At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method of providing network services
A method of providing network services is described. The network includes a number of nodes, each one of which is coupled to at least one other of the nodes by...
Methods and apparatus for switching between Metro Ethernet networks and
According to the present invention, methods and apparatus are provided to allow efficient switching of frames for transmission between a Layer 2 Virtual Local...
Arrangement for providing ISUP transparency across voice over packet
networks based on determined exchange type
A Voice over Packet (VoP) network includes an ingress gateway and an egress gateway for transparent transport of signaling messages between source and...
Extending multicast applications available on data networks to cell-based
A mobile node on a cell-based wireless network (e.g., implemented using GSM) may indicate multicast applications (provided on a data network) of interest and...
Mobile network automatic tunnels
In one embodiment, a received data packet is delivered by a routing resource to a tunnel interface resource in response to determining that the received data...
Mobile network device multi-link optimizations
Methods and apparatus for performing optimizations for a mobile network device such as a Mobile Node or Mobile Router supporting multiple links to a Home Agent...
Method and system for providing interoperable communications with location
A method for providing interoperable communications with location information includes receiving communications from a plurality of virtual talk groups. Each...
Method and apparatus for discovering the incoming media path for an
internet protocol media session
A system and technique for analyzing incoming packets. The path taken by incoming packets can be analyzed from a near end without having access to the far end....
Method and system for accelerating route calculation in link state routing
A method and system for performing route calculations in a link state routing protocol at a node within a computer network. The method includes evaluating...
Soft notification messaging for a routing protocol
A soft notification technique isolates address family application based errors or events occurring within a routing protocol, such as the Border Gateway Protocol...
Loop prevention technique for MPLS using two labels
A fast reroute (FRR) technique is implemented at the edge of a network. In accordance with the technique, if an edge device detects a node or link failure that...
System and method for resolving address conflicts in a network
A system for resolving address conflicts in a network. In an illustrative embodiment, the system includes an address-configuration module that is adapted to...
Method for routing information over a network
A method of operating an optical network is described. The network includes a number of nodes connected by a number of links. A method according to the present...
System and method for multi-session establishment involving disjoint
authentication and authorization servers
A system and method that supports disjoint authentication server farms and disjoint policy or authorization servers for multi-session establishment. The...
Method for managing contents of a web site
A method for managing contents of a web site. A request to access a web site is received from a requestor, wherein the web site comprises a sparse tree directory...
Approach for characterizing the dynamic availability behavior of network
An approach is provided for characterizing the dynamic availability behavior of network elements using metrics that indicate patterns of availability of a...
Method and apparatus for correlating events in a network
A uniquely configured data structure is used to store event information for each network entity, where logical and physical dependency relationships among...
Method and apparatus providing automatic connection announcement from a
modular network device to a network...
A method of provisioning modular network devices is described. A generic configuration is placed on a device; the configuration comprises commands for...
Method and system for distributing calls
A method for distributing calls includes receiving a plurality of calls each for connection with one of a plurality of agents and storing each of the plurality...
Method and system for handling a queued automatic call distributor call
A method for handling a queued automatic call distributor call includes receiving a call from an endpoint of a caller over a first connection. The call comprises...
Techniques for ensuring synchronized processing at remote fiber channel
and fiber connectivity networks
Techniques described use Generic Framing Procedure (GFP) to transport data across an optical transport network between near and far Fiber Channel (FC) or Fiber...
Optimizing queuing of voice packet flows in a network
A system and method are disclosed for increasing the efficiency with which data is transmitted over a network link. Voice packets are encoded to include header...
Multi-homing using controlled route leakage at a backup service provider
A technique for implementing route aggregation in a computer network containing a multi-homed customer site connected to primary and second networks, which in...
Distributed packet processing with ordered locks to maintain requisite
Sequences of items may be maintained using ordered locks. These items may correspond to anything, but using ordered locks to maintain sequences of packets,...
Securely managing network element state information in transport-layer
Rules in NAT and firewall devices are updated only when a packet flow is verified as genuine through transport-layer message acknowledgment sequences. When a...
Method and apparatus for using data-over-cable applications and services
in non-cable environments
A generic data over cable system configures different cable and/or non-cable network infrastructures to operate in a data over cable environment. In one...
Support mobile device in asymmetric link environment
Methods and apparatus for registering a mobile device such as a mobile node or mobile router with a Home Agent in an asymmetric link environment. A Foreign Agent...
Approximated per-flow rate limiting
A method and apparatus to limit the throughput rate on a packet-by-packet basis. Each packet of an input flow is mapped to an entry in a flow table for each...
Method and apparatus for forwarding data in a data communications network
A method of forwarding data in a data communications network having a plurality of nodes comprises the steps, performed at a repairing node, of computing the...
Redundant packet selection and manipulation in wireless communications
A communications system includes a mobile unit that transmits content and a number of base transceiver stations that receive the content from the mobile unit....
Static random access memory architecture
An architecture for a semiconductor static random access memory (SRAM) is described. In one example, a first set or group or stage of SRAM banks are coupled to a...
Method and apparatus for a data structure comprising a hierarchy of queues
or linked list data structures
Systems and methods are disclosed for implementing and using data structures comprised of a hierarchy of queues or linked list data structures. A queue or linked...
Methods and devices for regulating traffic on a network
Methods and devices are provided for regulating traffic on a network. According to some aspects of the invention, if a subscriber's upstream traffic exceeds a...
Providing configuration information to an endpoint
Providing configuration information to an endpoint includes receiving at a file server a configuration information request from the endpoint. The configuration...
Method and apparatus for multipoint conferencing
A method of controlling a multimedia multipoint conference that includes two or more participating multimedia terminals that each includes one or more codecs....
Bypassing native storage operations by communicating protected data within
locking messages using a lock...
Data is protected using locks, with the protected data sometimes being included in the locking messages, which may reduce overall processing latency, and/or...
Route convergence monitoring system and method
A route convergence monitoring system and method provide for determining routing changes or affected devices that may cause detrimental or other quality...
Transporting synchronization channel information across a packet network
A technique for preserving information contained in a synchronization channel of a Time Division Multiplexing (TDM) frame across a packet network. Information...
Using an external router to manage foreign data communication channel
Methods and apparatus for efficiently managing third-party data communication channel (DCC) channels using an optical network element without an OSI stack in...
Using ordered locking mechanisms to maintain sequences of items such as
Sequences of items may be maintained using ordered locks. These items may correspond to anything, but using ordered locks to maintain sequences of packets may be...
Relative location of a wireless node in a wireless network
In one embodiment, a method includes computing a probability surface corresponding to the location probability of the wireless node within a physical region...
EAP/SIM authentication for mobile IP to leverage GSM/SIM authentication
Methods and apparatus for dynamically generating a set of Mobile IP keys are disclosed. The set of Mobile IP keys is dynamically generated using an existing...
System and method for verifying the validity of a path in a network
A method for verifying a validity of a path is provided that includes receiving an advertisement communication at a first autonomous system from a second...
Methods for finding a merge point node for MPLS fast re-route
Methods and apparatus for unambiguously identifying merge points associated with backup label switched paths (LSPs) which substantially bypass border routers...
Self-contained internal connector seizure mechanism
In one embodiment a self-contained seizure mechanism comprises a plunger, a spring, and a retainer guide having means for movably securing the plunger to the...
A connector comprising an insulating body defining a slot that is adapted to receive a pluggable module. A plurality of conductive pins extend into the slot and...
Using threshold lists for worm detection
A computer-implemented method is provided for screening communication traffic. A list of one or more threshold pairs including respective first and second...
Methods and apparatus for user authentication and interactive unit
In a hardware client for remote logon to a network, a two layer authentication protocol enables authorized users to log on while discouraging unauthorized users....
802.1X authentication technique for shared media
The present invention provides a technique for securely implementing port-based authentication on a shared media port in an intermediate node, such as a router....