At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Operation of base station in a cellular communications network
In one embodiment, a method of forming a neighbor cell list in a base station of a cellular communications network comprises, at periodic intervals, and for...
System and method for providing randomization in adaptive bitrate
A method is provided in one example embodiment and includes receiving video data at an adaptive bitrate (ABR) client that includes a buffer; determining whether...
Classification of security policies across multiple security products
A management entity connects with multiple security devices across a network. Each security device operates in accordance with one or more security policies....
RFID for available resources not connected to the network
Disclosed are apparatus and techniques for providing presence and location information from available media resources to participants in a media conference so...
Dynamic source route computation to avoid self-interference
In a multiple interface, low power and lossy network comprising a plurality of devices, interface options for a source route to minimize self-interferences are...
Loop avoidance during network convergence in switched networks
Various techniques can be used to avoid loops during network convergence after a topology change such as a failure. For example, a method can involve detecting...
Stateless flexible boot control
Techniques are provided herein for optimizing boot order for devices in a data center environment. These techniques may be embodied as a method, apparatus and...
Evaluating user contacts on an electronic communication network
A system for evaluating network users comprises one or more processors communicatively coupled to one or more memories operable to receive, over a network...
Almost blank subframe based orthogonal resource allocation in a wireless
An example method for facilitating almost blank sub-frame (ABS) based orthogonal resource allocation in a wireless network environment is provided and includes...
Technique for improving LDP-IGP synchronization
A technique may improve LDP-IGP synchronization in a MPLS network when an interface of a router coupled to a communications link along a shortest path between a...
Conveying subscriber information to service chain services using tunnel
protocol header encapsulation for...
A method provided in one embodiment includes receiving, at a first network element, a first data packet of a data flow, wherein the data flow is associated with...
System and method for load based optimization in communication networks
Systems and methods for providing load based optimizations in communication networks are provided. A network device that provides network management and...
Method and system for video conferencing units
In one embodiment a system and method is described, the system and method including a first camera, which, when activated, captures a first video of a first...
Attack mitigation using learning machines
In one embodiment, techniques are shown and described relating to attack mitigation using learning machines. A node may receive network traffic data for a...
Forwarding to clusters of service nodes
Systems, methods, and computer-readable storage media for forwarding traffic to clusters of nodes. A system can group nodes in a network fabric into a cluster...
System and method for providing a translation mechanism in a network
An example method is provided and includes receiving a packet associated with a flow, determining a tunnel identifier for the flow, and determining a flow...
Real time and high resolution buffer occupancy monitoring and recording
Presented herein are techniques for detection and characterization of buffer occupancy of a buffer in a network device. Packets are received at a network...
Detecting VLAN registration protocol capability of a switch in a computer
In particular embodiments, a first switch implementing a first virtual local area network (VLAN) registration protocol and connected to a first end of the trunk...
Managing router advertisement messages to support roaming of wireless
mobile client devices
Techniques are provided to manage how router advertisement messages are forwarded for ultimate wireless transmission in a wireless network. In one embodiment, a...
Monotonic segmented digital to analog converter
In one implementation, a digital analog converter (DAC) is monotonic because the output moves only in the direction of the input and segmented because a more...
Protection against fading in a network ring
A method provided in one example embodiment includes detecting a first current bandwidth of a first link in a network ring, where the first current bandwidth...
Wireless TCP link state monitoring based video content adaptation and data
Systems and methods are used for receiving a video request from a user equipment for video to be downloaded; determining a link bandwidth status associated with...
Generating and rendering synthesized views with multiple video streams in
telepresence video conference sessions
Techniques are provided for establishing a videoconference session between participants at different endpoints, where each endpoint includes at least one...
Connection persistence across server farms in a network environment
An example method for connection persistence across server farms in a network environment is provided and includes associating a first real server with a first...
Automatic configuration of external services based upon network activity
System, computer program product, and method to configure an external network based on internal network conditions, by monitoring a load attribute of one or...
Subscriber dependent redirection between a mobile packet core proxy and a
cell site proxy in a network environment
A method is provided in one example embodiment and includes receiving, by a first proxy within an access network, a first request for content associated with a...
Automated control plane for limited user destruction
To avoid user error and breaking operations, administration and management (OAM), the control plane for implementing OAM is automatically generated by network...
Smart pause for distributed switch fabric system
Techniques for improving the performance of flow control mechanisms such as Pause are provided. The techniques provide for maintaining a fair distribution of...
Reliable packet delivery with overlay network (RPDON)
In one embodiment, a device in a computer network establishes a reliable map that defines a set of packet criteria for which reliability is desired over an...
Multicast handling in a transparent interconnect of lots of links based
data center interconnect
In some embodiments, a global tree structure identifying rendezvous points between a layer 1 network area and a layer 2 network area may be created. When the...
Computing risk-sharing metrics in shared-media communication networks
In one embodiment, a routing node determines a risk-sharing metric between pairs of nodes in a shared-media communication network, and may then compute a...
Replacing an existing network communications path with a new path using
some exclusive physical resources of...
In one embodiment, a replacement network communications path is determined using dedicated resources of an existing path. One or more network elements in a...
An apparatus may be provided. The apparatus may comprise a first circuit portion, a second circuit portion, and a third circuit portion. The first circuit...
Video trick mode system
A method for producing an auxiliary video stream arranged for reverse trick mode playback from a video stream including a plurality of uni-directional predicted...
Methods and apparatus for synthesizing multi-port memory circuits
Multi-port memory circuits are often required within modern digital integrated circuits to store data. Multi-port memory circuits allow multiple memory users to...
System and method for whitelist management
A method is provided in one embodiment and includes receiving a request for a session at a network element; communicating a query for whitelist data to a...
Quality optimization with buffer and horizon constraints in adaptive
Techniques are provided for optimizing quality in adaptive streaming, where information is obtained relating to encoding bitrates and content quality scores for...
Digital video compression system, method and computer readable medium
A video decoding method including: receiving an encoded block of data; decoding the encoded block of data to generate decoded data; and performing a sample...
Generating a video pane layout
A first video conferencing device determines pane sizes of a plurality of video content to be displayed at a second video conferencing device, where the pane...
Displaying information about at least one participant in a video
In one embodiment, a method is provided in a video conference session which has a video stream, an audio stream and an information stream between at least one...
Using values represented as internet protocol (IP) addresses to access
resources in a non-internet protocol...
Non-Internet Protocol (IP) centric resources are accessed based on a value in the form of an IP address. This value (represented as the IP address) is converted...
Dynamic scaling for multi-tiered distributed systems using payoff
optimization of application classes
In one embodiment, a method is described. The method includes: monitoring workloads of a plurality of application classes, each of the application classes...
A method and system for anonymous purchase by a first user device, is described, the method and system including sending R from the first user device to a...
Merging fibre channel fabrics
A Fiber (Fiber) Channel (FC) switch and related methods are provided for merging FC fabrics. During a merger process of two separate FC fabrics, a principal...
Configurable service proxy local identifier mapping
Presented herein are techniques in which a service proxy in a service node is configured to receive a packet encapsulated in a service header that includes a...
Identifying, translating and filtering shared risk groups in
A method, apparatus, and computer-readable storage medium are disclosed for processing shared risk group (SRG) information in communications networks. The...
Remote probing for remote quality of service monitoring
In one embodiment, a targeted node in a computer network receives a probe generation request (PGR), and in response, generates a link-local multicast PGR...
Method to detect suboptimal performance in boundary clocks
In one example embodiment, a method to detect suboptimal boundary clocks is described for a node in a communications network. The method can include determining...
Methods and devices for performing dynamic droop compensation
Provided herein are systems, methods and devices for performing droop compensation. In particular, systems, methods and devices for performing droop...
System and method for secure provisioning of virtualized images in a
An example method includes setting up a secure channel between a blade and a provisioning server in a network environment, downloading an image of a virtual...