At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Methods and apparatus for determining reverse path delay
According to the present invention, methods and apparatus are provided for determining components of a round trip time (RTT). A source node sends data to a...
Network-triggered quality of service (QoS) reservation
A method includes a network originating a QoS reservation message and communicating the network-originated QoS message through a radio access network (RAN) from...
Computer network with point-to-point pseudowire redundancy
A computer network includes a core network connected with first and second Ethernet access domain networks, each of Ethernet access domain networks including a...
Techniques utilizing thermal, EMI and FIPS friendly electronic modules
An electronic system includes a chassis defining a substantially plane-shaped cavity. The chassis is arranged to contain an air stream (e.g., provided by a...
System and method for determining whether to dynamically suppress data in
a communications environment
A method for communicating data is provided that includes receiving a plurality of bits associated with a communications flow and inspecting the bits. The method...
Press fit electronic component
Disclosed is a press fit electronic component for a light emitter. The electronic component comprises at least one light emitter and at least one connection lead...
Wireless access point
Method for decoding tail-biting convolutional codes
A method for decoding tail-biting convolutional codes is disclosed. In the method, all beginning states of a trellis diagram are initialized. Forward Viterbi...
System and method for achieving machine authentication without maintaining
A Machine Authentication PAC (Protected Access Credential) serves as machine credentials to obtain network access without requiring server storage and management...
Method and system for reducing cache warm-up time to suppress transmission
of redundant data
In one embodiment, an optimizing device is used to suppress transmission of redundant data over networks. The first optimizing device receives information...
Supplemental queue sampling technique for packet scheduling
A technique for improving utilization of a data link coupled to a network. Scores are generated for one or more data flows that transfer onto the network via the...
Techniques for dynamic host configuration using overlapping network
Techniques for managing leased network addresses for multiple networks using overlapping address spaces include storing banks of addresses corresponding to the...
Relaying of message waiting indications to support distributed telephony
In a telephony system have management of telephony devices distributed among multiple call management devices, the call management devices use call redirection...
Configuration commit database approach and session locking approach in a
two-stage network device configuration...
A method and apparatus for modifying the configuration of a network device, such as a router, using a two-stage configuration model is provided. A first request...
Method and apparatus for auto-configuring layer three intermediate
computer network devices
A method and apparatus for auto-configuring layer 3 intermediate devices in computer networks by extending the Dynamic Host Configuration Protocol (DHCP). The...
System and method for server farm resource allocation
Techniques and systems for server farm load balancing and resource allocation are disclosed. In one embodiment, a method of load balancing can include: arranging...
Methods and apparatus for bootstrapping Mobile-Foreign and Foreign-Home
authentication keys in Mobile IP
Methods and apparatus for dynamically generating authentication keys are disclosed. Specifically, a Mobile-Foreign authentication key is separately generated by...
Technique for sharing a physical port among a plurality of virtual bridges
on a switch in a computer network
A technique shares a port (e.g., a physical port) among a plurality of virtual bridges on a switch in a computer network. According to the novel technique, two...
Automatic protection of an SP infrastructure against exterior traffic
A method and system for protecting valuable resources within an autonomous system network. Address prefixes within the system are designated as valuable and a...
Access network clusterhead for providing local mobility management of a
roaming IPv4 node
An IPv4 host is able to maintain connectivity within an access network while moving among access points of the access network, based on receiving a unique...
Out of band data base synchronization for OSPF
A method and apparatus resynchronizes a link state database (LSDB) of a non-stop forwarding (NSF) router with the LSDB of a neighboring router ("neighbor") while...
Method and system for transmitting messages in a communications network
A method and system for transmitting messages in a communications network is disclosed. A signaling gateway receives a message directed to a destination circuit....
Automatic propagation of circuit information in a communications network
Disclosed is a method and associated apparatus for automatically propagating circuit information in a network. In one embodiment, a network includes multiple...
Method and system for providing wireless-specific services for a wireless
A method and system for providing wireless-specific services for a wireless access network includes receiving at a call agent of a wireless access network a call...
Method and System for Joining a virtual talk group
A method for joining a virtual talk group includes facilitating communications of a virtual talk group. The virtual talk group includes a plurality of endpoints...
Tracing connection paths through transparent proxies
In one embodiment, a method for tracing a connection path from a source node to a destination node through a network having one or more transparent proxies...
Packet fiber node
A packet fiber node is described for use in an access network such as, for example, a cable network. The packet fiber node may differ from convention RF fiber...
Upstream physical interface for modular cable modem termination system
A modular Cable Modem Termination System (CMTS) includes a packet shelf operating a Data Over Cable Service Interface Specifications (DOCSIS) Media Access...
System and method for detecting and recovering from virtual switch link
A system and method detects and responds to failures occurring in a virtual switch. The virtual switch is formed from two or more physical switches...
Technique for connecting fax machines with advanced capabilities over a
network which is not adapted to handle...
An improved method and system for connecting Super Group 3 fax machines over network gateways that operate using the un-enhanced T.38 protocol. With the present...
Method and apparatus for comparing access control lists for configuring a
security policy on a network
Two or more access control lists that are syntactically or structurally different may be compared for functional or semantic equivalence in order to configure a...
Method and apparatus for reducing network traffic over low bandwidth links
A method is disclosed for reducing network traffic. At a sender, a data chunk is identified for transmission to a receiver, which is connected to the sender over...
Rich multi-media format for use in a collaborative computing system
A system, method, and article of manufacture that allow a document containing custom objects to be shared in a distributed collaborative computer system. This is...
Asynchronous transfer mode (ATM) switch and method for switching ATM
An asynchronous transfer mode (ATM) switch includes a switch memory having a plurality of discrete queues. A queue is dedicated to a connection in which a...
System and method for providing shared line appearances in a distributed
call routing network
A method for routing calls in a packet-based network includes receiving a call request at a first call manager from a device that is coupled to the packet-based...
Diversity transceiver for a wireless local area network
A wireless local area network system comprises a 5.0+ GHz radio transceiver with two receiving antennas and one transmitting antenna. A transmitter power...
Method and system for automatic configuration of virtual talk groups based
on location of media sources
A method for automatic configuration of virtual talk groups based on location of media source includes monitoring communications from a plurality of mobile...
Method and apparatus for monitoring network traffic
A method of monitoring network traffic flows of network traffic elements between locations in a data communications network is disclosed. The method comprises...
System and method for performing distributed policing
Various systems and methods that synchronize local copies of a variable used in a distributed algorithm, such as that used in distributed policing. For example,...
Avoiding unnecessary RSVP-based preemptions
A technique avoids unnecessary preemption of resource reservations along a requested flow between nodes in a computer network. A node receives priority-based...
Techniques for generating cyclic redundancy check (CRC) values
Techniques for generating cyclic redundancy check (CRC) values are provided. Bit messages that are to be transmitted to recipients are aligned to desired byte...
Arrangement in a network for passing control of distributed data between
network nodes for optimized client...
A network has network nodes for storage of respective copies of a data file. One of the network nodes has a corresponding unique locality control object for the...
TTL exploration technique for determining capabilities and configuration
of a peer router
An exploration technique allows a router to efficiently determine capabilities and configuration of a neighbor (peer) router. In addition, the technique enables...
System for selecting the operating frequency of a communication device in
a wireless network
A system for automatically selecting communication frequencies for wireless communication devices (e.g., base unit, access point, and controller) being added to...
Method for allocating channel resources for improving frequency
utilization efficiency of wireless...
A method for improving a frequency utilization efficiency for a wireless communication system having a plurality of cells includes the following steps. At least...
Optical add/drop multiplexer with reconfigurable add wavelength selective
A reconfigurable WDM add/drop multiplexer and its method of operation at an add/drop node on an optical fiber carrying a plurality of WDM signals is described....
Multi-functional line card for metro optical applications
Methods and apparatus for allowing a dense wave division multiplexing (DWDM) line card w to function as an add/drop multiplexer (ADM), a transponder, and a...
System and method for providing support for multipoint L2VPN services in
devices without local bridging
A network device has a network interface to allow the device to send and receive traffic across a network. The device also has a cable connection to allow the...