|| List of recent Network Device-related patents
| Network eavesdropping detection|
In one implementation, network taps are detected using impedance measurements from a network. A network device is configured to calculate a baseline impedance as a function of a sequence of impedance values.
| Interactive event cast to multiple mobile devices|
Systems and devices for, and methods of, interactive event casting, by: (a) scheduling a plurality of transactions, where the scheduling may be based on passing a system time and a channel usage schedule; (b) aggregating the plurality of transactions, where the aggregating results in minimizing data transfer traffic; (c) executing a data compression and error correction scheme, where the data compression scheme may be based on dynamically changing bitrate of a video data stream according to local access point data traffic; and (d) communicating between network devices using multi-cast for compressed video streams with error-correction code and (e) initiating an application, where the initiated application performs error correction, decompresses the received video data stream, and where the decompressed video data stream may be spooled.. .
| Generic and automatic address configuration for data center networks|
This application describes a system and method for auto configuring data center networks. The networks include a plurality of electronic devices that may include switches, servers, routers, or any other device that may be used in a data center network.
| Systems and methods for idle driven scheduling|
A system and method of idle driven scheduling in a network device is disclosed. An interrupt signal is received from a timer, wherein a network processing component of a network device awakes from sleep mode of a first sleep duration for a first cycle upon receiving the interrupt signal.
| Device and method for automatic switching of communication protocol of network devices based on user action|
A computer implemented method for automatically switching communication protocols. The method includes detecting a user input, determining, based on the user input, a first communication protocol needed to address the user input, and creating a virtualized network wherein devices that use a second communication protocol are represented via virtualized devices according to the first communication protocol..
| Method for configuring dhcpv6 client, dhcpv6 client, network device, and network system|
A method for configuring a dhcpv6 client is provided. The method includes: a dhcpv6 client receiving a dhcpv6 advertisement message sent by a network device having a dhcpv6 function, the dhcpv6 advertisement message comprising a management domain identifier of the network device; if the dhcpv6 client does not save the management domain identifier, the dhcpv6 client sending a dhcpv6 request message to the network device; the dhcpv6 client receiving a dhcpv6 response message sent by the network device and completing configuration of the dhcpv6 client.
| Queue processor for document servers|
A configurable queue processor for document servers is described. The configurable queue processor strives to allocate server resources in an optimal manner such that document servers can process documents efficiently.
| Processing analytics data received by sensor devices|
One or more devices may receive multiple data records from a sensor device when the sensor device receives an indication from a network device, associated with a service provider network, to provide the multiple data records via the service provider network. Each of the multiple data records may include analytics data collected by the sensor device.
| System and method for providing network coordinated conversational services|
A system and method for providing automatic and coordinated sharing of conversational resources, e.g., functions and arguments, between network-connected servers and devices and their corresponding applications. In one aspect, a system for providing automatic and coordinated sharing of conversational resources includes a network having a first and second network device, the first and second network device each comprising a set of conversational resources, a dialog manager for managing a conversation and executing calls requesting a conversational service, and a communication stack for communicating messages over the network using conversational protocols, wherein the conversational protocols establish coordinated network communication between the dialog managers of the first and second network device to automatically share the set of conversational resources of the first and second network device, when necessary, to perform their respective requested conversational service..
| Roaming policy aware device capabilities|
A user device may receive roaming policy information. The roaming policy information may identify a roaming network and one or more services available to the user device via the roaming network.
| Application based network information maintenance|
Various communication systems may benefit from notifications of network information. For example, cellular optimization may be accomplished by selective use of a data technique by applications on network devices, which may further benefit from notifications that may reduce the need for external data requests, used in coordination with application observations of current network conditions.
| Application configured triggers and push notifications of network information|
Various communication systems may benefit from push notifications of network information. For example, cellular optimization may be accomplished by selective use of a web technique by applications on network devices, which may further benefit from push notifications that may reduce the need for web requests.
| Ethernet passive optical network over coaxial (epoc) system rate mechanism|
An ethernet passive optical network over coaxial (epoc) system rate mechanism. A network device is provided that includes a physical layer device (phy) that is configured for coupling to a coaxial cable, a medium independent interface that facilitates data transmission at 10 gbit/s or greater, and a reconciliation sublayer that is coupled to the phy via the medium independent interface.
| System and method for flexible switching fabric|
A system and method for a flexible switching fabric includes a network switching device. The network switching device includes a plurality of connectors configured to couple the network switching device to other network devices, one or more front panel cards, each front panel card including one or more first ports and configured to forward network packets between the first ports, one or more fabric cards, each fabric card including one or more second ports and configured to forward network packets between the second ports, and a port multiplexing unit configured to flexibly couple the plurality of connectors to the one or more first ports and the one or more second ports to the one or more first ports.
| Systems and methods for operating a network arrangement|
Systems and methods are provided for operating a network arrangement including multiple network devices that are coupled to each other in a ring structure. Each network device includes a control device and a switch device with at least two ports for coupling to a communication path.
| Optimizing private virtual local area networks (vlans)|
A network device is provided in a private virtual local area network (vlan). The network device receives a packet on one of multiple private vlan ports of the network device, and assigns a classified vlan signature to the packet.
| Lsp ping and traceroute for bypass tunnels|
A method performed by a network device may include assembling a multiprotocol label switching (mpls) echo request, the echo request including an instruction for a transit node to forward the echo request via a bypass path associated with the transit node, and an instruction for an egress node to send an echo reply indicating that the echo request was received on the bypass path. The method may also include sending the mpls echo request over a functioning label switched path (lsp)..
| Support for distinguished minimum latency traffic guard band|
A network device may implement a guard band for reducing latency of transmitting high priority data. The device may identify a scheduled communication time for high priority data, which may include a scheduled reception time of the high priority data by the network device or a scheduled communication time of the high priority data.
|Collaborative parental control of streaming media|
A network device receives a request for a selected video from a first user at a client device, and determines similarities between a second user associated with the first user and other parents in a collaborative community, wherein the similarities are determined based on the second user's, and the other users', prior censoring of videos. The network device obtains all exclusions applied by the second user, and the other users, in the collaborative community to the selected video, wherein each of the exclusions comprises a portion of the selected video identified for censoring by one of the users in the collaborative community.
|Method and system for synchronization between network elements|
A system for synchronizing a first network device and a second network device. The first network device comprises an interface configured to release over a communication link a first signal carrying a first data stream clocked by a first clock signal.
|Placing a network device into a maintenance mode in a virtualized computing environment|
Techniques for placing a first network device into maintenance mode are described. In one embodiment, a first host computing system coupled to the first network device is identified.
|Method and system for using json with a cli for managing network devices|
A method for executing a command line interface (cli) command by receiving a hyper text transport protocol (http) comprising the cli command from a controller, extracting the cli command from the http request, and executing, by a network device, the cli command to generate a populated model comprising results generated from executing the cli command. The method also executes the cli command by converting the populated model into a json format using a json engine to obtain a json result; encapsulating the json result in a json remote procedure call (rpc), and transmitting the json rpc as a http response to the controller..
|Adaptive uplink/downlink timeslot assignment in a hybrid wireless time division multiple access/code division multiple access communication system|
A method and apparatus for adaptive uplink/downlink resource assignment may include determining uplink interference associated with each of several uplink resources. The method and apparatus may produce an uplink list with values for the uplink resources.
|Methods and apparatus for cell measurement|
Methods and apparatus for cell measurement. An example method in a network device includes receiving configuration information including at least one of multimedia broadcast single frequency network (mbsfn) configuration or time division duplex (tdd) configuration for an evolved universal terrestrial radio access network (e-utran) and transmitting the configuration information to a user equipment, wherein the network device is associated with a radio access technology different from e-utran..
|Dynamic network awareness|
Systems and methods for managing a network are disclosed. One method can comprise determining presence of a first network device associated with a network.
|Heuristic network traffic classification using byte-distributions|
A network device has counters that are configured to generate for a plurality of byte positions in a specified portion of data packets, a count indicative of a correspondence of a value found at the byte position corresponding to a rule such that occurrences of predetermined byte values in the plurality of byte positions may be counted. A packet classifier is configured to receive from the counters a number of byte values corresponding to the rules and to classify data packets based on the analysis..
|Data transmission method and apparatus|
A data transmission method and apparatus are provided. The method comprises: receiving service data sent by a first terminal, the first terminal being a single-mode terminal or a multi-mode terminal; monitoring forwarding load traffic of a back-end egress of a first network device in a first network; when the load traffic reaches present load traffic, switching a current forwarding mode to a routing mode, and selecting a second terminal as a forwarding node of the first terminal, the second terminal being a multi-mode terminal; forwarding the service data to the second terminal, so that the second terminal coverts the service data and sends the converted service data to a second network device in a second network.
|Communications apparatus, system and method with error mitigati|
Data communications are effected over one or more network branches to ensure appropriate receipt of data at different devices on the network. In accordance with an example embodiment, time-based communications are effected for a plurality of different network devices, at least two of which are connected to a common wired network link, with each network device being assigned to communicate during different time slots within a communication cycle.
|Inter-domain fast reroute methods and network devices|
A network device, is to be deployed in a network between a first network domain and a second network domain, and is to be configured for fast reroute. The network device includes a first traffic forwarder control module, corresponding to the first network domain, which is to determine a primary next hop in the first network domain.
|Securing email communications|
Methods and systems are provided for securing email communications. According to one embodiment, a network device evaluates whether a domain name of a target recipient of an outbound email is present in a local white list or a local black list.
|Audio/video channel transbonding in a network device|
A data communication architecture delivers a wide variety of content, including audio and video content, to consumers. The architecture employs channel bonding to deliver more bandwidth than any single communication channel can carry.
|Automatic prompt detection for universal device support|
Embodiments provide systems, methods, and computer program products for network management application to automatically determine a session prompt for a network device and perform error handling. After logging in to a network device, the network management application records the first session prompt response.
A method and network device for managing a multi-homed network are provided. The method comprises receiving a request from a client within a client computer network directed to a remote server computer within a remote computer network, wherein the client and the remote server computer are connected through a plurality of data routes, each of the plurality of data routes is connected to a router; selecting a data route from the plurality of data routes to route the received request, wherein the selection of the data route is based on a decision function; translating a source ip address of the client to an ip address corresponding to the selected data route; and routing the received request from the client to the remote server computer over the selected data route..
|Stateless recognition of keep-alive packets|
A capability is provided for statelessly recognizing transmission control protocol (tcp) keep-alive packets. A server receives a tcp syn packet including an initial client sequence number and selects an initial server sequence number for the tcp connection based on the parity of the initial client sequence number and a parity rule.
|Network suitability for a streaming device|
A device is provided that analyzes one or more signal metrics to generate a signal measurement. The signal measurement is utilized to indicate whether or not a particular location of the device is suitable for receiving streamed content.
|Selection diversity in a powerline communication system|
A network device can be configured to dynamically adapt its current primary receiver coupling to channel conditions. For each of a plurality of transmitting network devices, the network device can determine a potential primary receiver coupling of the first network device for receiving communications from the transmitting network device based, at least in part, on a performance measurement associated with each of the plurality of communication channels between the network device and the transmitting device.
|Methods and devices enabling resource sharing for device-to-device communication in unlicensed band|
The invention proposes a device, comprising a transceiver module, configured for communication on a first and at least one second band, the first band being reserved for communication using a specific communication standard, the second band being accessible for communication using different communication standards, and a control module, configured to control the transceiver module to receive and to transmit data, and to process received data. In one aspect, the control module is configured to request communication resources in the second band from another device using a first type of request, allocate said resources in the second band for communication upon receipt of a resource allocation confirmation from said another device, and to communicate using at least a part of the allocated resources in the second band a corresponding network device as well as related methods and computer program products are also disclosed..
|System and method for transmission source identification|
A method embodiment includes receiving, by a first network device, a first transmission comprising an explicit first source identification (id). The first source id is added to a list of active source ids.
|Vehicle driver identification using portable device|
A network device associates a fleet vehicle with a driver of it. The network device receives customer input associating a group of media access control (mac) addresses of portable devices with driver identifiers and stores, in a memory, the mac addresses associated with the driver identifiers.
|Time efficient counters and meters architecture|
A network device includes a plurality of interfaces configured to receive, from a network, packets to be processed by the network device. A load determination circuit of the network device is configured to determine whether a packet traffic load of the network device is above a traffic load threshold, and a dual-mode counter module is configured to (i) determine a count of quanta associated with the received packets using a first counting mode in response to the load determination unit determining that the packet traffic load is above the traffic load threshold, and (ii) determine a count of quanta associated with the received packets using a second counting mode, different than the first counting mode, in response to the load determination unit determining that the packet traffic load is not above the traffic load threshold..
|Method and system for handling interference between a low power network and a high power network sharing a common frequency band|
A method and a system for handling interference between a low power network and a high power network sharing a common frequency band are provided. The method includes receiving an association request message containing a set of parameters from the low power device.
|Configuring network devices|
Improved systems and methods for configuring network devices are provided. Aspects of the disclosure relate to novel qos configuration parameters and methods for using qos configuration parameters to reduce impacts caused by security breach within a network.
|Method for operating a communications network and network arrangement|
A method for operating a communications network, in particular an ethernet network is provided. Network devices that are coupled to the network have a switch device and a control device that is coupled to the switch device, and the switch device has at least one receiving port and a sending port for sending and receiving data via the communications network.
|Systems and methods for network access control|
Network access control systems and methods are provided herein. A method includes receiving at a network device a syn packet from a client device over a network, determining if the client device is a trusted source for the network using the syn packet, if the client device is a trusted resource, receiving an acknowledgement (ack) packet from the client device that includes identifying information for the client device plus an additional value, and identifying information for the network device, and establishing a connection with the network for the client device..
|Load balancing hash computation for network switches|
Techniques to avoid polarization in a communication network include a network switch or device having a first interface to receive a data unit or packet, and a second interface via which the packet is transmitted from the network device. The network device includes a hash value generator configured to generate, using a depolarizer, a depolarized key from an initial key (where the initial key is based on contents of the packet and the depolarizer is unique to the network device), and to generate a hash value based on the depolarized key and the packet by using a hash function that is common to all network devices in the network.
|Technique for configuring a software-defined network|
A technique for configuring a software-defined network (sdn) is provided. A first control message is issued by a software-defined network controller.
|Output queue of multi-plane network device and related method of managing output queue having multiple packet linked lists|
An output queue of a multi-plane network device includes a first processing circuit, a plurality of storage devices and a second processing circuit. The first processing circuit generates packet selection information based on an arrival sequence of a plurality of packets.
|Active output buffer controller for controlling packet data output of main buffer in network device and related method|
An active output buffer controller is used for controlling a packet data output of a main buffer in a network device. The active output buffer controller has a credit evaluation circuit and a control logic.
|Switching fabric of network device that uses multiple store units and multiple fetch units operated at reduced clock speeds and related method thereof|
A switching fabric of a network device has a load dispatcher, a plurality of store units, a storage device, a plurality of fetch units, and a load assembler. Each of the store units is used to perform a write operation upon the storage device.
|Scalable and efficient flow-aware packet distribution|
Techniques for efficiently distributing data packets in a network device are provided. In one embodiment, the network device can store a plurality of virtual ip addresses and a plurality of real server ip addresses in an sram-based table.
|Communication path switching device, communication path switching method and communication path switching program|
A communication path switching device is configured to determine whether or not a specified network device where exclusion from a communication path or addition to the communication path is specified through an input device can perform path switching based on the individual pieces of information on a coupling configuration and a presence or absence of an independent control function; refer to a storage device for the individual pieces of information on the coupling configuration and a coupling policy to change the coupling policy according to a result of the determination; and processing of issuing, according to the result of the determination and the individual pieces of information in the storage device, a path switching instruction to a network device having the independent control function and a network device not having the independent control function that are path switching targets on a communication path directed to the specified network device.. .
|Method and system for obtaining imei of mobile station and base station controller|
Embodiments of the present invention relate to a method and a system for obtaining an international mobile equipment identity of a mobile station and a base station controller. The method in this embodiment of the present invention includes: sending, by a base station controller, a request message to a core network device; receiving an accept message of the request message sent by the core network device; sending an identify request message, where a frame sequence number of the identify request message is the same as a frame sequence number of the accept message; receiving an identify response message sent by the mobile station; and re-sending the request message to the core network device in the manner of an unnumbered information frame, where a frame sequence number of the re-sent request message is the same as a frame sequence number of the identify response message..
|Facilitating power conservation for local area transmissions|
An apparatus for triggering generation of a service period(s) in a network may include a processor and memory storing executable computer program code that cause the apparatus to at least perform operations including triggering generation of at least one service period in a first network based in part on receipt of information from a network device of a second network. The computer program code may further cause the apparatus to enable wake up, based in part on the generated service period, of one or more devices of the first network for communication of content to at least one of the devices during a specified time period of the service period.
|Performance analysis of virtual private network segment on a per flow basis|
A method is provided in one example embodiment and includes generating at a first network device virtual private network (“vpn”) encapsulated packets with anonymized headers; maintaining a table mapping the anonymized headers to original headers of the vpn encapsulated packets; receiving a trace request from an initiator; generating from the received trace request an out-of-tunnel trace request toward a second network device via at least one intermediate network device using the anonymized headers; and forwarding the received trace request as an in-tunnel trace request through a vpn tunnel.. .
|Method and system of transmission management in a network|
A method implemented in a network for enhancing transmission is disclosed. The network contains a number of network devices, and at least one network device provides traffic scheduling function to schedule transmission of packets.
|Method and system for supporting distributed relay control protocol (drcp) operations upon communication failure|
A method supporting a distributed resilient network interconnect (drni) in a link aggregation group upon communication failure at a network device is disclosed. The method starts with determining that the network device no longer communicates with its neighbor network device.
|Fast traffic recovery in vrrp based routers|
A method is implemented by a network device for a fast traffic recovery process for the virtual redundant router protocol (vrrp), where improved speed in a switchover from a master vrrp router to a backup vrrp router is obtained by synchronizing an address resolution protocol (arp) cache between the master vrrp router and the backup vrrp router such that after the switchover the backup vrrp router functions as a new master vrrp router and does not need to relearn media access control (mac) address to internet protocol (ip) mappings of hosts using the new master vrrp as a gateway. The process involves receiving an arp entry on an interface of the network device and checking whether the network device is configured as the master vrrp router.
|Ips detection processing method, network security device, and system|
An ips detection processing method, a network security device and a system are disclosed. The method includes: determining, by a network security device, whether an internal network device is a client or a server; if the internal network device is the client, simplifying an ips signature rule base to obtain an ips signature rule base corresponding to the client, or if the internal network device is the server, simplifying the ips signature rule base to obtain an ips signature rule base corresponding to the server; generating a state machine according to a signature rule in the ips signature rule base obtained through simplifying processing; and performing ips detection on flowing-through traffic by applying the state machine.
|Carriage of quality information of content in media formats|
A method for managing quality information for dynamic adaption in content delivery, wherein the method comprises selecting a granularity level for an encoded media data, computing a plurality of quality metrics for the encoded media data at the selected granularity level, wherein the quality metrics are measures of coding quality of the encoded media data, generating a quality track comprising the plurality of quality metrics, and storing the quality track on a media content server separate from other tracks that are associated with the encoded media data. Also disclosed is a network device comprising a processor configured to select a granularity level for an encoded media data, and compute a plurality of quality metrics that indicate coding quality of the encoded media data at the selected granularity level, and a transmitter coupled to the processor and configured to send the quality track towards a user of the media data..
|Media quality information signaling in dynamic adaptive video streaming over hypertext transfer protocol|
A media representation adaptation method comprising obtaining an media presentation description (mpd) that comprises instructions for retrieving a plurality of media segments and their quality information, sending a quality information request, receiving the quality information that comprises a plurality of quality segments, selecting a media segment based on the quality information, sending a media segment request that requests the media segment, and receiving the media segment. A computer program product that when executed by a processor causes a network device to obtain an mpd that comprises instructions for retrieving a media content stream and quality information, determine a quality level threshold, request a quality information associated with the media content stream, receive the quality information, select a media segment with a corresponding quality segment that is greater than the quality level threshold, send a media segment request that requests the media segment, and receive the media segment..
|Bandwidth allocation for shared network infrastructure|
Methods and systems are provided for adaptive management of local networks (e.g., in-premises networks, which may access or be connected to cable or satellite networks). A network device (e.g., a gateway device) may be configured to function as a network manager in a local network, to manage internal connections and/or communications within the local network.
|Network infrastructure management|
In one embodiment, the present invention is a network infrastructure management system that allows monitoring and controlling network devices while dynamically discovering them on demand during the process. New management protocols can be dynamically added to the system or built on demand without refactoring the existing algorithms..
|System and method for determining whether a computer device is compatible with a computer network|
A system and method are provided for allowing an administrator to automatically determine whether networked computer devices are configured to use governance software that allocates resource in, or controls or restricts the access of other network devices, to certain portions of the networked storage based upon it governance protocols, network efficiency and economics. To do this, a company server having governance software stored thereon polls a range of device addresses (e.g., ip addresses) specified by the network administrator or stored on a dns server with a message formatted using protocols such as webdav, smb/cifs, ftp, etc., and specific to the governance software.
|Method and system for synchronizing with neighbor in a distributed resilient network interconnect (drni) link aggregation group|
A method of updating operational states of a network device in a distributed resilient network interconnect (drni) of a link aggregation group is disclosed. The method starts with initializing the network device for link aggregation, wherein the initialization includes setting variables of the network device for a first portal as configured by administrative settings, where the first portal includes the network device and at least one neighbor network device.
|Integrate application intelligence with a network device for application transaction visibility and control|
The proposed methodology provides an application state machine in a network device, such as a router which may be used to extract application transactions. The extracted transaction data may be provided to another entity for analysis and troubleshooting..
|Device for efficient use of packet buffering and bandwidth resources at the network edge|
The invention relates to a hybrid network device comprising a server interface enabling access to a server system memory, a network switch comprising a packet processing engine configured to process packets routed through the switch and a switch packet buffer configured to queue packets before transmission, at least one network interface; and at least one a bus mastering dma controller configured to access the data of said server system memory via said at least one server interface and transfer said data to and from said hybrid network device. According to one aspect of the invention, a bus transfer arbiter configured to control the data transfer from the server memory to the packet processing engine of said hybrid network device..
|Zone based system for altering an operating condition|
According to an aspect of the disclosure, a processor is configured to detect a location of a mobile device associated with a site and detect at least one geofence operably associated with the site. The processor is further configured to detect a manual input condition provided at a network device disposed at the site, detect the mobile device being disposed away from the site based on the location of the mobile device relative to the at least one geofence, and initiate a text message to the mobile device indicating the manual input condition in response to the mobile device being disposed away from the site.
|Method and system for network and intra-portal link (ipl) sharing in distributed relay control protocol (drcp)|
A method supporting network and intra-portal link (ipl) sharing in a link aggregation group at a network device is disclosed. The method starts with transmitting frames on the ipl at the network device, where the physical link or aggregation link of the link aggregation group is dedicated to the ipl.
|Method and system of updating conversation allocation in link aggregation|
A method of updating conversation allocation in link aggregation is disclosed. The method starts with verifying that an implementation of a conversation-sensitive link aggregation control protocol (lacp) is operational at a network device of a network for an aggregation port.
|Method and system of implementing conversation-sensitive collection for a link aggregation group|
A method is executed by a network device for implementing conversation-sensitive collection for frames received on a port of a link of a link aggregation group. The network device executes an aggregator to collect the frames for aggregator clients, where each frame is associated with a service identifier and a conversation identifier.
|Efficient multicast delivery to dually connected (vpc) hosts in overlay networks|
In a mesh-based connected data center network architecture, a mechanism is provided to allow efficient delivery of ip multicast frames within the network. Described approaches avoid replication into vlans (or svis) across the fabric by using the outer encapsulated tree to identify trees on which to replicate the traffic.