Patent application number | Description | Published |
20100254409 | System and Method for Optimizing Network Bandwidth Usage - A method of optimizing bandwidth usage in a link aggregated network includes identifying available bandwidth on a plurality of data links in a link aggregation group, selecting the data link with the least available bandwidth, and determining whether the available bandwidth of the selected data link is less than a guaranteed bandwidth of an incoming data flow. If the available bandwidth of the selected data link is less than the guaranteed bandwidth of the incoming data flow, the method includes selecting the data link with the next least available bandwidth and repeating the previous steps until the available bandwidth of the selected data link is greater than the guaranteed bandwidth of the incoming data flow. The method further includes assigning the data flow to the data link determined to have an available bandwidth greater than the guaranteed bandwidth of the incoming data flow. | 10-07-2010 |
20120069970 | SYSTEMS AND METHODS OF MASKING NON-SERVICE AFFECTING ALARMS IN A COMMUNICATION SYSTEM - According to one embodiment, a method may include detecting existence of an alarm-triggering event associated with a service at a maintenance level. The method may also include analyzing one or more parameters associated with carrier traffic for the service. The method may additionally include determining whether a data path for carrier traffic associated with the service is operational based on the analysis of the one or more parameters. The method may further include masking or downgrading an alarm triggered by the alarm-triggering event in response to a determination that the data path is operational. | 03-22-2012 |
20120327768 | System and Method for Dynamic Rate Limiting and Shaping of Traffic Based on Available Bandwidth - A method may include monitoring available aggregate bandwidth of a network element and determining if the available aggregate bandwidth is sufficient to communicate traffic at a rate equal to an aggregate sum of committed information rates for a plurality of classes of traffic. If the available aggregate bandwidth is sufficient to communicate traffic at the rate equal to the aggregate sum of committed information rates for a plurality of classes of traffic, traffic may be communicated for each of the plurality of classes in accordance with the respective committed information rate for each class. Otherwise, traffic may be communicated for each of the plurality of classes in an amount proportional to the respective committed information rate for a particular class and the available aggregate bandwidth. | 12-27-2012 |
20130022349 | SYSTEMS AND METHODS FOR PROTECTION OF ADAPTATION LAYER IN A COMMUNICATION NETWORK - A method may include: (i) provisioning a first network-side interface of a first plug-in unit and a second network-side interface of a second plug-in unit as members of a network-side protection group, the first plug-in unit and the second plug-in unit integral to an adaptation layer network element; (ii) provisioning a first client-side interface of the first plug-in unit and a second client-side interface of the second plug-in unit as members of a client-side protection group; (iii) designating one of the first and second network-side interface as an active network-side interface of the network-side protection group; and (iv) designating one of the first second client-side interface as an active client-side interface of the client-side protection group, such that traffic ingressing on the active network-side interface may egress on the active client-side interface and traffic ingressing on the active client-side interface may egress on the active network-side interface. | 01-24-2013 |
20130336129 | Multipurpose Use of Delay Measurement Message Buffer for Software Processing of Delay Measurement Response - In accordance with the present disclosure, a method may include receiving a delay measurement message frame at a responder maintenance end point from a controller maintenance end point. The method may further include writing an ingress time value to the delay measurement message frame upon receipt of the delay measurement message at the responder maintenance end point. The method may also include generating a delay measurement response frame based on the delay measurement message frame, the delay measurement response frame comprising an egress timestamp field having a value equal to the difference between a time at which the delay measurement response frame is transmitted from the responder maintenance end point and a time represented by the ingress time value. The method may additionally include transmitting the delay measurement response from the responder maintenance end point to the controller maintenance end point. | 12-19-2013 |
20140258772 | UTILIZING BACKWARD DEFECT INDICATIONS IN Y-CABLE PROTECTION SWITCHING - In accordance with teachings of the present disclosure, a method includes—at a network element communicatively coupled to a y-cable through two transmitters of the network element—transmitting data from a transmitter through the y-cable to a client and withholding transmission from the other transmitter, and determining whether receivers have received a backward defect indicator from the client. The method further includes determining that an interruption has occurred within a transmission media between the network element and the client, based on the determinations of whether the receivers have received the backward defect indicator from the client. The method also includes, based on the determination of the interruption, transmitting data from the other transmitter through the y-cable to the client and withholding transmission from the transmitter. | 09-11-2014 |
Patent application number | Description | Published |
20100132040 | Automated method and system for monitoring local area computer networks for unauthorized wireless access - According to an embodiment of the present invention, the wireless activity in a geographic area containing LAN connection ports is monitored using one or more sensor devices, called sniffers. By analyzing said wireless activity, one or more APs that are operating in said geographic area are identified. The active APs so identified are classified into three categories, namely “authorized” APs (those that are allowed by network administrator), “unauthorized” APs (those that are not allowed by the network administrator, but are still connected to the LAN of interest) and “external” APs (those that are not allowed by network administrator but are not connected to the LAN of interest, for example APs connected to the neighbor's LAN) by conducting one or more tests. The sniffers continue to monitor the selected geographic area to detect any wireless station attempting to connect to or communicating with the one or more identified unauthorized APs. Upon identifying unauthorized AP and/or intruding wireless station an indication is transferred to the prevention process. | 05-27-2010 |
20120240196 | AUTOMATED SNIFFER APPARATUS AND METHOD FOR MONITORING COMPUTER SYSTEMS FOR UNAUTHORIZED ACCESS - An apparatus for wireless communication including an automated intrusion detection process is provided. The apparatus includes a processing unit. It includes a wireless network interface device and an Ethernet (or like) wired network interface device that are coupled to the processing unit. One or more memories are coupled to the processing unit. A code is directed to perform a process for detection of wireless activity within a selected local geographic region. According to a specific embodiment, the wireless activity is derived from a wireless access point device that is operational about the selected local geographic region. A code is directed to performing connectivity test using one or more marker packets to determine connectivity status of the wireless access point device to network to be protected from intrusion. Depending upon the embodiment, other codes may exist to carry out the functionality described herein. | 09-20-2012 |
20130117851 | Automated method and system for monitoring local area computer networks for unauthorized wireless access - The wireless activity in a geographic area containing LAN connection ports is monitored using one or more sensor devices, called sniffers. By analyzing said wireless activity, one or more APs that are operating in said geographic area are identified. The active APs so identified are classified into three categories, namely “authorized” APs (those that are allowed by network administrator), “unauthorized” APs (those that are not allowed by the network administrator, but are still connected to the LAN of interest) and “external” APs (those that are not allowed by network administrator but are not connected to the LAN of interest, for example APs connected to the neighbor's LAN) by conducting one or more tests. The sniffers detect any wireless station attempting to connect to or communicating with the one or more identified unauthorized APs. Upon identifying unauthorized AP and/or intruding wireless station an indication is transferred to the prevention process. | 05-09-2013 |
20140298467 | AUTOMATED SNIFFER APPARATUS AND METHOD FOR MONITORING COMPUTER SYSTEMS FOR UNAUTHORIZED ACCESS - An apparatus for wireless communication including an automated intrusion detection process is provided. The apparatus has a portable housing, which may have a length no greater than 1 meter, a width no greater than 1 meter, and a height of no greater than 1 meter. A processing unit (e.g., CPU) is within the housing. One or more wireless network interface devices are within the housing and are coupled to the processing unit. The apparatus has an Ethernet (or like) network interface device within the housing and coupled to the processing unit. A network connector is coupled to the Ethernet network device. One or more memories are coupled to the processing unit. A code is directed to perform a process for detection of a wireless activity within a selected local geographic region. According to a specific embodiment, the wireless activity is derived from at least one authorized device or at least an other device. A code is directed to receiving at least identity information associated with the wireless activity from the detection process in a classification process. A code is directed to labeling the identity information into at least one of a plurality of categories in the classification process. Depending upon the embodiment, other codes may exist to carry out the functionality described herein. | 10-02-2014 |