Patent application number | Description | Published |
20110274035 | Routing to the Access Layer to Support Mobility of Internet Protocol Devices - Techniques are provided for seamless integration of wired and wireless functionality packet forwarding in network. A plurality of access switches are provided in each of a plurality of mobility sub-domains that are part of a mobility domain of a network. Each access switch serves one or more Internet Protocol (IP) subnets, each comprising a plurality of IP addresses. An access switch obtains an IP address for a wireless device according to the one or more IP subnets that the access switch serves. The access switch sends an association advertisement message to indicate the IP address of the wireless device and to enable other access switches and routers to compute a path to the wireless device. When a wireless device obtains an IP address, it can keep the same IP address as it roams in the mobility domain. | 11-10-2011 |
20110274036 | Maintaining Point of Presence at Tunneling Endpoint for Roaming Clients in Distributed Wireless Controller System - Techniques are provided to support roaming of wireless devices in a network such that the wireless devices can keep their Internet Protocol (IP) addresses as they roam within and across mobility sub-domains. When a wireless device roams from one access switch to another access switch, a tunneling endpoint apparatus in the wireless device's home mobility sub-domain is configured to serve as the point of presence for the roamed wireless device. Traffic for the roamed wireless device is tunneled from the access switch where the wireless device has roamed (where it is currently attached) to the tunneling endpoint apparatus. When the wireless device roams across mobility sub-domains, then traffic is tunneled from the access switch where the wireless device is currently attached to the tunneling endpoint apparatus in that mobility sub-domain (called a “foreign” mobility sub-domain) to the tunneling endpoint apparatus in the wireless device's home mobility sub-domain. | 11-10-2011 |
20110274037 | Hierarchical Control Signaling for Mobile Clients in Distributed Wireless Controller System - A system and method are provided for a hierarchical distributed control architecture to support roaming of wireless client devices. A plurality of access switches are provided and configured to serve one or more Internet Protocol (IP) subnets that comprises a plurality of IP addresses. The plurality of access switches are arranged in switch peer groups such that each access switch within a given switch peer group is configured to store information about other access switches in that switch peer group and about locations of wireless client devices that are associated with any wireless access point on any access switch in the switch peer group. The plurality of access switches are further grouped into a corresponding one of a plurality of mobility sub-domains each comprising a plurality of switch peer groups. A plurality of controller devices are provided, each configured to control access switches in a corresponding mobility sub-domain. Each controller device stores information about the plurality of access switches within its mobility sub-domain and about locations of wireless client devices at access switches in its mobility sub-domain. A central controller device is provided and configured to communicate with the plurality of controller devices for the respective mobility sub-domains. The central controller device is configured to store information about locations of wireless client devices in the mobility sub-domains. | 11-10-2011 |
20110274082 | Maintaining Point of Presence at Access Switch for Roaming Clients in Distributed Wireless Controller System - Techniques are provided to enable support of roaming wireless devices in a network such that the wireless devices can keep their Internet Protocol (IP) addresses as they roam across mobility sub-domains. Traffic for a wireless device that roams is tunneled back to the access switch that serves the IP subnet which includes an IP address for the wireless device. Traffic is tunneled back to that access switch for the wireless device when the wireless device roams to another access switch which does not serve the IP subnet for the wireless device in the same mobility sub-domain and when the wireless device roams to a different mobility sub-domain, in which case the traffic is tunneled between tunneling endpoints in the respective mobility sub-domains. | 11-10-2011 |
Patent application number | Description | Published |
20130015596 | ROBOTIC FABRICATOR - A fabrication system includes a tool-head for manufacturing, a first manipulator and a second manipulator. The first manipulator supports and manipulates an item, and is configured to provide six-axes of movement for positioning of the item relative the tool-head. The second manipulator carries a component and orients the component at a select orientation relative to the item supported on the first manipulator. The tool-head is configured to add material to at least one of the item and the component. The first and second manipulators provide at least six axes of fabrication for the tool-head. | 01-17-2013 |
20130137604 | METHODS OF EVALUATING GENETIC ELEMENTS - The invention relates to compositions for evaluating a genetic element and methods of use. | 05-30-2013 |
20130171626 | METHODS OF EVALUATING GENE EXPRESSION LEVELS - Described herein are methods of evaluating the expression levels of DNA parts encoding proteins in test circuits. In particular, the methods disclosed herein are useful to evaluate the expression of an output protein regulated by a regulatory protein-genetic element pair. | 07-04-2013 |
20130227634 | SYSTEM AND METHOD FOR PROTECTING SERVICE-LEVEL ENTITIES - An architecture is provided for protecting service-level entities. Such an architecture may escrow service requests prior to forwarding the requests to the service, and checking may be performed prior to releasing the request to the service. A crumple zone (CZ) architecture may be provided that buffers incoming service requests and may intercept attacks and/or sustain damage in lieu of the services being protected. The CZ may include an outward interface that is accessed by other entities, and the underlying service is not accessed directly. Elements of the CZ receive service requests, analyze them, and determine whether they can be safely executed by the underlying service. | 08-29-2013 |