At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Content service on demand
A method is provided and may include receiving a request for a network content delivery service from an access device; directing the access device to a network...
Cross-protocol communication in domain name systems
Systems and methods for processing domain name system requests in accordance with subscriber information are provided. A request for domain name information can...
Detection of a misconfigured duplicate IP address in a distributed data
center network fabric
Presented herein are techniques to detect a misconfigured duplicate Internet Protocol (IP) address in a distributed data center network fabric. A network...
Reporting radio access network congestion information in a network sharing
A method is provided in one example embodiment and includes detecting user plane congestion at an eNodeB in connection with subscribers of a first one of a...
Distributed network address and port translation for migrating flows
between service chains in a network...
An example method for distributed network address and port translation (NAPT) for migrating flows between service chains in a network environment is provided...
System for conversational link aggregation resolution in a network switch
Some implementations provide a method that includes: (i) receiving a list of logic link aggregations (LAGs) within a computer network, the list identifying a...
Providing virtual private service chains in a network environment
A method provided in one embodiment includes receiving a first data packet of a data flow at a first classifier in which the first data packet includes a first...
Pure control-plane approach for on-path connection admission control
operations in multiprotocol label...
The embodiments described herein present methods and apparatuses for on-path CAC operations in a MPLS-VPN environment. In an example embodiment, an ingress PE...
Seamless multipath retransmission using source-routed tunnels
In one embodiment, a device receives a destination unreachable message originated by a particular node along a first source route, the message carrying an...
Failover procedure for networks
In an example embodiment, there is disclosed an apparatus comprising a plurality of ports and routing logic coupled with the plurality of ports. The routing...
Generating a loop-free routing topology based on merging buttressing arcs
into routing arcs
In one embodiment, a method comprises creating, in a computing network, a loop-free routing topology comprising a plurality of routing arcs for reaching a...
Network topologies for energy efficient networks
One embodiment identifies all one-hop neighbor nodes and two-hop neighbor nodes of a node; determines an active set of one-hop neighbor nodes for the node,...
Automatic resolution of virtual network instance to VLAN mapping conflicts
in dual-homed deployments in a...
In accordance with one example embodiment, there is provided a system configured for virtual local area network (VLAN) blocking on a virtual port channel (vPC)...
Differentiated quality of service using security as a service
Various embodiments are disclosed for prioritizing network flows and providing differentiated quality of service in a telecommunications network. In some...
Remote secure device management in smart grid ami networks
Presented herein are techniques for securely configuring or managing devices in a variety of geographic locations. At a device manager for a device, a first...
Intelligent wiring in a low power and lossy network
In one embodiment, the locations of a plurality of network devices in a low power and lossy network (LLN) are determined along an intelligent wire. One or more...
Passing hidden information using attack detectors
An electronic device (22) includes a communication interface (36) and a processor (30), which is configured to store and process secret information and to...
Distributed approach for feature modeling using principal component
In one embodiment, techniques are shown and described relating to a distributed approach for feature modeling on an LLN using principal component analysis. In...
Faceplate for a computing device
In one embodiment, an apparatus includes a faceplate for a computing device. The faceplate includes a first side and a second side. The faceplate also includes...
Multi-axis graded-index photonic coupling
An optical coupling may involve orienting a waveguide and a lens such that light rays are focused on a surface. The lens may involve the use of a material...
ICM optimization and standardization for automation
An apparatus may be provided. The apparatus may comprise a circuit board. In addition, the apparatus may comprise an integrated connector mounted to the circuit...
Wireless mesh network including resilient backhaul links and WLAN traffic
A wireless mesh network includes mesh APs and a root AP forming a root of a tree of the mesh APs in which the mesh APs are linked back to the root AP over...
System and method for resource management for operator services and
A method is provided in one example embodiment and includes maintaining geographical information for a plurality of WiFi access points; and managing radio...
Managing wireless beacon devices
Wireless transmissions from beacon devices are received at a plurality of receiver devices. The wireless transmissions comprise packets that carry information...
Distributing audio video content
A method of distributing audio video content is described. The method includes: receiving configuration data for a plurality of devices; for each device in the...
Reconstructing a multi-latticed video signal
An apparatus for facilitating reception of multiple representations of a video signal. In one embodiment, the apparatus includes a mechanism for receiving...
Flow matching optimization in scaled environments
In one embodiment, a method includes identifying at a network device, a number of items for matching at a hash table, the number of items exceeding matching...
System and method for locating a boundary point within adaptive bitrate
A method is provided in one example and includes determining an occurrence of an exception to a predetermined cadence associated with an input stream of a...
Applying a mitigation specific attack detector using machine learning
In one embodiment, a device in a network detects a network attack using aggregated metrics for a set of traffic data. In response to detecting the network...
Method and apparatus for best effort propagation of security group
A method and system for best effort propagation of security group information is disclosed. The method includes determining if a reserved group identifier is...
Fibre channel over ethernet (FCoE) over virtual port channel (vPC)
In one embodiment, a method includes instantiating a virtual Fiber Channel over Ethernet (FCoE) Forwarder (FCF) at a primary FCF, the virtual FCF associated...
Network virtualization using IP map and encapsulation
In one embodiment, a method includes receiving a packet at a first provider edge device in communication with a mapping system comprising mappings of customer...
Network architecture for minimalistic connected objects
In one embodiment, a network architecture comprises minimalistic connected objects (MCOs), distributed intelligence agents (DIAs), and central intelligence...
Distributed service chaining in a network environment
An example method for distributed service chaining in a network environment is provided and includes receiving a packet belonging to a service chain in a...
Virtual links for network appliances
Creating virtual links is disclosed, including: determining a first network appliance to configure to communicate with a second network appliance using a...
Provisioning services in legacy mode in a data center network
An administrator can define or modify one or more service graphs. Next, the administrator can register service appliances along with their device package files...
Method and apparatus for providing tenant information for network flows
In one embodiment, a method includes generating at a network device comprising a virtual switch, a tenant record comprising tenant information for a context...
Notification of audio state between endpoint devices
In one embodiment, a method includes receiving at a server in communication with a plurality of user devices, a notification of a mute state change at a first...
A method, system and apparatus for deriving a secondary secret from a root secret are described, the method, system and apparatus including reserving a memory...
Dynamic bandwidth allocation in TDMA communication systems
Techniques are presented herein for use in a Time Division Multiple Access (TDMA) communication system in which devices send transmissions to each other in time...
Cycle accurate state analysis with programmable trigger logic
In one embodiment, cycle-accurate information may be collected by stopping an input clock associated with a functional block of a SoC using a programmable...
System and methods for memory expansion
This document discusses, among other things, an example system and methods for memory expansion. An example embodiment includes receiving a memory request from...
System and method for process run-time prediction
Various embodiments provide process run-time prediction for processes running on server computers. In one embodiment, process run-time of a process is...
Rack mounting kit for telecommunications equipment and rack cross brace
A rack mounting kit is configured to allow mounting of a telecommunications equipment chassis into a rack by a single person. The rack mounting kit includes two...
Operation of base station in a cellular communications network
In one embodiment, a method of forming a neighbor cell list in a base station of a cellular communications network comprises, at periodic intervals, and for...
System and method for providing randomization in adaptive bitrate
A method is provided in one example embodiment and includes receiving video data at an adaptive bitrate (ABR) client that includes a buffer; determining whether...
Classification of security policies across multiple security products
A management entity connects with multiple security devices across a network. Each security device operates in accordance with one or more security policies....
RFID for available resources not connected to the network
Disclosed are apparatus and techniques for providing presence and location information from available media resources to participants in a media conference so...
Dynamic source route computation to avoid self-interference
In a multiple interface, low power and lossy network comprising a plurality of devices, interface options for a source route to minimize self-interferences are...
Loop avoidance during network convergence in switched networks
Various techniques can be used to avoid loops during network convergence after a topology change such as a failure. For example, a method can involve detecting...