as a new assembly module of the modular assembly system. At least one of the receiving, transmitting, determining, and registering is performed by a control module of the plurality of assembly modules. | 2017-10-05 |
20170288977 | METHOD FOR MANAGING DATA IN A COMMUNICATION NETWORK - A method for managing data in a communication network ( | 2017-10-05 |
20170288978 | METHOD FOR GATHERING TRAFFIC ANALYTICS DATA ABOUT A COMMUNICATION NETWORK - There is provided a method for gathering traffic analytics data about a communication network that analyzes specific attributes of communications relationships between system assets of a network. | 2017-10-05 |
20170288979 | BLUE PRINT GRAPHS FOR FUSING OF HETEROGENEOUS ALERTS - Methods and systems for reporting anomalous events include building a process graph that models states of process-level events in a network. A topology graph is built that models source and destination relationships between connection events in the network. A set of alerts is clustered based on the process graph and the topology graph. Clustered alerts that exceed a threshold level of trustworthiness are reported. | 2017-10-05 |
20170288980 | SYSTEM FOR VISUALIZATION OF ELECTROMAGNETIC WAVE DISTRIBUTION AND COLLABORATIVE WEB-BASED DESIGN FOR OPTIMAL DISTRIBUTION OF EMITTERS - Aspects of the embodiments are directed to a collaborative tool that can include receiving one or more design parameters into a web server for designing a placement of one or more electromagnetic emitters; designing a structural layout for configuring a wireless network; virtually placing a plurality of electromagnetic emitters in different areas around the structural layout; testing electromagnetic signal strength in the structural layout; and optimizing the electromagnetic emitter placement. | 2017-10-05 |
20170288981 | TROUBLESHOOTING VIRTUAL NETWORK REACHABILITY - A novel method for troubleshooting a logical network is provided. The logical network has logical forwarding elements operating inside virtual network forwarding engines. The method receives a source identifier and a destination identifier that correspond to nodes in the logical network. The method then retrieves a set of network data from a virtual network forwarding engine and identifies a path in the logical network by traversing the logical network according to the retrieved set of network data. This traversal starts at an initial network node that is identified by the source identifier and continues through a set of next-hop network nodes that are each identified based on the destination identifier. At least some of the network nodes are logical ports associated with logical forwarding elements implemented by the virtual network forwarding engine. The method then reports the set of traversed logical nodes. | 2017-10-05 |
20170288982 | DYNAMICALLY ADAPTING CLOUD APPLICATIONS - Techniques for dynamically adapting cloud applications are described. A current value of a Key Performance Indicator (KPI) of an executing cloud service instance of a cloud application is detected. A determination is made as to whether the current value of the KPI is unacceptable (e.g., either it is outside of an acceptable range or is within an adaptation region). If the current value of the KPI is unacceptable, a first application programming interface (API) is invoked to request a cloud service instance monitor to adapt the cloud service instance to operate within an acceptable KPI range. If the cloud service instance monitor was unsuccessful, the unacceptable KPI is escalated to the cloud service monitor for the type of the cloud service instance. If the cloud service monitor is unsuccessful, the unacceptable KPI is escalated to the application monitor. | 2017-10-05 |
20170288983 | Method and Apparatus for Deploying Service in Virtualized Network - Embodiments provide a method for service deployment in a virtualized network and a server. The method includes: receiving, by a server, a service deployment request, where the service deployment request includes description of a to-be-deployed service, for example, node information, connection information, and information about access to a deployed service; creating, by the server, an instance of the service, including: creating node instances, and establishing a connection between node instances; and finally establishing, by the server, a connection between the to-be-deployed service and the deployed service according to the information about access to the deployed service. | 2017-10-05 |
20170288984 | PEER TO PEER COMPONENT DISTRIBUTION - A method, apparatus, and system are provided for assigning tasks and/or providing resources in a distributed system. An indication of a task being available for processing is provided to one or more remote systems in a distributed system based on a distribution list. | 2017-10-05 |
20170288985 | DEVICE MANAGEMENT SYSTEM - A device management system includes a system management information handling system (IHS) that is coupled to a network. A first device is included in the device management system and is not configured to communicate with the system management IHS. A plurality of user IHSs are each configured to communicatively couple to the first device and are each configured to communicatively couple to the system management IHS through the network. Each of the plurality of user IHSs is configured to retrieve device information from the first device when that user IHS is communicatively coupled to the first device. Each of the plurality of user IHSs is configured to provide the device information for the first device to the system management IHS when that user IHS is communicatively coupled to the system management IHS through the network. | 2017-10-05 |
20170288986 | METHOD FOR PREDICTING A LEVEL OF QoE OF AN APPLICATION INTENDED TO BE RUN ON A WIRELESS USER EQUIPMENT - The present disclosure is directed toward a device and a method for evaluating a wireless link established between an access point and a user equipment. The device and method include determining a level of Quality of Experience of an application intended to be run on the user equipment using a mapping between a parameter representative of the QoE of the application under different wireless transmission conditions and sets of parameters representative of said different transmission conditions of the wireless link. | 2017-10-05 |
20170288987 | APPLICATION SIGNATURE GENERATION AND DISTRIBUTION - A network device may receive network traffic for an application. The network device may identify an application layer protocol being used for the network traffic. The network device may obtain contextual information, from the network traffic, to obtain an item of contextual information, and the item of contextual information may be selected based on the application layer protocol. The network device may determine that the item of contextual information matches a stored item of contextual information. The network device may determine that a threshold has been met with regard to the stored item of contextual information. The network device may generate an application signature for the application based on the item of contextual information. The network device may send the application signature to another device to permit the other device to identify the application based on the application signature. | 2017-10-05 |
20170288988 | FOG-BASED HYBRID SYSTEM FOR OPTIMAL DISTRIBUTION OF ANOMALY DETECTION AND REMEDIATION SERVICES - In one embodiment, a device in a network reserves first and second sets of local resources for an anomaly detection mechanism. The device reports the first set of local resources to a supervisory node in the network. The device applies one or more anomaly detection rules from the supervisory node using the first set of reserved resources. The device receives one or more anomaly detection rules from a peer node in the network. The device applies the one or more anomaly detection rules from the peer node using the second set of reserved resources. | 2017-10-05 |
20170288989 | Systems and Techniques for Determining Associations Between Multiple Types of Data in Large Data Sets - Systems and methods disclosed herein identify multivariate relationships that exist across all types data collected from numerous observed users over one or more networks. Electronic data collected from observed users include categorical data and non-categorical/numeric data. To compare and analyze the collected data, a marketing entity converts the numeric data to categorical data via a binning algorithm, which reduces the numeric data into two or more discrete categories. The marketing entity analyzes the data variables to compute pairwise associations on the collected categorical and numeric data (which has been converted to categorical data). The marketing entity also determines hierarchical clusters to group the pairwise associations of data variables based on the strength of the associations. The pairwise relationships and hierarchical clusters are displayed on a user interface. | 2017-10-05 |
20170288990 | GRAPH DATA REPRESENTATION AND PRE-PROCESSING FOR EFFICIENT PARALLEL SEARCH TREE TRAVERSAL - One or more embodiments may provide the capability to enumerate maximal cliques of graph data by constructing and traversing a search tree through a single sequential pass on an adjacency list. The adjacency list may be generated so as to enable the at least one maximal clique to be generated in one single sequential pass. | 2017-10-05 |
20170288991 | SYSTEM AND METHOD FOR MONITORING MULTI-DOMAIN NETWORK USING LAYERED VISUALIZATION - The present invention relates to a system and method for monitoring multi-domain network using end-to-end layered visualization to identify exact root cause of network element to prevent degradation in the network performance is disclosed. The system comprises of data collection module, correlation module, mapping module and management server. The data collection module collects performance data, alarm data, configuration logs and signalling traces from one or more network elements through the management server to draw connectivity across one or more layers. The correlation module correlates the collected performance data, alarm data and configuration logs at regular intervals in order to isolate the root cause of the issue identified. This correlated data of all the network elements are superimposed with layered visualization and mapped by the mapping module and thereby identify the exact root cause of network element causing degradation in the network performance. | 2017-10-05 |
20170288992 | NETWORK SYSTEM AND METHOD FOR CHECKING PLAUSIBILITY OF VALUE RETURNED BY DEVICE THEREIN - It is provided a method for checking plausibility of a value received from a device. It comprises receiving, by a neighbor of the device at a current time instant, a current output value and a previous output value of the device (S | 2017-10-05 |
20170288993 | CABLE MODEMS/EMTAS UNDER TEST - A system for testing multiple cable modem/eMTA devices independently and simultaneously using different types of device probes is disclosed. The system includes real-time, bi-directional/asynchronous communication and interaction between the system components. | 2017-10-05 |
20170288994 | PACKET TRANSFER DEVICE AND METHOD FOR SETTING COUNTER - There is provided a packet transfer device including a memory, and a processor coupled to the memory and the processor configured to detect a first packet of a predetermined size, detect a second packet whose data in a predetermined area matches a specific pattern, the second packet being included in a group of the first packet, and count a number of the second packet. | 2017-10-05 |
20170288995 | METHOD OF MEASURING INTERFERENCE - A method of measuring interference to perform efficient data communication is disclosed. A method of measuring interference of neighboring cells comprises allocating one or more first resource elements, to which pilot signals are allocated, to predetermined symbol regions included in a first resource block; allocating one or more second resource elements for measuring interference of the neighboring cells to a first symbol region of the predetermined symbol regions; and measuring interference of the neighboring cells using the one or more second resource elements. | 2017-10-05 |
20170288996 | NETWORK CONNECTIVITY IDENTIFICATION - Examples of the present invention present a method of determining the network connectivity technology being used in a network link. The method sends test packets from the router to an end device, such as a set-top box, and measures the latency in the received packets at the end device. The packets are gradually increased in size. The increasing packet size effectively results in increasing the load on the network link between the router and the end device. The latency characteristics vary as a function of packet size (representing increasing network load), and result in a signature or “fingerprint” for the network connectivity technology being used for the link, across the load cycle. The signature can be compared to predetermined models to identify the specific technology used. The technique can be enabled using software modules installed at the gateway/router and at the end-point, such as a set-top box. | 2017-10-05 |
20170288997 | MANAGEMENT SYSTEM AND MANAGEMENT METHOD - A management system includes a first switch and a second switch. The first switch includes a first processor configured to transmit a first instruction when information on a first connection state of first equipment is not updated. The second switch includes a second processor configured to receive the first instruction. The second processor is configured to determine, on basis of second information, whether the first connection state is to be notified to the first switch at a present time. The second information is related to past connection states of the first equipment. The second processor is configured to notify, in a case where it is determined that the first connection state is not to be notified, the first switch of an instruction to transmit the first instruction again after a predetermined time is elapsed. | 2017-10-05 |
20170288998 | APPARATUS FOR PROCESSING NETWORK PACKET USING SERVICE FUNCTION CHAINING AND METHOD FOR CONTROLLING THE SAME - A network packet processing apparatus using a service function chaining and a method of controlling the same are provided. The network packet processing apparatus includes a plurality of service function modules configuring the service function chaining, each of the plurality of service function modules being one of a stateful service function module and a stateless service function module. Also the network packet processing apparatus includes an input logger and an output logger used to perform fault-recovery, and a service function forwarder module forwarding a packet to the plurality of service function modules, the input logger, and the output logger through a path specified in the packet. | 2017-10-05 |
20170288999 | Selecting a Packet Loss Concealment Procedure - In accordance with an example embodiment of the present invention, disclosed is a method and an apparatus thereof for selecting a packet loss concealment procedure for a lost audio frame of a received audio signal. A method for selecting a packet loss concealment procedure comprises detecting an audio type of a received audio frame and determining a packet loss concealment procedure based on the audio type. In the method, detecting an audio type comprises determining a stability of a spectral envelope of signals of received audio frames. | 2017-10-05 |
20170289000 | SYSTEMS AND METHODS FOR CONTROLLING PROCESSING PERFORMANCE - A method for controlling processing performance by an electronic device is described. The method includes determining a processing performance requirement based on a time difference between a response requirement based on an application type and a network delay. The method also includes determining a processing performance mode based on the processing performance requirement and a processing efficiency profile. The method further comprises operating a processor based on the processing performance mode. | 2017-10-05 |
20170289001 | PREDICTIVE MANAGEMENT OF A NETWORK BUFFER - Predictive management of a network buffer is contemplated. The network buffer maybe predictively managed to control packet drop based at least in part on predicted sojourn time. The predicted sojourn time may be determined to predict time needed from an arriving packet to travel through a queue of the network buffer. | 2017-10-05 |
20170289002 | TECHNOLOGIES FOR DEPLOYING DYNAMIC UNDERLAY NETWORKS IN CLOUD COMPUTING INFRASTRUCTURES - Technologies for deploying dynamic underlay networks in a cloud computing infrastructure include a network controller of the cloud computing infrastructure communicatively coupled via disaggregated switches to one or more compute nodes of the cloud computing infrastructure. The network controller is configured to receive tenant network creation requests from a cloud operating system (OS) of the cloud computing infrastructure indicating that a tenant network is to be created in the cloud computing infrastructure (e.g., for a new tenant of the cloud computing infrastructure). The network controller is configured to provision an underlay network to support the tenant network based on identified physical resources using criteria specified by the cloud OS and transmit information of the provisioned underlay network to the cloud OS that is usable to create a cloud visible overlay network associated with the underlay network. Other embodiments are described herein. | 2017-10-05 |
20170289003 | METHOD AND APPARATUS FOR ANALYZING COMMUNICATION QUALITY, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM - A method for analyzing communication qualities between virtual machines serving as transmission sources and virtual machines serving as transmission destinations on a virtual network includes identifying, by a computer, based on the temporal sequence of the input queue information and the temporal sequence of the output queue information, a first pair and a second pair as mirroring targets, wherein the input queue information indicates a first queue length indicating a number of pieces of data addressed from one of the transmission sources to one of the transmission destinations, wherein the output queue information indicates a second queue length indicating a number of pieces of data included in an output queue of the one of the transmission destinations. | 2017-10-05 |
20170289004 | FLOW TABLE AGEING METHOD, DEVICE AND SYSTEM AND COMPUTER-READABLE MEDIUM - Disclosed are a flow table ageing method, device and system and a computer-readable medium. The method can comprise: a switch receives a flow table configuration message issued by a controller; the switch sets a data volume life cycle parameter value of a flow table according to the flow table configuration message; and when a data volume matched according to the flow table of the switch reaches the data volume life cycle parameter value of the flow table, the switch ages the flow table. | 2017-10-05 |
20170289005 | SYSTEM AND METHOD FOR MANAGING MULTIPLE REMOTE-OFFICE AND BRANCH-OFFICE (ROBO) SITES - System and method for managing multiple Remote-office and Branch-office (ROBO) sites use a central management computer to monitor operation statuses of host computers within the multiple ROBO sites and in response to a communication disruption in a particular ROBO site of the multiple ROBO sites, determining a cause of the communication disruption based on the operation statuses of the host computers within the particular ROBO site. | 2017-10-05 |
20170289006 | INFORMATION GENERATION METHOD, INFORMATION GENERATION DEVICE, AND NON-TRANSITORY RECORDING MEDIUM FOR STORING INFORMATION GENERATION PROGRAM - An information generation method includes: obtaining, for respective communication paths included in the communication paths, a write speed of data received through the respective communication paths to a storage device and a reception speed of the data, by a computer; generating first information on a transmission speed of the data for the respective communication paths, based on the write speed and the reception speed; and transmitting the first information to a transmission source device of the data with second information for identifying the respective communication paths. | 2017-10-05 |
20170289007 | METHOD FOR HEARTBEAT PACKET PROCESSING BY USING PROXY, APPARATUS, AND COMMUNICATIONS SYSTEM - The embodiments of the present invention provide a method for heartbeat packet processing by using a proxy, an apparatus, and a communications system. The method includes: receiving, by a host, a first heartbeat packet sent by a first application in a client, where the client is a terminal that accesses the host by using a short range communications technology; and determining, by the host according to the first heartbeat packet and a first preset list, whether the first application is included in the first preset list. Thus, an objective of saving power for the host and the client can be achieved. | 2017-10-05 |
20170289008 | SCENARIO COVERAGE IN TEST GENERATION - Transaction data is generated during monitoring of a plurality of transactions in a system and a respective flow is determined, from the transaction data, for each of the plurality of transactions. Each of the determined flows involves participation of a respective subset of software components of the system. A plurality of sets of overlapping flows in the plurality of flows are determined and a particular one of the plurality of sets of overlapping flows is determined to correspond to a use scenario of the system. A measure of the degree to which a set of artifacts modeling the system corresponds to the use scenarios of the system is determined. | 2017-10-05 |
20170289009 | METHOD AND DEVICE FOR DOWNLOADING A VIDEO FILE AND PROVIDING A VIDEO FILE - The disclosure provides a method and device for downloading a video file. A client detects a current network speed, transmits a notification carrying information about the current network speed to a media server, and downloads video segments provided by the media server, wherein a video file includes several video segments. | 2017-10-05 |
20170289010 | DYNAMIC NETWORK MONITORING - Approaches for monitoring performance in a networked environment are provided. An approach includes monitoring, using a first metric, performance of a first host running a virtual machine. The approach also includes determining, using a computer device, a second metric based on the virtual machine being migrated from the first host to a second host, wherein the second metric is a function of: (i) the first metric and (ii) a comparison of the first host and the second host. The approach further includes monitoring, using the second metric, performance of the second host running the virtual machine. | 2017-10-05 |
20170289011 | METHODS AND ARRANGEMENTS FOR ACTIVE MEASUREMENTS - A method for managing active measurements for determining performance parameters in a communication network comprises obtaining of a maximum permitted subsession duration and obtaining of time margins. The method further comprises determining whether or not a critical resource involved in the active measurement is active due to other activities than active measurements. If the determination concluded that the critical resource is active, a sending of an ensemble of packets of a subsession of an active measurement session is initiated. If there is an intended next subsession of the active measurement session and if a time since a last ensemble of packets was sent exceeds a sleep-init time comprised in the time margins, at least the determining and, if permitted, the initiating a sending of an ensemble of packets of the next subsession of the active measurement session is repeated. | 2017-10-05 |
20170289012 | SYSTEMS AND METHODS FOR TESTING ELECTRONIC DEVICES USING MASTER-SLAVE TEST ARCHITECTURES - A system may include a master test system and a plurality of slave test systems coupled to the master test system and/or each other. The system may include devices under test (DUTs) (also referred to herein as units under test (UUTs)) stored in test slots and coupled to the master test system or specific slave test systems over Ethernet, coaxial, or other cables. Each test slot may include a Faraday cage that shields the contents therein from electromagnetic signals outside the test slot. The master test system and/or the slave test systems may test the DUTs using specific sequences of tests according to testing protocols relevant to those DUTs. One or more test controllers, mobile devices, display devices, and/or input devices may be coupled to the test systems and be used to control specific test protocols performed by the test systems. | 2017-10-05 |
20170289013 | METHOD, SYSTEM, AND APPARATUS FOR IMPROVING FORWARDING CAPABILITIES DURING ROUTE CONVERGENCE - The disclosed computer-implemented method for improving forwarding capabilities during route convergence may include (1) identifying, at an upstream network device, a set of updated routes that define network paths that have each experienced at least one topology change since the upstream network device last converged with a downstream network device, (2) determining, at the upstream network device, levels of priority for the set of updated routes based at least in part on amounts of traffic that traverse the network paths defined by the set of updated routes, (3) arranging, at the upstream network device, the set of updated routes in a prioritized order in accordance with the levels of priority, and then (4) converging the upstream network device with the downstream network device by sending the set of updated routes in the prioritized order to the downstream network device. Various other methods, systems, and apparatuses are also disclosed. | 2017-10-05 |
20170289014 | REDUNDANY SYSTEM OF ROUTING PATHS AND METHOD THEREOF - The present invention relates to a redundancy system of routing paths and method thereof. By establishing corresponding routing paths from different ports of routers in a ring network to a terminal in advance and transmitting the identical packet to the terminal by the different ports in the different routing paths simultaneously, the time of reestablishing the routing paths may be saved when one of the routing paths is broken, so as to improve the routing efficiency. | 2017-10-05 |
20170289015 | Managing Physical Network Cross-Connects In A Datacenter - A datacenter is represented by a datacenter model including instances of data object instances that represent ports of endpoints, intermediate ports of network components, and cross-connects between ports. In response to receiving specification of a source and destination endpoint, a computer system identifies a path through the data center according to the datacenter model. The path may be identified from among a plurality of candidate paths through the datacenter according to one or more criteria such as speed, capacity, quality, and path length. The path may be output to an operator for implementation and may then be tested. Cross-connects added according to the path may then be added to the datacenter model. | 2017-10-05 |
20170289016 | METHOD OF MONITORING AND WARNING FOR CONFIGURING ROUTING IN A CLUSTER COMPRISING STATIC COMMUNICATION LINKS AND COMPUTER PROGRAM IMPLEMENTING THAT METHOD - The method relates to the monitoring of at least one routing parameter for a cluster including nodes and switches, static communication links connecting nodes and switches. Each switch includes several output ports. After having selected at least one switch, a number of routes per port is calculated for each port of each switch selected, routes being defined during a routing step for each connecting one node to another. A mean number of routes per port is then calculated for the at least one selected switch. Each number of routes per port calculated is then compared with the mean number of routes per port calculated and, in response to this comparison, a potential imbalance of routing of the cluster is notified. | 2017-10-05 |
20170289017 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR ROUTING A REDIRECTED REQUEST MESSAGE - A method for routing a redirected request message is disclosed. The method may be implemented in a Diameter signaling router (DSR) including a plurality of message processors. The method includes applying ingress message processing to a Diameter request message received from a peer node and forwarding the Diameter request message to a Diameter redirect agent in accordance to the ingress message processing. The method further includes receiving, from the Diameter redirect agent, a redirection notification message containing redirection information and modifying the Diameter request message to include the redirection information. The method also includes applying the ingress message processing to the modified Diameter request message within the DSR. | 2017-10-05 |
20170289018 | METHOD FOR CONFIGURING A CONNECTION USING REDUNDANT SERVICE NODES - A method involves setting a link aggregation control protocol (LACP) link state for all links in a first service node to STANDBY to put at least one multiplexer in the first service node in a WAITING state to disable frame collection at the redundant service node and setting the LACP link state for all links in a second service node to SELECTED to put at least one multiplexer in the second service node in a COLLECTING/DISTRIBUTING state to enable frame collection at the primary service node. | 2017-10-05 |
20170289019 | INTERWORKING WITH LEGACY RADIO ACCESS TECHNOLOGIES FOR CONNECTIVITY TO NEXT GENERATION CORE NETWORK - Aspects of the disclosure relate to mechanisms for interworking between legacy and next generation core networks in a communication network. In some examples, a connectivity request originated by a user equipment towards a legacy core network may be transferred to a next generation core network when the user equipment supports the radio access technology of the next generation core network. | 2017-10-05 |
20170289020 | PCEP Extension for PCECC Support of Distributed Computing, Multiple Services, and Inter-Domain Routing - A path computation element (PCE) central controller (PCECC) comprising a memory comprising executable instructions and a processor coupled to the memory and configured to execute the instructions. Executing the instructions causes the processor to receive a request to compute a path through a network, the request comprising a plurality of computational tasks, divide the computational tasks into a plurality of groups of computational tasks, transmit at least some of the plurality of groups of computational tasks to a plurality of path computation clients (PCCs) for computation by the PCCs, and receive, from the PCCs, computation results corresponding to the plurality of groups of computational tasks. | 2017-10-05 |
20170289021 | PACKET SEQUENCE NUMBERING FOR MULTI-CONNECTIVITY IN A WIRELESS NETWORK - An example technique may include controlling receiving a data unit and an associated first sequence number over a first protocol, assigning a second sequence number to the data unit, wherein the second sequence number is based upon the first sequence number, and controlling transmitting, over a second protocol, the data unit and the second sequence number. | 2017-10-05 |
20170289022 | SINGLE QUEUE LINK AGGREGATION - A method for transmitting a packet on a logical port comprising two or more physical ports comprises receiving a packet of a class of service; storing the packet in a memory; maintaining a lookup table relating a plurality of identifiers to at least one physical port; storing a pointer to the stored packet in the memory in a single pointer list for the class of service along with a selected one of the identifiers; and copying the stored packet to one or more physical ports corresponding to the selected identifier for transmission on at least one of the physical ports. In one implementation, a plurality of the physical ports are grouped into a logical port, and the received packet is processed to determine its logical port and its class of service. | 2017-10-05 |
20170289023 | NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM, COMMUNICATION METHOD AND COMMUNICATION DEVICE - A non-transitory computer readable recording medium storing therein a communication program, the communication program relaying communication from an application operating on a terminal to a communication destination and causing a computer to execute a process, the process including: switching a communication protocol for the communication from a first protocol to a Delay/Disruption Tolerant Networking (DTN) protocol, in accordance with a connection condition with the communication destination for the communication; and notifying the terminal of a failure of a specific communication in cases when the specific communication has been notified to the application as completed and the specific communication in the DTN protocol results in failure. | 2017-10-05 |
20170289024 | TECHNOLOGIES FOR QUALITY OF SERVICE BASED THROTTLING IN FABRIC ARCHITECTURES - Technologies for quality of service based throttling in a fabric architecture include a network node of a plurality of network nodes interconnected across the fabric architecture via an interconnect fabric. The network node includes a host fabric interface (HFI) configured to facilitate the transmission of data to/from the network node, monitor quality of service levels of resources of the network node used to process and transmit the data, and detect a throttling condition based on a result of the monitored quality of service levels. The HFI is further configured to generate and transmit a throttling message to one or more of the interconnected network nodes in response to having detected a throttling condition. The HFI is additionally configured to receive a throttling message from another of the network nodes and perform a throttling action on one or more of the resources based on the received throttling message. Other embodiments are described herein. | 2017-10-05 |
20170289025 | Tagging Mechanism and Out-of Sequence Packet Delivery for QoS Enhancement - A tagging mechanism supporting different QoS categories for IP/Port services in a cellular radio network is proposed. Tags are used to differentiate different types of services and corresponding QoS requirements. At the sender side, the sender of the IP packets is able to distinguish different types of services by tagging one or multiple bits for finer QoS control. For downlink IP traffic, the tagging function can be done at the base station. For uplink IP traffic, the tagging function can be done at the UE. At the receiver side, the receiver delivers the IP packets using out-of-sequence delivery for delay sensitive packets. With tagging and out-of-sequence delivery, the delay sensitive packets can reduce CN latency and transmission latency. | 2017-10-05 |
20170289026 | SWITCH PROCESSING METHOD, CONTROLLER, SWITCH, AND SWITCH PROCESSING SYSTEM - Embodiments of the present invention provide a switch processing method, a controller, a switch, and a switch processing system. The method provided by the embodiments of the present invention is executed by the controller and a logical Switch, where the logical Switch includes at least two physical Switches. The method includes: allocating, by the controller, a flow table of the logical Switch to each physical Switch; sending, by the controller, mapping information, so that each physical Switch obtains the mapping information; and sending, by the controller, flow entries, so that each physical Switch obtains flow entries corresponding to each physical switch and processes a data packet. For the logical Switch for executing the method provided by the embodiments of the present invention, new physical Switches may be stacked on a basis of a physical structure of the logical Switch. | 2017-10-05 |
20170289027 | ROUTING INTER-AS LSPs WITH CENTRALIZED CONTROLLER - Techniques are described for routing inter-AS LSPs with a centralized controller taking inter-AS TE metric values for inter-AS links into account. The inter-AS TE metric values, e.g., local preference values, MED values, or EROS, indicate route preferences for routes between ASes. The disclosed techniques enable network devices within either or both of a first AS and a second AS to store inter-AS TE metric values for inter-AS links in TEDs of the network devices. The network devices then send the contents of their TEDs, including the inter-AS TE metric values, to a centralized controller of the first AS and the second AS. The centralized controller computes an inter-AS LSP across the first AS and the second AS based at least in part on the inter-AS TE metric values such that the inter-AS LSP includes a preferred one of the inter-AS links as indicated by the inter-AS TE metric values. | 2017-10-05 |
20170289028 | LABEL SWITCHED PATH REPORTING - Techniques are described for reporting, by non-ingress routers for traffic engineering label switched paths (TE LSPs) and to a path computation element, actual paths taken by the TE LSPs through the network. A first network device: receives, from a second network device, an LSP path signaling message that includes a route object having a first indication of at least a sub-path of a path for TE LSP through a network, wherein the first network device is not an ingress label edge router for the TE LSP; generates, in response to the LSP path signaling message and based at least in part on the route object, an LSP path report message that includes a second indication of the at least the sub-path of the path for the TE LSP; and sends, to a path computation element, the LSP path report message to notify the PCE. | 2017-10-05 |
20170289029 | Heterogeneous Network in a Modular Chassis - In one embodiment, a system includes a number of application-specific integrated circuits (ASICs). The system also includes one or more processors coupled to the ASICs including instructions executable by the processors. The processors being operable when executing the instructions to configure the plurality of ASICs to route data packets using a standard protocol; configure the ASICs to set up a tunnel, using the standard protocol, for moving data packets from one ASIC to another of the number of ASICs; and implement a software overlay to facilitate interaction between the number of ASICs through the tunnel for moving the data packets. | 2017-10-05 |
20170289030 | MULTIPLE PROVIDER FRAMEWORK FOR VIRTUAL SWITCH DATA PLANES AND DATA PLANE MIGRATION - The disclosure relates to technology for supporting a virtual switch to change data plane providers on a framework supporting multiple data plane providers. A processing device receives a request to change a first data plane provider, where the virtual switch is configured with a topology on the first data plane provider to use a flow management protocol. The virtual switch includes network interfaces connected to ports to enable communication among entities attached to the network interfaces by forwarding data packets within a first datapath of the first data plane. In response to the change, the network interfaces are disconnected, the first datapath is removed and a second datapath is created. The virtual switch is then configured to operate with the second datapath while retaining the flow management protocol and the topology, such that the entities communicate by forwarding data packets within the second datapath on the second data plane. | 2017-10-05 |