49th week of 2015 patent applcation highlights part 80 |
Patent application number | Title | Published |
20150350016 | TRANSFORMATION ENGINE FOR DATACENTER COLOCATION AND NETWORK INTERCONNECTION PRODUCTS - Integration of diverse software applications in i) a co-location facility, ii) communication interconnection network facility or ii) both. A transformation engine for datacenter colocation and network interconnection products may assist in a dynamic i) transformation of commands and ii) data structure translation as well as data structure transformation between a source application (SA) and a target application (TA) via two or more translation assist templates. The translation assist templates correlate to various combinations of the SAs, TAs, and the colocation or the network interconnection products. The network transformation engine may generate a new translation assist template when information regarding a new or updated application or product is loaded into a database. The new translation assist template may then be sent to a cache used by middleware to assist in the dynamic translation and transformation of the commands and the data structures to dynamically map out how a grammar and structure of the SA correlates to the TA. | 2015-12-03 |
20150350017 | AUTOMATED ENTRY OF HIDDEN SERVICE-CONFIGURATION MENU FOR TARGET CONFIGURABLE DEVICE SELECTED FROM PLURALITY OF CONFIGURABLE DEVICES IN ROOMS OF HOSPITALITY ESTABLISHMENT - A configuration apparatus includes a user interface allowing a user to initiate configuration of at least a target configurable device selected from a plurality of configurable devices. A command module is coupled to the user interface for dynamically generating a sequence of commands required to configure the target configurable device. The sequence of commands includes commands for entering a hidden service-configuration menu of the target configurable device. A communication module is coupled to the command module for transmitting the sequence of commands to the target configurable device. | 2015-12-03 |
20150350018 | CENTRALIZED ADJUSTMENT OF DATA RATES IN MESH NETWORKS - In one embodiment, a method is disclosed in which a device receives data regarding a topology of a network. Traffic data for one or more data links in the network and performance data for the one or more data links are also received. A data rate change is simulated for the one or more data links using the topology data, traffic data, and performance data. Based on the simulated data rate change, a data rate change command is provided to one or more nodes associated with the one or more data links. | 2015-12-03 |
20150350019 | RESOURCE MANAGEMENT METHOD AND RESOURCE MANAGEMENT SYSTEM - In a cloud environment where multiple applications having different performance characteristics are operated in a mixture, in order to specify the cause of performance deterioration and to solve the confliction of requests related to a shared resource, the present invention detects the performance deterioration of resources allocated to multiple instances constituting a logical server configuration, and extracts an instance sharing resources existing performance deterioration, and compares a performance tendency of the extracted instance and a performance pattern showing a characteristics extracted from a performance information of the resource in association with a bottleneck factor, to thereby estimate the bottleneck factor by calculating mutual similarities and determining a performance pattern where the calculated similarity becomes maximum. | 2015-12-03 |
20150350020 | METHOD AND APPARATUS FOR REMOTE MODIFICATION OF SYSTEM CONFIGURATION - A method and apparatus for updating the system configuration settings of a computer system. Embodiments include a remote system configuration system that enables a user to update the system configuration of a target machine from a server machine over a network or similar communications system. Another embodiment includes a system configuration method using a bus master device to write system configuration data into a target computer system. | 2015-12-03 |
20150350021 | GENERATION AND MANAGEMENT OF COMPUTING INFRASTRUCTURE INSTANCES - Various techniques are described herein for generating and managing computing infrastructure instances within datacenters. Data identifying various computing infrastructure characteristics may be receive and analyzed in order to determine one or more computing infrastructure definitions to be instantiated within a datacenter. Specific datacenters may be determined for instantiating the computing infrastructure definitions, various provisioning and configuration management tools may be selected, and computing infrastructure instances comprising multiple interoperable services (e.g., web services) and other components may be provisioned, configured, tested, and maintained. In some examples, instance execution data may be received and analyzed via instance monitor components transmitted and deployed within computer infrastructure instances executing on datacenters. Instance monitor components may collect instance execution data, which may be analyzed to identify issues of performance, stability, cost, and the like, associated with various combinations of computing infrastructure definitions, datacenters, services, and configurations. | 2015-12-03 |
20150350022 | A Method of Network Subscription in a Wireless Network - Provided is a method of subscribing, by a terminal, to a network as a router or an end device in a wireless network (WN) having a tree structure including routers and end devices. Each router receives, from a parent router thereof, addresses which are usable independently for child routers and child end devices thereof, and classifies the addresses into a general address and a special address. A terminal wishing to subscribe to a network may subscribe to the network by using a special address of an end device, only when the terminal is unable to subscribe to the network by using a general address of the end device, thereby reducing depletion of addresses to be used for terminal subscription and facilitating network subscription of the end device. | 2015-12-03 |
20150350023 | DATA CENTER NETWORK ARCHITECTURE - Data center network architectures that can reduce the cost and complexity of data center networks. The data center network architectures can employ optical network topologies and optical nodes to efficiently allocate bandwidth within the data center networks, while reducing the physical interconnectivity requirements of the data center networks. The data center network architectures also allow computing resources within data center networks to be controlled and provisioned based at least in part on a combined network topology and application component topology, thereby enhancing overall application program performance. | 2015-12-03 |
20150350024 | Configuring Network Devices/US - Systems and methods for configuring network devices are provided. Aspects of the disclosure relate to Quality of Service (QoS) configuration parameters and methods for using QoS configuration parameters to provide enhanced services to users in a network. A first computing device may receive an indication that a network device requires an updated communication parameter. The indication may be generated, for example, based on traffic on a port of the network device exceeding a threshold level. The first computing device may communicate with a second computing device to request and retrieve the updated communication parameter. The first computing device may provide the updated communication parameter to the network device. The transmission of the updated communication parameter may cause alteration of a first QoS associated with a first communication protocol of the network device. A second QoS associated with a second communication protocol of the network device may be left unchanged. | 2015-12-03 |
20150350025 | HIGHLY RELIABLE PATH ACCOMMODATION DESIGN APPARATUS AND METHOD - Accommodation design for wavelength and sub-λ paths in a communication network is performed. If sub-λ path accommodation is possible according to search for a wavelength path present in a single-hop logical route, the accommodation in the wavelength path is executed. If sub-λ path accommodation is possible according to search for a wavelength path present in a multi-hop logical route, a logical route is selected based on the wavelength path and the sub-λ path is accommodated in the wavelength path. Additionally, each physical route suitable for the sub-λ path accommodation is searched for. If the route can accommodate a wavelength path set in a single-hop logical route by available wavelength allocation, the sub-λ path is accommodated in the wavelength path. Furthermore, routes in consideration of overlapping of nodes, pipelines, and links and operation rate are selected based on information about the start and end nodes of each of redundant routes. | 2015-12-03 |
20150350026 | INFORMATION SYSTEM, CONTROL SERVER, VIRTUAL NETWORK MANAGEMENT METHOD, AND PROGRAM - A control apparatus, includes a first unit configured to be capable of specifying an identification rule to identify a packet based on a user of a virtual network including a plurality of virtual nodes; and a second unit configured to be capable of sending an instruction to a physical node corresponding to each of the virtual nodes of the virtual network, wherein each of the virtual nodes includes a predetermined network function being capable of providing a first packet operation to the packet, wherein the instruction includes that the physical node provides a second packet operation to the packet so as to emulate the first packet operation. | 2015-12-03 |
20150350027 | NEIGHBOR AWARE NETWORK CLUSTER TOPOLOGY ESTABLISHMENT BASED ON PROXIMITY MEASUREMENTS - A method includes determining, at a first device of a neighbor aware network (NAN), a proximity of the first device to a second device of the NAN. The method further includes determining whether to change a NAN operating mode of the first device based on the proximity. | 2015-12-03 |
20150350028 | ARRANGEMENT FOR REMOTELY MANAGING COMPUTER SYSTEMS - A method for operating a computer management system includes providing management instructions for at least a first managed computer system in an upper layer of a display, and providing a user interface of the first managed computer system in a lower layer of the display. | 2015-12-03 |
20150350029 | REMOTE CONTROL AND MODIFICATION OF LIVE PRESENTATION - A system and method for controlling and modifying a live presentation are disclosed. A server system transmits presentation data to a presentation device for display. While transmitting the presentation data to the presentation device for display, the system receives one or more presentation interactions. The system then transmits each interaction stored in the interaction queue to the presentation device. | 2015-12-03 |
20150350030 | PATTERN-BASED VALIDATION, CONSTRAINT AND GENERATION OF HIERARCHICAL METADATA - A set of metadata defines a hierarchical structure. The metadata is compared against a pattern or sub pattern for the hierarchical structure. Comparison results are generated that show differences between a core structure defined by the pattern and a core structure in the hierarchical data, as well as content defined by a sub pattern, and content in the hierarchical structure. | 2015-12-03 |
20150350031 | ACCESSORY MANAGEMENT SYSTEM USING ENVIRONMENT MODEL - Controllers can be used to control the operation of various accessories. A group of accessories can be organized into an accessory network that can facilitate coordinated control of multiple accessories. The accessory network can be organized according to an environment model that can include a hierarchical representation of a physical environment where accessories are present. The environment model can be synchronized across different controllers that have access to the accessories. | 2015-12-03 |
20150350032 | REMOTE ACCESS FOR MOBILE DEVICES - A new approach is proposed that contemplates systems and methods to support controlling of a remote device via a local host. First, a user interface for interacting with the remote device is displayed on the local host and input from a user to the displayed user interface to remotely perform one or more operations on the remote device is accepted. The input from the user is then transmitted to the remote device over a network and converted to one or more instructions executable on the remote device. The instructions are then executed to perform the operations on the remote device and feedback information of the operations on the remote device is provided back to the local host over the network. The feedback information of the operations on the remote device is then presented to the user via the user interface on the local host. | 2015-12-03 |
20150350033 | DISCRETE, DEPLETING CHIPS FOR OBTAINING DESIRED SERVICE LEVEL CHARACTERISTICS - The present invention provides discrete, depleting chips for allocating computational resources for obtaining desired service level characteristics, wherein discrete chips deplete from a maximum allocated amount but may, in an optional implementation, be allowed to be replenished through the purchase of additional chips. A number of chips are assigned to a requestor/party, known as a business unit (BU), which could be a department, or group providing like-functionality services. In one implementation, the chips themselves could represent base monetary units integrated over time. | 2015-12-03 |
20150350034 | INFORMATION PROCESSING DEVICE, INFLUENCE DETERMINATION METHOD AND MEDIUM - An information processing according to the present invention device includes: a physical configuration selecting unit which selects a physical device to be determined an influence; a logical configuration range specifying unit which specifies a range of a logical configuration related to the physical device; a service level influence specifying unit which determines an achievement state of a service level on the basis of a service level maintained by a service in the logical configuration and a service level value related to the physical device, and specifies a score which is information indicating the degree of an influence given to the service level of the logic configuration on the basis of the achievement state; and a logic information sorting unit which sorts order of displayed information about the logical configurations on the basis of the score. | 2015-12-03 |
20150350035 | MANAGING INFORMATION TECHNOLOGY RESOURCES USING METADATA TAGS - A resource manager is tasked with monitoring and managing information technology (IT) resources in a virtual environment. The IT resources are assigned tags that correspond to conditions that alert the resource manager when to begin actively managing the IT resource. The resource manager may monitor events occurring in the virtual environment that have conditions that match the predefined tags. When such an event occurs, the resource manager identifies an appropriate resource by searching a data store that includes the tags and the corresponding resource. The resource manager then begins to actively manage the resource and assigns the resource to a workload. By tagging the resources, the resource manager does not need to actively manage all of the IT resource in the virtual environment. Furthermore, the tags permit the resource manager to automatically select which resources to actively manage without receiving instructions from a system administrator. | 2015-12-03 |
20150350036 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR INTERCEPTION, QUARANTINE AND MODERATION OF INTERNAL COMMUNICATIONS OF UNCONTROLLED SYSTEMS - Embodiments disclosed herein may intercept, quarantine, and moderate communications internal to an uncontrolled system. An example of an uncontrolled system may be a web application associated with a social networking site. In accessing the social networking site, a user may type in a message. An instance of the uncontrolled system running on the user's device may prepare a request containing the message. Some embodiment disclosed herein may determine that the message is subject to moderation, intercept the request, and place the message in a queue. This determination may be based on the destination of the request as well the type of the message. Some embodiments may reconstruct the original request for resubmission. If the session is expired, some embodiments may log in for the user and resubmit the reconstructed request. Some embodiments may wait for the next time the user logs in to resubmit the reconstructed request. | 2015-12-03 |
20150350037 | COMMUNICATION DEVICE AND DATA PROCESSING METHOD - A packet reception state monitoring unit calculates a target stored data number as a target number of audio packets stored in a memory based on the variation in the reception intervals of audio packets, and a reproduction control unit controls the audio reproduction speed in accordance with the difference between the target stored data number and a memory-stored data number. When the memory-stored data number is smaller than the target stored data number, reproduction control is performed in a low-speed reproduction mode at a lower speed than a regular reproduction speed. When the memory-stored data number is larger than the target stored data number, reproduction control is performed in a high-speed reproduction mode at a higher speed than the regular reproduction speed. A reproduction speed changing process is performed, with hysteresis being given to transitions of the difference between the memory-stored data number and the target stored data number. | 2015-12-03 |
20150350038 | METHODS OF GENERATING COMMUNITY TRUST VALUES FOR COMMUNITIES OF NODES IN A NETWORK AND RELATED SYSTEMS - A method of evaluating trust in a network may include defining a community of nodes of the network from a larger set of nodes of the network. A respective individual trust value may be generated for each node of the community of nodes, and a community trust value may be generated based on the individual trust values of nodes of the community. Related systems are also discussed. | 2015-12-03 |
20150350039 | DEEP PACKET INSPECTION (DPI) OF NETWORK PACKETS FOR KEYWORDS OF A VOCABULARY - An aspect of the present disclosure provides deep packet inspection (DPI) of network packets for keywords of a vocabulary. In one embodiment, a mapping specifying association of respective keywords to corresponding unique pattern codes is maintained, with each pattern code being shorter in length compared to the corresponding keyword and being computed based on a formula. Upon receiving a network packet, a token (containing a sequence of characters) present in the network packet is first identified and the formula then applied to the identified token to generate a token code. The token is determined to match a specific keyword when the token code equals the pattern code corresponding to the specific keyword in the mapping. | 2015-12-03 |
20150350040 | ENABLING AN EARLY RESPONSE TO A DISEASE BASED ON DATA ANALYTICS - Enabling an early response to a disease based on data analytics. This invention relates to effective management of diseases and more particularly to effective management of disease by enabling an early and appropriate response to the disease using data analytics. The system comprises of a disease analytics platform connected to a plurality of data sources and at least one stakeholder. | 2015-12-03 |
20150350041 | Protocols & Mechanisms of Comm Between Live Production Server and Mobile or Remote Clients - Protocols and mechanisms of communication between live production servers and mobile or remote clients are disclosed herein. Implementation of these protocols and mechanisms relies on certain methods to process and answer requests made between the clients and the servers. The essential practice of these protocols and mechanisms is the design of software which allows a video producer to use a thin client to control activity from any location instead of controlling these activities manually while sitting in front of video monitors. | 2015-12-03 |
20150350042 | METHODS AND SYSTEMS FOR ANALYZING DECOMPOSED UNCORRELATED SIGNAL IMPAIRMENTS - Method and systems are described for estimating signal impairments, in particular jitter that includes uncorrelated, non-periodic signal impairments. One system may take the form of an oscilloscope. The estimates may take the form of a probability density function (PDF) for uncorrelated signal impairments that has been modified to replace low probability regions with a known approximation and an extrapolation of the known approximation. | 2015-12-03 |
20150350043 | METHODS AND ARRANGEMENTS FOR CHECKING CONNECTIVITY AND DETECTING CONNECTIVITY FAILURE - A method is presented for connectivity checking and detection of connectivity failure, based on a modified Ethernet ARP address resolution mechanism to detect broken connectivity on physical, data-link and network layer between a first and a second node. The detection mechanism uses Periodical Gratuitous ARP messages (PGARP). PGARP messages are sent by a first node, the sender host or Issuer. On the other side of a data path is a second node, receiver host or Listener configured to detect lost connectivity by means of missing PGARP messages. The process on the Listener then informs subscribing services, host local, or remote, about the state of the connectivity. | 2015-12-03 |
20150350044 | Cloud-based Infrastructure for Determining Reachability of Services Provided by a Server - Technologies are described for using a cloud-based computer system to access services provided by a particular server over public Internet Protocol (IP) connections. In one aspect, a system includes a first computer system configured to run the particular server to provide a first service over public IP connections; and a second computer system configured to run a second server, where the particular server transmits, over public IP connections, a request for the second server to check the first service, where, responsive to receipt of the request for the second server to check the first service, the second server provides, to the particular server over public IP connections, information relating to whether the first service is available over public IP connections, and where the particular server updates an availability status of the first service over public IP connections based on the information provided by the second server. | 2015-12-03 |
20150350045 | METHOD AND SYSTEM FOR PROCESSING BROWSER CRASH INFORMATION - The disclosure discloses a method and a system for processing browser crash information. The method comprises: receiving browser crash status information uploaded when a browser crashes; according to the browser crash status information, generating crash identification information to indicate whether allowing the browser to upload a crash data packet or not; feeding the crash identification information back to the browser; if the crash identification information indicates allowing the browser to upload the crash data packet, receiving crash information including the crash data packet uploaded by the browser; starting up an automatic crash data packet analyzing program to analyze the crash data packet; and sending the analyzing result of the crash data packet back to the browser uploading the crash data packet. The disclosure provides a solution at cloud system level to specifically collect, process, analyze and identify the browser crash information. | 2015-12-03 |
20150350046 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes: a reception unit that sequentially receives a plurality of UDP packets sequentially transmitted in a certain data size and at a certain time interval; a first and second calculation units that acquire a plurality of reception time intervals each between two UDP packets successively received by the reception unit, and calculate evaluation values for evaluating a delay state of the reception time intervals; a determination unit that combines the evaluation value calculated by the first calculation unit and the evaluation value calculated by the second calculation unit, and determines reliability of the evaluation values based on at least the two evaluation values; and a bandwidth information outputting unit that outputs bandwidth information according to a bit rate determined by the certain data size and the certain time interval on the basis of the reliability of the evaluation values determined by the determination unit. | 2015-12-03 |
20150350047 | OPTIMIZATION OF COMPUTING RESOURCES THROUGH MONITORING AND MANIPULATING AVAILABILTY - In a method of managing a computing network, an expected behavior of a host is determined. The host is associated with a network resource, and is configured to be switched between active and inactive states. When the host is in the inactive state, a message is transmitted via the network on behalf of the host based on the expected behavior thereof such that the host appears to be in the active state. Related computer systems and computer program products are also discussed. | 2015-12-03 |
20150350048 | User Defined Objects for Network Devices - Systems and methods are provided herein. An exemplary servicing node may include: an interface to a data network, the interface coupled to an object machine; and the object machine, the object machine: receiving a data packet from the data network using the network interface, the data packet comprising at least one of a destination address, a destination port number, and an application protocol; determining a condition associated with the at least one of the destination address, the destination port number, and the application protocol; identifying a program name using the condition; executing a program using a name table, the name table linking each of a plurality of program names to a respective program, the executing comprising getting an instruction of the program, the instruction including object information. | 2015-12-03 |
20150350049 | METHOD AND DEVICE FOR GENERATING CNM - The present invention discloses a method and a device for generating a CNM, so as to improve a processing rate of a congestion problem. The method includes: monitoring a data volume of an output queue at a congestion point CP; monitoring a rate of a data stream corresponding to at least one congestion reaction point RP connected to the CP, and when the data volume of the output queue at the CP reaches a congestion threshold, obtaining identification information of a data stream that currently has a highest rate; generating a CNM for the data stream having the identification information, and sending the CNM to an RP corresponding to the identification information, so that the RP reduces, according to the CNM, the rate of the data stream corresponding to the RP. | 2015-12-03 |
20150350050 | METHOD AND SYSTEM FOR STORAGE TRAFFIC MODELING - A method and system for storage traffic modeling in a Software Defined Storage (SDS) is disclosed. The method includes the steps of: collecting observed values of at least one performance parameter in a period of time from a storage node; learning a trend structure of the at least one performance parameter varying with time from the observed values; and providing a predicted value of one performance parameter in a particular point in time in the future. The storage node is operated by SDS software. The trend structure is adjusted based on observed values collected after the period of time. The predicted value is an output of the trend structure which has been adjusted. | 2015-12-03 |
20150350051 | Quickly locating devices - A set of computing devices are networked together. Each device maintains data about the other computing devices in the set, namely, a time and location of a last successful connection between the device and one or more of the other devices. The data at a device is updated as computing devices in the set move out of communication range with one another, for example (a) when the particular computing device itself loses contact with one of the other computing devices in the set, or (b) when the particular computing device receives a notification from one of the other computing devices that such other computing device has lost contact with a computing device that the other computing device had been in contact with. The connection table data is then used to locate a lost computing device, or the identity of a device that has such information in its connection table. | 2015-12-03 |
20150350052 | SYSTEM AND METHOD FOR INFERRING TRAFFIC LEGITIMACY THROUGH SELECTIVE IMPAIRMENT - Described is a system and method for determining a classification of an application that includes initiating a stress test on the application, the stress test including a predetermined number of stress events, wherein the stress events are based on a network impairment. A response by the application to each stress event is identified and the application is classified as a function of the response into one of a first classification and a second classification, the first classification indicative of a normal application and the second classification indicative of an undesired application. If, the application is in the second classification, a network response procedure is executed. | 2015-12-03 |
20150350053 | METHOD AND SYSTEM FOR POLICY-BASED CONTROL IN A DISTRIBUTED NETWORK - A method and a system is disclosed for policy-based control of a communication network having a distributed architecture, including at least one heterogeneous communication network, which network elements provide for registering events, sending notifications of the occurrence of events and enforcing a policy upon said events if certain conditions are met, wherein the PEP serves as a server towards a PDP, being a client. By applying the method and system of the invention, multiple Stakeholders, having each at least one Policy Decision Point, can influence policy enforcements carried out at a Policy Enforcement Point. | 2015-12-03 |
20150350054 | Probing a Network - A method is presented of probing a network using probing with a probe packet pair, the pair comprising a first probe packet (L | 2015-12-03 |
20150350055 | SHARED RESOURCE CONTENTION - Contention for shared resources in a shared resource environment may be determined based on measurements from a probe running in the shared resource environment. The measurements can be compared to benchmarks, and a contention value may be determined based on the comparison. | 2015-12-03 |
20150350056 | ROUTING SWITCH DEVICE - The present disclosure provides a method and device for use by a routing switch device. In response to a determination to switch the routing switch device to switch from a conventional mode to an OpenFlow mode the following operations are performed. Table items of a forwarding table in the conventional mode are converted to flow table items in the OpenFlow mode. The converted flow table items are stored in a flow table of the routing switch device. Processing a received data packet based, at least in part, on the converted flow table items stored in the flow table. | 2015-12-03 |
20150350057 | SWITCHLESS NETWORK TOPOLOGY SYSTEM FOR PARALLEL COMPUTATION AND METHOD THEREOF - A switchless network topology system for parallel computation is provided. The switchless network topology system includes a plurality of nodes, of which one node communicates with another node according to a routing table, where the creation of the routing table includes the following steps: calculating a shortest path of transmission paths between two nodes of the nodes, where the shortest path has no relay node or at least one relay node between the two nodes; removing the transmission path between a starting node and a first relay node of the shortest path and identifying another shortest path between the starting node and the destination node; repeating the step of removing and identifying to identify other shortest paths between the starting node and the destination node; and creating the routing table based on every shortest path between any starting node and any destination node of the nodes. | 2015-12-03 |
20150350058 | CALCULATING A ROUTE - According to an example, in a method for calculating a route, a first network device may add a protocol attribute supported by a link to a link state protocol data unit (LSP) of the first network device according to a protocol attribute supported by a port of the first network device and a protocol attribute supported by a port of a neighbor network device when establishing an adjacency, and may flood the LSP. The first network device may receive a LSP from a neighbor network device, parse a protocol attribute supported by a link contained in the received LSP, record the protocol attribute supported by the link contained in the received LSP in local network topology information, to obtain updated network topology information. And the first network device may calculate a route according to the updated network topology information. A network device and a computing device may calculate a route. | 2015-12-03 |
20150350059 | ENHANCED PROCEDURE TO COMPUTE LFAS WITH IGP MAX METRIC - A method and implementing system calculates a loop free alternative (LFA) next hop as a backup for a primary path next hop for an interior gateway protocol (IGP). The method enables consideration of the LFA next hop where a link to the next hop has a reverse cost that has a maximum value. The method includes selecting a next candidate next hop from a set of candidate next hops in the network, checking whether a link to the next candidate next hop is an administratively allowable link, and checking whether the link has a maximum forward cost. The method further checks whether the link is bi-directional and computes the LFA using the next candidate next hop where the link is administratively allowable link, where the link does not have a maximum forward cost and where the link is bi-directional without consideration of reverse cost of the link. | 2015-12-03 |
20150350060 | Simplified Approach to Verify LFAS in Deployment - A method and system are provided to install a loop free alternative (LFA) next hop as a backup for a primary path next hop for an interior gateway protocol (IGP). The method enables testing of the LFA next hop to ensure proper handling of data forwarding on the LFA. The method includes receiving a trigger message from an administrative module indicating a switch to the LFA next hop the message including a prefix and an interface. A check is made whether a set of primary path next hops of the prefix have been exhausted. A next primary path next hop is selected from the set of primary path next hops of the prefix. A check is made whether the next primary path next hop matches the interface. The next primary path next hop is replaced by installing the LFA next hop into a global routing information base. | 2015-12-03 |
20150350061 | ALTERNATE METHOD TO GIVE OPERATORS FLEXIBILITY TO CHOOSE LFAs - The method and system to computes an LFA next hop as a backup for a primary path next hop that enables an administrator to control LFA selection for a given destination node using a tag and a weight. The method includes checking whether an interface of a next candidate node has a tag with a tag value matching a tag value of a primary SPF path for the destination node. The method further includes checking whether the destination node has any LFA, checking whether a stored tag differs from the tag value of the primary SPF path, and checking whether the interface of the next candidate node is preferred based on a comparison of a weight values, and replacing a stored LFA for the destination node with the next candidate node. Where conditions are met a stored LFA is replaced with the next candidate node. | 2015-12-03 |
20150350062 | EFFICIENT IDENTIFICATION OF NODE PROTECTION REMOTE LFA TARGET - A method is implemented by a network device to improve efficiency of computing a node-protecting remote loop-free alternate (LFA) in a network topology graph. The method computes a reverse shortest path first (SPF) algorithm rooted at the primary next hop node, where the reverse SPF algorithm rooted at the primary next hop maintains a reverse path of a shortest path computed by the reverse SPF algorithm rooted at the primary next hop node. The method selects a node that is in both the source node's node-protecting extended P-space that protects the primary next hop node and the primary next hop node's link-protecting Q-space that protects the S-E link. The method traverses the reverse path of the shortest path computed by the reverse SPF algorithm rooted at the primary next hop node starting from the selected node and towards the primary next hop node and assigns the selected node as a node-protecting remote LFA for each S-E destination node visited along the traversal of the reverse path that has not been assigned a node-protecting remote LFA. | 2015-12-03 |
20150350063 | Routing Data In A Network - A method and system is described for delivering data streams in a network comprising devices connected to the network via adapters and wherein at least some of the devices are programmed to indicate priority of a data stream using priority parameter values of respective priority parameter types. One device in the network operates as a controller and the accompanying controller adapter is configured to perform priority enforcement on data streams according to all priority parameter types used within the datastreams in the network. A controller is also described and the controller can be a gateway configured to allow data streams into and out of the network. The method, system and controller find particular application in networks based on shared network segments, for example power line communication or networks based on coaxial cable. | 2015-12-03 |
20150350064 | ROUTE SETTING DEVICE AND ROUTE SETTING METHOD - A route setting device includes: a storage in which routing information is stored; and a processor configured to execute a procedure, the procedure including: selecting a network device among a plurality of network devices forming a network over which a signal including transmission source information and destination information is transmitted, the network device changing at least one of the transmission source information and the destination information included in the signal; categorizing the network device based on a type of the changed information; and generating the routing information according to a result of the categorizing, wherein the route setting device sets the generated routing information to the network device. | 2015-12-03 |
20150350065 | COMMUNICATION DEVICE, COMMUNICATION SYSTEM, AND COMMUNICATION METHOD - An RB includes a grouping unit that groups VLANs in a TRILL network into patterns by using the low 3 bit sequence of a VLANID; a calculating unit that calculates the number of redundant paths with equal costs among physical paths in the TRILL network; and a sorting unit that sorts the patterns of VLANs, which are to be assigned to the physical paths, into the groups that are equivalent to the number of redundant paths according to a predetermined order. The RB includes an assignment table for managing, with respect to each of the groups, an assignable output destination path among the physical paths. The RB includes a control unit that refers to the assignment table, determines the output destination path for each of the groups, and collectively assigns all the VLANs of all the patterns of an appropriate group to the output destination path of the group. | 2015-12-03 |
20150350066 | APPARATUS AND METHOD FOR TRANSMITTING SATELLITE TELECOMMAND - An apparatus and a method for transmitting a telecommand to a satellite are disclosed, wherein the satellite telecommand transmitting apparatus may include a transmitter to obtain a telecommand from a transmission command list and transmit the obtained telecommand to a satellite, a verifier to verify whether transmission of the telecommand is successful, and a processor to generate a retransmission telecommand with respect to the telecommand by referring to retransmission information on each telecommand stored in a database and prepare a retransmission command list including the generated retransmission telecommand, when a result of the verifying indicates a failure to transmit the telecommand. | 2015-12-03 |
20150350067 | SYSTEM AND METHOD OF MINIMIZING PACKET LOSS DURING REDUNDANT PAIR SWITCHOVER - Systems, methods, architectures, mechanisms and/or apparatus to manage routing associated with a redundant pair of nodes during a switchover from an old active node to a new active node by establishing a tunnel there between to convey traffic routed to the old active node prior to routing protocol convergence at the new active node. | 2015-12-03 |
20150350068 | CLIENT APPLICATIONS COMMUNICATING VIA A USER TUNNEL - Methods, systems, and apparatuses are provided for managing communication of data to/from a device. For example, multiple client applications running on the device can communicate to a second device through a same primary socket connection. A mux module can receive data from two different client applications over respective client connections. The received data can include header information identifying the second device as the destination. When the first data from a first client application is received at the mux module, the primary socket connection can be created; and when the second data from a second client application is received, the existing primary socket connection can be identified and re-used. The primary socket connection can be managed by a controller of the mux module. | 2015-12-03 |
20150350069 | NETWORK PACKET ENCAPSULATION AND ROUTING - Methods, systems, and apparatus are described for network encapsulation and routing. In one aspect, a method includes receiving, from source network and at an edge device a first network packet including a first inner header including i) a first source address, and ii) a first destination address; selecting a source network identifier for the source network from a plurality of routable network identifiers; encapsulating the first network packet within a first encapsulation packet; routing the first encapsulation packet to the destination server; receiving, from the destination server, a second encapsulation packet; extracting the second network packet from the second encapsulation packet; and routing the second network packet to the source network. | 2015-12-03 |
20150350070 | APPARATUS AND METHOD FOR USE IN A SPACEWIRE-BASED NETWORK - An apparatus for use in a SpaceWire-based network is configured to send and receive data packets, and process data included in a received data packet. A header of the received data packet is stored in a buffer whilst the data is being processed, a processed data packet including the stored header and the processed data is generated, and the processed data packet is transmitted. The header of the received data packet may be modified, and the modified header attached to the processed data to generate the processed data packet. When the data packet is received via a first port, the processed data packet may be transmitted via the first port, or may be transmitted via a second port. | 2015-12-03 |
20150350071 | SELECTING AN INTERFACE FOR PACKET ROUTING BASED ON APPLICATION-LAYER DATA - The disclosed embodiments relate to a system for selecting an interface for routing an outbound packet. During operation, the system receives an outbound packet to be routed to a destination address. Next, the system obtains application-layer data associated with the outbound packet, including one or more of a process identifier, an application identifier and a user identifier. The system then selects an interface through which to route the outbound packet based on the application-layer data, and uses the selected interface to route the outbound packet. | 2015-12-03 |
20150350072 | Apparatus and Method for Transmitting Data - An apparatus ( | 2015-12-03 |
20150350073 | Method And Apparatus For Improving Forwarding Performance Of Chip - A method and apparatus for improving forwarding performance of a chip are disclosed. The method includes: when a chip receives a message, judging whether the message is a protocol message required to be processed, if the message is the protocol message required to be processed, performing MAC learning, and if the message is not the protocol message required to be processed, determining whether to perform learning after performing calculation according to a current actual time value of the chip and a preset empirical value. The apparatus includes: a first judgment module and a second judgment module. With the method and apparatus of the embodiments of the present document, an MAC learning intensity of the chip can be relieved to a great extent, thereby improving the forwarding performance of the chip. | 2015-12-03 |
20150350074 | PACKET DATA COMMUNICATIONS - An internet packet comprises a header field, the header field including a field identifying a source address of the internet packet, a field identifying the destination address of the internet packet and a next header field identifying whether an extension header follows the header and a type of the extension header. The extension header indicates a hop-by-hop option header, the hop-by-hop extension header including a router alert option header type indicating that the extension field is optional for a router to read, and a field providing information for a gateway support node of a packet radio system network. A gateway support node is thereby provided with information, which may be required for example to support a mobile internet protocol (IP). However, by providing the router alert option field, a router is not required to read the remainder of the hop-by-hop option field. As a result, a reduction in the performance of the router in routing internet packets, which may have been incurred if the router was required to read all the hop-by-hop extension field can be limited. | 2015-12-03 |
20150350075 | DYNAMIC LOOP DETECTION AND SUPPRESSION - Systems and methods are described for effectively managing and maintaining a communication network by monitoring communications to detect a loop condition, and effectively route the communication to one or more destinations known to reduce or eliminate the occurrence of a looping condition. In one embodiment one or more computing devices may be configured to detect or assign an identifier to an incoming network communication, retrieve routing information from a routing database identifying one or more destinations to route the communication. The one or more computing devices may be further configured to compare the routing information with the identifier to determine an appropriate destination to route the communication. | 2015-12-03 |
20150350076 | RAM, NETWORK PROCESSING SYSTEM AND TABLE LOOKUP METHOD FOR RAM - The disclosure provides an RAM, a network processing system and a table lookup method for the RAM. The RAM is divided into at least two virtual memory libraries, a same service table is stored in the at least two virtual memory libraries, and a proper virtual memory library is determined through the computation of a network memory to be accessed, so that the table lookup speed of the RAM is improved, the access traffic pressure is effectively reduced for the RAM, and the network forwarding performance is improved. Moreover, a same service table can be stored in the virtual memory libraries of the RAM, the table lookup speed of the RAM is increased maximally, and the network processor can compute the virtual memory library address information through hash computation. | 2015-12-03 |
20150350077 | Techniques For Transforming Legacy Networks Into SDN-Enabled Networks - Techniques for transforming a legacy network into a Software Defined Networking (SDN) enabled network are provided. In one embodiment, a route server can receive one or more routing protocol packets originating from a network device, where the one or more routing protocol packets are forwarded to the route server via a cross connect configured on a network router. The route server can further establish a routing protocol session between the route server and the network device based on the one or more routing protocol packets, and can add a routing entry to a local routing table. Upon adding the routing entry, the route server can automatically invoke an application programming interface (API) for transmitting the routing entry to a Software Defined Networking (SDN) controller. | 2015-12-03 |
20150350078 | FLOW-DRIVEN FORWARDING ARCHITECTURE FOR INFORMATION CENTRIC NETWORKS - A flow-driven forwarding strategy includes receiving an Interest packet, where the interest packet includes a flow state indicator. The content associated with the Interest packet is checked to determine whether that content is locally stored. Another check is performed to determine whether any previously received Interest packet has requested the content. In response to the content not being locally stored and no related Interest packet has been previously received, the flow state indicator is checked in the Interest packet. In response to the flow state indicator indicating that the Interest packet is associated with an active flow, forwarding information is extracted from a flow state table if a hop count has a value of zero or from the Interest packet if the hop count has a value greater than zero. The Interest packet is then forwarded to a next hop in accordance with the forwarding information. | 2015-12-03 |
20150350079 | METHOD OF MESSAGE ROUTING FOR A DISTRIBUTED COMPUTING SYSTEM - Message routing is implemented by a computer device. A global ring is connected via a network, wherein the global ring is associated with a distributed hash table (DHT) and includes a plurality of nodes which are divided exclusively into groups in advance. A first group of nodes is determined from the plurality of grouped nodes. Using the DHT for a message to be routed, a first node is located from the first group of nodes, as a routing destination. | 2015-12-03 |
20150350080 | DETERMINING CAPACITY OF VIRTUAL DEVICES IN A VOICE OVER INTERNET PROTOCOL SYSTEM - A method for determining a capacity of a virtual machine configured as a telephony device in a VoIP system includes determining a resource configuration of the virtual machine including a number of CPU cores, a CPU clock rate, or a memory size. The virtual machine may be configured as a trunk, conference bridge, phone switch, session border controller, router, or another device in the VoIP system. The method also includes sending the resource configuration from the virtual machine to a VoIP system configuration application. The VoIP system configuration application may be an application running on the virtual machine or an application running on a server separate from the virtual machine. At the VoIP system configuration application, a capacity of the virtual machine is determined based on the resource configuration. The capacity determines a number and type of telephony features supported by the telephony device in the VoIP system. | 2015-12-03 |
20150350081 | VIRTUAL NETWORK DATA CONTROL WITH NETWORK INTERFACE CARD - Embodiments relate to managing data flows through a virtual network. An aspect includes receiving, by a network interface card (NIC) connected to a hypervisor of a source computer, flows of data packets from one or more virtual machines managed by the hypervisor. The aspect includes running, by the NIC, an overlay network protocol to encapsulate the data packets, and to manage the flow of data through tunnels for the virtual network to a destination computer based on the overlay protocol, the tunnels transmitting the data packets through an underlying physical network underlying the virtual network. | 2015-12-03 |
20150350082 | SYSTEMS AND METHODS FOR THROTTLING PACKET TRANSMISSION IN A SCALABLE MEMORY SYSTEM PROTOCOL - A method may include transmitting, via a processor, a plurality of packets to a receiving component, such that the plurality of packets corresponds to a plurality of data operations configured to access a memory component. The plurality of packets is stored in a buffer of the receiving component upon receipt. The method may also include determining, via the processor, whether an available capacity of the buffer is less than a threshold decreasing a transmission rate of the plurality of packets when the available capacity is less than the threshold. | 2015-12-03 |
20150350083 | SYSTEMS AND METHODS FOR ALLOCATING NETWORK BANDWIDTH ACROSS ACCESS MODULES - A telecommunication system uses a dynamic bandwidth allocation (DBA) algorithm based on current load conditions for controlling transmissions to a plurality of access modules of an access node in order to achieve a fair allocation of network bandwidth at the access node. As an example, access modules at an access node communicate via a control channel with dynamic bandwidth allocation (DBA) logic that receives load information from each of the access modules. Using such load information, the DBA logic dynamically controls the upstream data rates so that a fair allocation of network bandwidth is achieved across all of the access modules. Specifically, the data rates are controlled such that packet flows for services of the same class achieve the same or similar performance (e.g., average data rate) regardless of which access module is receiving each respective packet flow. | 2015-12-03 |
20150350084 | VIRTUAL NETWORK DATA CONTROL WITH NETWORK INTERFACE CARD - Embodiments relate to managing data flows through a virtual network. An aspect includes receiving, by a network interface card (NIC) connected to a hypervisor of a source computer, flows of data packets from one or more virtual machines managed by the hypervisor. The aspect includes running, by the NIC, an overlay network protocol to encapsulate the data packets, and to manage the flow of data through tunnels for the virtual network to a destination computer based on the overlay protocol, the tunnels transmitting the data packets through an underlying physical network underlying the virtual network. | 2015-12-03 |
20150350085 | ROUTE DETERMINATION APPARATUS AND TRANSFER ROUTE DETERMINATION METHOD - The processor obtains a process time, which is a time taken for processing a control message when the control device requests that a target processing device, selected from among the plurality of processing devices, process a control message. When the process time has become longer than a first threshold, the processor determines which of a first and a second congestion has occurred based on whether the process time has become longer than a second threshold, which is greater than the first threshold. The first congestion occurs in the transfer devices used for a communication between the control device and the target processing device. The second congestion occurs in the target processing device. The network connection device transmits a request message requesting that a transfer route for which it has been determined that the control message is not processed in a device in which the congestion has occurred be set. | 2015-12-03 |
20150350086 | Network Congestion Management Systems and Methods - Systems, methods and software useful for overcoming network congestion problems including head-of-line blocking issues and other network congestion problems. In certain aspects, flow control mechanisms implemented in a switch device or other network device manage buffer and system level resources using a scheduler to control the amount of data requested from a local SAN fabric. Switches and other network devices configured according to the present invention monitor each individual SCSI task, and are configured to apply flow control measures to each active session when buffering resources become scarce, such as when buffering data for a slower-speed WAN link or TCP/IP based interconnects of any speed. | 2015-12-03 |
20150350087 | CONSISTENT HASHING FOR NETWORK TRAFFIC DISPATCHING - A method is provided that uses a consistent hashing technique to dispatch incoming packets in a stable system prior to adding of a node. The method uses a hash table and assigns hash buckets in the table to each network node. A set of fields in each incoming packet is hashed and is used to identify the corresponding hash bucket. The packets are then dispatched to the network nodes based on the nodes' hash buckets. During an observation period, the method identifies the ongoing sessions by creating a bit vector table that is used to identify the old and new sessions during a re-dispatching period. The method uses the consistent hashing method and the probabilistic method dispatch the incoming packets such that each packet that belongs to an old session is dispatched to the same old node that has been processing the other packets of the session. | 2015-12-03 |
20150350088 | SELECTION OF DATA OFFER - According to an example embodiment of the present invention, there is provided an apparatus configured at least to determine a maximum data quality that is to be offered to a user equipment, compile an offer comprising at least an identifier of a first data item, a quality level of the first data item being at most the maximum data quality, wherein the maximum data quality is determined at least in part based on an access token received from the user equipment. | 2015-12-03 |
20150350089 | METHOD AND APPARATUS FOR FLEXIBLE AND EFFICIENT ANALYTICS IN A NETWORK SWITCH - Embodiments of the present invention relate to a centralized network analytic device, the centralized network analytic device efficiently uses on-chip memory to flexibly perform counting, traffic rate monitoring and flow sampling. The device includes a pool of memory that is shared by all cores and packet processing stages of each core. The counting, the monitoring and the sampling are all defined through software allowing for greater flexibility and efficient analytics in the device. In some embodiments, the device is a network switch. | 2015-12-03 |
20150350090 | POLICY IMPLEMENTATION OVER LMR AND IP NETWORKS - A communication system is made up of a number of LMR and IP bearers including LTE and P25. The information flowing over the integrated system is managed according to the situational context of the user. A policy driven approach is described that uses user context as its inputs and converts this into actions that preferentially improves the communication for the user particularly as they move between the available networks. | 2015-12-03 |
20150350091 | System and method for concurrently sharing GSM coverage by mobile operators and for implementing local switching without impact on core networks - A System to perform concurrent GERAN sharing with local switching and traffic shaping, comprising BSC-proxy (proxy base station controller), being connected as a regular BSC (base station controller) to one or multiple PLMNs (public land mobile networks); plurality of BSCs, geographically co-located with BTSs (base transceiver stations) and interfaced to BSC-proxy by A-over-IP and traffic shaping software; and optional signaling probes for GSM MAP (mobile application part). Methods providing concurrent sharing of radio access network and local switching connectivity without involving mobile network cores. | 2015-12-03 |
20150350092 | DISTRIBUTED API PROXY SYSTEM AND APPARATUS AND METHOD FOR MANAGING TRAFFIC IN SUCH SYSTEM - Disclosed are a distributed application programming interface (API) proxy system and an apparatus and method for managing traffic in the system. The apparatus for managing API traffic includes a traffic information collection unit configured to collect traffic information from a plurality of API proxies distributed to a plurality of networked apparatuses such that physical resources are abstracted to provide access to the abstracted physical resources and a traffic optimization unit configured to generate control information for decreasing communication traffic of at least one of the plurality of API proxies based on the collected traffic information and deliver the generated control information to the plurality of API proxies. | 2015-12-03 |
20150350093 | POLICY SERVER, POLICY ENFORCEMENT DEVICE, AND VARIOUS METHODS FOR DYNAMICALLY EXCLUDING ACTIVE SERVICE ADD-ONS FROM BEARER THROTTLING FOR USER TERMINALS - A policy server (e.g., Policy and Charging Rules Function), a policy enforcement device (e.g., Policy and Charging Enforcement Function, Traffic Detection Function), and various methods are described herein for dynamically excluding active service add-ons from bearer throttling for user terminals. The active service add-on indicates that bandwidth of the service traffic associated with a corresponding service is to be limited to a defined value after the user terminal consumes a defined amount of data associated with the corresponding service during a defined time period. The bearer throttling entails limiting the bearer bandwidth to the defined value after the user terminal has consumed the defined amount of data during the defined time period. | 2015-12-03 |
20150350094 | METHOD AND SYSTEM OF SETTING NETWORK TRAFFIC FLOW QUALITY OF SERVICE BY MODIFYING PORT NUMBERS - In one exemplary aspect, a method of managing computer network traffic flow quality of service includes the step of configuring a configurable network device to provide a specified quality of service to a data packet with a specified quality of service configuration based on a quality of service classification port number in a data packet header of the data packet. At the source node, a data packet is generated. At the source node, replacing the destination port number in the data packet header with a quality of service classification port number. At the source node, the destination port number is included in an options field of the data packet's header. The data packet is communicated to the configurable network device. At the destination node, receiving the data packet, replacing the quality of service classification port number with the original destination port number, and forwarding the packet to a destination process. | 2015-12-03 |
20150350095 | Cloud-Based Network Tool Optimizers For Server Cloud Networks - Network tool optimizers for server cloud networks and related methods are disclosed. In part, master filters are defined to segregate and control user traffic, and user filters are defined to forward the user traffic to cloud-based network tools or tool instances. A master user interface and user interfaces for each user are provided so that the master filters and user filters can be defined and managed. A filter rules compiler within the cloud-based network tool optimizer then combines the master filters with the user filters, resolves conflicts in favor of the master filters, and generates filter engine rules that are applied to filter engines within the network tool optimizer for the cloud network. The filter engines then forward packets received at input ports for the network tool optimizer to output ports for the network tool optimizer that are coupled to network tools or tool instances within the cloud network. | 2015-12-03 |
20150350096 | 2.5 GBPS/5GBPS ETHERNET COMMUNICATIONS OVER A FULL DUPLEX COMMUNICATION CHANNEL - Transceiver architecture includes circuitry and a method to transmit and receive high speed WAP data over lower speed cabling such as Cat5e. The method begins by measuring quality of a wired bi-directional communications channel. The method continues by selecting a maximum possible data transmission rate over the wired bi-directional communications channel for the measured quality level and when the maximum possible data transmission rate is a reduced data transmission rate less than a maximum data transmission rate of the transceivers, proportionally adjusting clock rates of circuit elements of the first and second transceiver to transfer the data at the reduced data transmission rate. The method includes dividing data frames of the data to be transmitted N times, where N=number of layers of at least a portion of identical transceiver processing circuitry which is connected to twisted wiring pairs of the wired bi-directional communications channel. | 2015-12-03 |
20150350097 | DATA TRANSMISSION DEVICE, DATA TRANSMISSION METHOD, AND PROGRAM THEREFOR - A data transmission device, method, and program therefor that effectively increase throughput even when a delay increase occurs due to a cause other than congestion in the network. The data transmission device ( | 2015-12-03 |
20150350098 | IMPLEMENTATION METHOD FOR APPLICATION FOR SPEAKING RIGHT OF LTE-BASED BROADBAND TRUNKING SYSTEM - A method for implementing the application for speaking right of a Long Term Evolution (LTE)-based broadband trunking system, a Mobility Management Entity (MME), a network subsystem, a broadband wireless access subsystem and the LTE-based broadband trunking system are disclosed. The method includes: the broadband wireless access subsystem sending a trunking speaking right update request to the network subsystem, receiving the trunking speaking right update accept message returned by the network subsystem, and sending the trunking speaking right update accept message to a speaking right seizing terminal; and the broadband wireless access subsystem receiving the speaking right occupation prompt message sent by the network subsystem, and sending the trunking speaking right occupation prompt message and updated configuration information via a multicast control channel of an enhanced Multimedia Broadcast Multicast Service (eMBMS). | 2015-12-03 |
20150350099 | Controlling A Jitter Buffer - Apparatus and methods for controlling a jitter buffer are described. In one embodiment, the apparatus for controlling a jitter buffer includes an inter-talkspurt delay jitter estimator for estimating an offset value of the delay of a first frame in the current talkspurt with respect to the delay of a latest anchor frame in a previous talkspurt, and a jitter buffer controller for adjusting a length of the jitter buffer based on a long term length of the jitter buffer for each frame and the offset value. | 2015-12-03 |
20150350100 | MULTI-STREAM SCHEDULING AND REQUESTS - An embodiment of a method of requesting a plurality of media streams can include, as performed by a computing device, receiving a control input to control a playback function of at least one of the plurality of media streams, determining a download bandwidth between the computing device and a media source on a network, classifying the at least one of the plurality of media streams based on the control input and total download bandwidth, and sending a plurality of requests for the plurality media streams over a single connection to the media source, wherein at least one of an order or a content of the requests is based on the classification. The sending of the media stream requests can utilize at least one of a server-side protocol for multiplexing media streams over a single connection or one or more of HTTP pipelining or HTTP range requests over a single connection. | 2015-12-03 |
20150350101 | CUSTOMIZED CONFIGURATION OF CLOUD-BASED APPLICATIONS PRIOR TO DEPLOYMENT - A cloud computing environment consists of a cloud deployment platform with an application management server executing thereon, and a cloud management server configured to manage a plurality of virtual machines deployed in a cloud infrastructure. When a cloud-based application is deployed to the cloud infrastructure, a deployment plan for the cloud-based application is read, where the deployment plan comprises a first plurality of tasks to be executed in the cloud infrastructure. A determination is made that one or more custom tasks are required to be executed in the cloud infrastructure. After the determination, the one or more custom tasks are inserted into the first plurality of tasks to generate a second plurality of tasks. The second plurality of tasks is then transmitted to the cloud management server for execution in the cloud infrastructure. | 2015-12-03 |
20150350102 | Method and System for Integrated Management of Converged Heterogeneous Resources in Software-Defined Infrastructure - A method and system for integrated management of converged heterogeneous resources is disclosed. The method includes: defining a Software-Defined Infrastructure (SDI) by separating data, control, and management for converged heterogeneous resource provisioning, creating an integrated resource manager using interfaces for one or more cloud controllers, Software-Defined Network (SDN) controllers, or general-resource controllers, enabling external entities to request and use the resources through interfaces, storing topology information and utilizing it for integrated resource management, and monitoring and measuring the converged heterogeneous resources. An integrated management system includes an SDI manager configured to provide integrated resource control and management functions, a cloud controller, an SDN controller, a general resource controller, a topology manager, northbound interfaces of an SDI manager for external entities to request resources and check the status of resources, and all inter-relations between an SDI manager, a cloud controller, an SDN manager, a general resource manager and a topology manager. | 2015-12-03 |
20150350103 | MANAGING INFORMATION TECHNOLOGY RESOURCES USING METADATA TAGS - A resource manager is tasked with monitoring and managing information technology (IT) resources in a virtual environment. The IT resources are assigned tags that correspond to conditions that alert the resource manager when to begin actively managing the IT resource. The resource manager may monitor events occurring in the virtual environment that have conditions that match the predefined tags. When such an event occurs, the resource manager identifies an appropriate resource by searching a data store that includes the tags and the corresponding resource. The resource manager then begins to actively manage the resource and assigns the resource to a workload. By tagging the resources, the resource manager does not need to actively manage all of the IT resource in the virtual environment. Furthermore, the tags permit the resource manager to automatically select which resources to actively manage without receiving instructions from a system administrator. | 2015-12-03 |
20150350104 | DATA TRANSMISSION BETWEEN DEVICES BASED ON BANDWIDTH AVAILABILITY - In one embodiment, in response to data to be transmitted to or from an electronic device, the electronic device determines whether the electronic device currently has a first network connection with a sufficiently high bandwidth. If the electronic device currently does not have a first network connection with a sufficiently high bandwidth, then the electronic device estimates a future time when the electronic device is likely to have a second network connection with a sufficiently high bandwidth, and schedules transmission of the data at the future time. | 2015-12-03 |
20150350105 | METHOD AND SYSTEM FOR ADMINISTERING MULTIPLE DOMAIN MANAGEMENT AUTHORITIES ON A MOBILE DEVICE - A method for administering multiple management agents on a mobile device, the method receiving, at a policy manager on the mobile device, a policy from each of the multiple management agents; determining a current state of the mobile device; and consolidating the policies based on rules within the policy manager and the current state of the mobile device. | 2015-12-03 |
20150350106 | Sharing Account Data Between Different Interfaces to a Service - Some embodiments provide a method for an electronic device. The method stores user data associated with a web-based third party service based on user interaction with a web domain for the third party service through a web browser. The method receives a request from a service-specific application to utilize the user data stored for the third party service. The method provides the user data to the application only when the application is verified by the web domain for receiving user data associated with the third party service. | 2015-12-03 |
20150350107 | NETWORK SYSTEM - In an account association table the account IDs and account names of accounts created at nodes are associated and recorded. In response to an access control list change request including the account name of an account the access control entry of which is to be changed and the contents of the change, an access control list change unit retrieves an account ID recorded while being associated with the account name from the account association table and changes, in accordance with the contents of the change, an access control entry in which the retrieved account ID is recorded among account control entries in an access control list to be changed. | 2015-12-03 |
20150350108 | ADJUSTING CLOUD RESOURCE ALLOCATION - A method, system, and computer program product for adjusting cloud resource allocation using n-tier simulation are provided in the illustrative embodiments. In a multi-tiered simulation configuration, a combination of predictive models is executed such that each tier executes at least one predictive model to produce a corresponding set of predicted events. Each tier simulates a process that is consuming a computing resource. Using a subset of a selected set of predicted events outputted from a corresponding selected tier, a set of features is extracted. each feature in the set of features has an effect on an outcome of the simulated process. The set of features is used in a demand level prediction model to predict a threshold demand. Reaching the threshold demand in an actual utilization of the computing resource is indicative of a likelihood of an unforeseen rise in a demand for the computing resource after a period. | 2015-12-03 |
20150350109 | MEDICAL IMAGING SYSTEM AND METHOD FOR THE OPERATION THEREOF WITH SHARED COMPUTING RESOURCES - The invention relates to a method for providing computing resources for at least one medical imaging system and/or image processing system and to a medical imaging system and/or image processing system, a computer program and a machine-readable storage medium. The imaging system and/or image processing system exchanges ( | 2015-12-03 |
20150350110 | Implementing a Transition Protocol in Which a First Rule Set for Routing Packets Received by a Group of Switches During a First Time Period is Updated to a Second Rule Set - A transition protocol is provided herein in which a first rule set for routing packets received by a group of switches during a first time period is to be updated to a second rule set. During a transition period, at least some switches in the group of switches route packets to a controller, while other switches in the group of switches route packets to a next hop that is unchanged by the change in the rule set. The controller forwards packets that are received from at least some of the switches in the group to a destination node each of the packets, as determined from the updated rule set. | 2015-12-03 |
20150350111 | PORT MODE SYNCHRONIZATION BETWEEN SWITCHES - According to an example, after a primary port of a primary switch and a secondary port of a secondary switch are connected to each other and the primary port is configured to operate in a fabric mode, the primary switch may send a mode switch request packet to the secondary switch through the primary port. The secondary switch may change the secondary port from operating in an Ethernet mode to the fabric mode based on information contained in the mode switch request packet and may send a mode switch response packet to the primary switch. | 2015-12-03 |
20150350112 | HIGH PERFORMANCE ETHERNET NETWORKING UTILIZING EXISTING FIBRE CHANNEL FABRIC HBA TECHNOLOGY - This is directed to providing Fibre Channel over Ethernet communication. For example a Fibre Channel over Ethernet (FCoE) enabled device (such as a computer) may include a Fibre Channel over Ethernet Adapter (FCoEA). The FCoEA may include an HBA module. The HBA module may be configured to communicate over the Fibre Channel protocol. The FCoE enabled device may process and encapsulate the HBA module's communication in order to send them over an Ethernet network instead. The FCoE enabled device may process communications directed to various Fibre Channel fabric services by utilizing existing Ethernet services, such as an iSNS server. Thus, the FCoE enabled device can emulate a Fibre Channel network for the HBA module using the Ethernet network and one or more Existing Ethernet services/servers. | 2015-12-03 |
20150350113 | AIR-TIME FAIR TRANSMISSION REGULATION WITHOUT EXPLICIT TRAFFIC SPECIFICATIONS FOR WIRELESS NETWORKS - A system and method are provided for non-transmission specification fair air-time, NT-AirFair, allocation control by tracking the transmission time consumed by each link to detect any increase and enforcing air-time allocation based on the pattern of usage derived therefrom. | 2015-12-03 |
20150350114 | DIFFERENTIAL DELAY COMPENSATION - In one embodiment, a method comprises receiving a plurality of data frames representing at least one virtually concatenated data stream, storing the plurality of data frames in a memory; and recording, for each of a plurality of data frames, a physical write address that indicates a position in the memory and a virtual write address that includes a multiframe indicator and a byte number indicator. | 2015-12-03 |
20150350115 | ENHANCED ACKNOWLEDGEMENT HANDLING IN COMMUNICATION PACKET TRANSFER - Described herein are methods, systems, and software for handling packet buffering between end users and content servers, such as content delivery nodes. In one example, a method of operating a content server includes generating first and second data packets for first and second content requests. Once generated, the method provides storing the first packets in a packet buffer and transferring the first packets to a first user device. Upon transfer, the first packets are deleted from the packet buffer and replaced with the second packets. Theses second packets are then transferred to a second user device and deleted from the packet buffer. Further, once the packets are transferred to the user devices, the method further includes monitoring for an acknowledgment from the user devices to ensure the packets are received. | 2015-12-03 |