At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Map routing technique implemented in access networks
An improved addressing scheme is disclosed for use in access networks. According to a specific embodiment, upstream and/or downstream channels may be grouped...
Dynamic and intelligent buffer management for SAN extension
In a network system for transporting GFP-encapsulated Fibre Channel/FICON data across a SONET/SDH transport network between two Fibre Channel/FICON ports, a...
Scaling VLANs in a data network
In one embodiment, a technique for processing data packets in a data network comprising a plurality of virtual local area networks (VLANs) is disclosed. A data...
Border router with selective filtering of link state advertisements
An example embodiment of the present invention provides a process relating to the selective filtering of an LSA at a not-so-stubby-sub-area (NSSSA) border...
Method and system for resolving switch number conflicts in a stackable
A method for resolving switch number conflicts in a stackable switch system includes communicating a message between switches in the stackable switch system and...
Configurable network appliance
An Internet appliance accesses an HTML page on a Web site containing configuration information for the appliance, such as an Internet compatible telephone. Data...
Converting a network device from data rate traffic management to packet
A network device that manages the flow rate of a stream of packets traveling within a network is converted from managing based on data rate to managing based on...
Downstream channel change technique implemented in an access network
A dynamic channel change technique is disclosed which may be implemented between nodes and a Head End of an access network. Initially a network device may...
Method and apparatus for replicating a transport layer protocol stream
Network connection switchover is accomplished through a method comprising receiving information defining a first connection between a first network device and a...
Methods for verifying correct counter-bore depth and precision on printed
A test site is incorporated on a circuit board having a set of test connections passing through a test via on respective test connection layer, the test...
Method and system for generating user group permission lists
A method and apparatus for generating user group identifiers using a permissions matrix is disclosed. The permissions matrix includes an entry that is associated...
System and method for changing network behavior based on presence
A system and method for changing network behavior based on presence information includes detecting one or more presence indicators. The one or more presence...
Dynamic path computation element load balancing with backup path
In one embodiment, a first path computation element (PCE) operates between first and second network domains, and is adapted to service requests from path...
Rule-based network management approaches
A method is disclosed for detecting symptoms in a network infrastructure, combining one or more symptoms into a problem, then optionally applying detailed...
Scalable IP-based notification architecture for unified messaging
A notification architecture utilizes multiple processes configured for managing notification operations based on reception of SMTP-based messages within IMAP...
Methods for ring tone supression informing and for informing a cellular
telephone with configuration data
Methods for suppressing ring tones in cellular telephones and for informing a cellular telephone with configuration data are described. The method for informing...
Method for computing beamforming weighting vectors with collaborated
A method and system are provided for computing beamforming weighting vectors with collaborated uplink sounding in a wireless communications network. The method...
Adaptive AGC in a wireless network receiver
An apparatus, a carrier medium storing instructions to implement a method, and a method for controlling the gain of a radio receiver for receiving packets of...
Methods and apparatus for implementing VPN services
Implementation of a VPN service such as a VPLS (Virtual Private Local area network Service) is performed utilizing a two-stage process. A first stage of the...
Methods and apparatus for home address management at home agent for NAI
based mobile nodes
The present invention provides methods and apparatus for managing an IP address assigned to a Mobile Node. In one embodiment, the Mobile Node appends an...
Peer-model support for virtual private networks having potentially
A method for operating a router has the following steps. First, the router receives a data packet to be forwarded, the data packet having an indication that it...
Transparent network service enhancement
Embodiments of the invention may be used to optimize communications between a first routing device and a second routing device. The first routing device may...
Classifying data packet protocol values
An apparatus for classifying data packet protocol values in a packet architecture comprising a packet header and a packet payload including an extension header...
Packet-switched telephony with circuit-switched backup
A packet voice switch 60 and method for its operation are disclosed. The switch comprises a network switching means, preferably implemented within its host...
Virtual IP-based A/V inputs for universal media servers
In one embodiment, a universal media server (e.g., a set-top box) has zero or more physical audio and/or video (A/V) inputs configured to receive A/V data, and...
Ad hoc network formation and management based on aggregation of ad hoc
nodes according to an aggregation hierarchy
Each mobile ad hoc node has an assigned hierarchy position within an identified tree-based aggregation group. Each ad hoc node is configured for selectively...
Root node shutdown messaging for multipoint-to-multipoint transport tree
In one embodiment, a method comprises registering, by a first label switching router having been identified as a root of a prescribed transport tree for...
Determining traffic flow characteristics in a storage area network
Methods and apparatus are provided for determining traffic characteristics and statistics for storage area network flows. An intelligent line card associated...
ARQ in a point to multipoint network
The systems and methods for incorporating an automatic retransmission mechanism into a point to multipoint network MAC layer that does not already incorporate...
Setting pre-congestion notification admission and preemption thresholds in
A method and apparatus for setting admission and preemption thresholds in a computer network are disclosed. In one embodiment, a method includes receiving...
Digital video camera with built-in connector
Method and apparatus for communicating over a resource interconnect
A resource interconnect architecture and associated descriptor protocol provides more efficient communication between different resources in a data processing...
Caching content and state data at a network element
Methods are disclosed for caching content and state data at a network element. In one embodiment, data packets are intercepted at a network element. An...
Partitioned packet processing in a multiprocessor environment
A packet processing system includes multiple processors and a set of code partitions that implement a feature set for packet processing. Each of the processors...
Method and apparatus to minimize database exchange in OSPF by using a
SHA-1 digest value
The present invention provides a method of determining whether database located on a first router is synchronized with the database located on a second router by...
Spatio-temporal processing for communication
A space-time signal processing system with advantageously reduced complexity. The system may take advantage of multiple transmitter antenna elements and/or...
Method and apparatus for using stuffing bytes over a G.709 signal to carry
Methods and apparatus for allowing containers in an optical transport network to be shared between users are disclosed. According to one aspect of the present...
Inline power for multiple devices in a wired data telecommunications
A power sourcing equipment-powered device (PSE-PD) combination unit requests inline power from a connected PSE or other PSE-PD combination unit by having the PD...
Audio-to-video synchronization system and method for packet-based network
Synchronizing audio and video streams in packet-based networks requires synchronization of packet timestamps. The present invention provides such synchronization...
Loop prevention technique for MPLS using service labels
A local fast reroute (FRR) technique is implemented at the edge of a computer network. In accordance with the technique, if an edge device detects a node or link...
Network media adapter
Access point circuit receptacle
Method and system for analyzing source code
Methods and systems are provided for analyzing a source code. The method includes collecting function entry information during the execution of tests on the...
Method of ensuring consistent configuration between processors running
different versions of software
A method of establishing and maintaining a consistent configuration state of a first processor, running on a first version of operating software, and a second...
Method and apparatus for creating a secure communication channel among
multiple event service nodes
An approach for establishing secure multicast communication among multiple event service nodes is disclosed. The event service nodes, which can be distributed...
Preallocation of client network address translation addresses for
An improved client network address translation ("NAT") system is provided. Methods are provided for initializing connection control blocks with the client NAT...
Method and apparatus for defining a user specific configuration
A method for identifying an expected configuration environment defined by configuration parameters typically employed by a user, and seamlessly applying the...
Initialization and acquisition of peers in a peers' list in a peer-to-peer
A method for creating an initial list of peers in a peer-to-peer (P2P) network comprising initiating a connection from a spy node to a suspect node in the...
Deploying network element management system provisioning services
A method and apparatus for deploying EMS provisioning services is provided. A communication to administer a particular service on a network element is...