At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
OAM and time slot control in a deterministic ARC chain topology network
In one embodiment, a network of nodes is configured to communicate according to a configuration of Available Routing Construct (ARC) chains as well as...
Reducing proliferation of network-to-link-layer address resolution
In one embodiment, the processing by a packet switching device of a received network-to-link-layer address resolution request message (e.g., Address Resolution...
Flexible deterministic binary scheduler
A method for allocating port assignments for transmitting a reserved network stream across a network node comprises determining a cycle time associated with a...
Application services based on dynamic split tunneling
One embodiment provides selectively routing Domain Name System (DNS) request for sub-domains associated with a first network through a tunnel associated with...
Bi-directional flow stickiness in a network environment
An example method for bi-directional flow stickiness in a network environment is provided and includes receiving a packet of a flow from a source address in a...
Recording packet routes using bloom filters
In one embodiment, a Bloom filter is provided in a data packet signal functional to preferably encode the identifier of each nodal device and record the nodal...
Light emitting diode (LED)-based multi-bitrate data links
In one embodiment, a method comprises receiving, by an apparatus, first data at a first bitrate and second data at a second bitrate faster than the first...
Raman-based static and dynamic tilt control in an optical system
An optical fiber carries optical channels injected into the optical fiber to a Raman amplifier. A controller determines a static tilt associated with the...
Reflection based tracking system
In one embodiment, a processor can receive data representing a view reflected by a mirror of a plurality of mirrors. The plurality of mirrors may be configured...
Automatically determining relative locations of collaboration endpoints
within a building
Techniques are presented herein for a server to automatically determine the locations of collaboration endpoints and user devices throughout a building, and...
Muting a sound source with an array of microphones
A processing system can include tracking microphone array(s), audio-tracking circuitry configured to detect a location of audio sources from audio signals from...
Automatic image alignment in video conferencing
In one implementation, at least two images are captured from a respective at least two cameras of a telepresence system. The at least two cameras have...
Hierarchical event detection in a computer network
In one embodiment, network data is received at a first node in a computer network. A low precision machine learning model is used on the network data to detect...
Target-based SMB and DCE/RPC processing for an intrusion detection system
or intrusion prevention system
A method performed in a processor of an intrusion detection/prevention system (IDS/IPS) checks for valid packets in an SMB named pipe in a communication...
Network attack detection using combined probabilities
In one embodiment, a device in a network receives a set of output label dependencies for a set of attack detectors. The device identifies applied labels that...
Secure over-the-air provisioning solution for handheld and desktop devices
In one embodiment, a device and a services provisioning system establish an over-the-air connection with each other, and perform device posture validation to...
Distributed proxy addressing operations
An addressing redirection mechanism is initiated at a first networking device in a computing network in order to enable the first networking device to perform...
CDNI request routing using flow metadata
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium for Content Delivery Networks Interconnection (CDNI) request...
Method and apparatus for supporting call admission control using graph
assembly and fate-share identifiers
In one embodiment, a method includes obtaining a potential bandwidth deduction at a call agent, the call agent being associated with an intercluster call...
Standby bandwidth aware path computation
At a first network device, a plurality of paths through a network from a source network device to a destination network device are determined. A vacant...
System and method for tracking packets in a network environment
A method is provided in one example embodiment that includes transmitting a message from a first port to a second port, recording a timestamp of the message at...
Domain classification using domain co-occurrence information
Domain classification based on domain co-occurrence information derived from client request behavior is provided. The network requests of clients are analyzed...
System and method for management of network-based services
In one embodiment, a system includes an interface configured to receive a first request sent from a first customer for a first service provided by a first...
Seamless segment routing
In one embodiment, a packet and a segment ID stack is received at a node. The segment ID stack includes a plurality of segment IDs, one or which is a first...
Autonomic network sentinels
Autonomic network sentinels are disclosed. An occurrence of a particular network condition is detected at a network entity. The network entity compares the...
Policy-driven automatic redundant fabric placement mechanism for virtual
In one embodiment, a service provider management device provides a plurality of redundant fabric motifs, each indicating a subgraph pattern of logical...
Fast protection switchover in a transport network
Presented herein are techniques that enable fast switchover or reversion between label switched paths. In accordance with examples presented herein, a working...
Power conservation and latency minimization in frequency hopping
In one embodiment, a communication device samples a particular frequency hopping sequence during only a particular specified sub-timeslot of a timeslot. If a...
Distributed intelligence architecture with dynamic reverse/forward
In one embodiment, a grid application function is hosted at a primary grid device in a utility grid, which may determine whether or not to distribute at least a...
Providing reconstructed data based on stored aggregate data in response to
queries for unavailable data
In an embodiment, a method comprises dividing collected data into data clusters based on proximity of the data and adjusting the clusters based on density of...
Methods and apparatus for error detection and correction in data storage
systems using hash value comparisons
Data processing methods and apparatus for processing stored data with error correcting bits to detect and in some instances correct errors. The data processing...
Bridging wireless and wired media in a computer network
In one embodiment, a transmitting node may be configured to transmit a wireless advertisement frame over a computer network, wherein the frame includes a source...
Apparatus, systems, and methods for providing interworking gateway
Systems and methods are provided that allow inter-working between communication networks for the delivery of service to mobile nodes. A gateway is provided that...
Contribution and attendance for recurring meetings
In one implementation, a periodic teleconference for multiple participant endpoints is established. The periodic teleconference occurs on multiple dates or...
Identifying and enhancing motion video in a conference call channel by
Presented herein are techniques for detecting whether a presentation video stream in a conference call includes motion video. In an embodiment, this can be done...
System and method for dynamically allocating stream identifiers in a
multi-encryption transport system
The present invention is suitable for use in a multi-encrypted system that dynamically allocates stream identifiers in a second stream depending upon the...
Group member recovery techniques
Techniques are presented for optimizing secure communications in a network. A first router receives from a second router an encrypted packet with an unknown...
System and method for secure cloud service delivery with prioritized
services in a network environment
An example method includes receiving a request for a cloud capability set during an Internet Key Exchange negotiation associated with a virtual private network...
Recursive DNS nameserver
A recursive DNS server receives a request for domain name information associated with a domain name from a subscriber. In response to the request for domain...
Line-rate selective load balancing of permitted network traffic
In one embodiment, an indication of a plurality of network nodes, load balancing criteria, and one or more access control list (ACL) entries are received. A...
Mitigating the effects of congested interfaces on a fabric
Techniques are provided for mitigating the effects of slow or no drain devices on a fabric. One or more of the described embodiments can be used alone or in...
Contextual summarization tag and type match using network subnetting
Techniques are presented herein to distribute the processing of communication to network-connected devices to routing nodes, as opposed to centralizing those...
Methods and systems for data packet routing
Optimizing a bitmap data tree and a corresponding lookup operation in the bit map data tree may be provided. A number of branches for each search node of a data...
Packet switching device including cascaded aggregation nodes
In one embodiment, a packet switching device includes one or more host devices and a cascade of aggregation nodes. The aggregation nodes aggregate customer...
Duplicating traffic along local detours before path remerge to increase
In one embodiment, a source node monitors a quality of a primary link, and forwards one or more duplicate copies of a packet in response to poor quality of the...
Passing data over virtual links
Passing data over virtual links is disclosed, including: encapsulating a layer three data packet as an inner payload of a network data packet; and generating an...
Scalable federated policy for network-provided flow-based performance
The present disclosure describes methods and systems for providing and enforcing scalable federated policies for network-provided flow-based performance...
Bandwidth on-demand services in multiple layer networks
Bandwidth usage for an existing communication tunnel between a first device and second device is monitored. A determination is made that additional bandwidth is...
Scalable edge node protection using IPv6 segment routing extension header
In one embodiment, a method comprises selecting, by an ingress provider edge router, one of first or second provider edge routers as a primary router for...