At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Flexible scheduling of network devices within redundant aggregate
A protocol is provided for backing up ATM network devices should they fail. The protocol is implemented in a system running ATMARP and supporting IP over ATM. In...
Method and apparatus for mapping an MPLS tag to a data packet in a headend
A method of using DOCSIS 1.1 features to allow the addition of ISPs and QOS levels to a single cable modem without having to modify the CMTS is described in the...
ATM permanent virtual circuit and layer 3 auto-configuration for digital
subscriber line customer premises...
The present invention pertains to a method and device for automatically configuring the Permanent Virtual Circuit (PVC) of a Digital Subscriber Line (DSL)...
Point-controlled contention arbitration in multiple access wireless LANs
A power management method that transmits multicast frames independent of DTIM beacons. An access point associates power save stations with a multicast group....
Parse state encoding for a packet parsing processor
The present invention provides a packet processing device and method. A parsing processor provides instruction-driven content inspection of network packets at...
Active probe path management
A technique manages paths taken by probe packets sent from a source to a target of a computer network. The novel path management technique enables each probe...
Method and apparatus for reducing electromagnetic radiated emissions from
The disclosed device is directed towards an electromagnetic compatibility clip comprising a body having a first side and a second side opposite the first side....
Robust and flexible group structure
A robust and flexible group structure is described. The group structure is well suited for managing entitlement and security in a network. Moreover, the group...
Method and system for validation of structured documents
A method and apparatus for validation of structured documents are provided. The method includes searching a fast parser for an instance of a structured document....
Protocol-independent support of remote DMA
A remote DMA (RDMA) shim protocol laid atop an existing network data transfer protocol but logically underneath higher level disk and file access protocols...
Method and apparatus for upgrading a database in a redundant environment
by release chaining
What is disclosed is a method of updating a message from a first version to an upgraded version by chaining through intermediate versions, including the steps of...
QoS support for VoIP and streaming services
In one embodiment, techniques provide quality of service (QoS) for services using a gateway. The techniques include receiving one or more control signaling...
Push-to-talk system with enhanced noise reduction
Methods and apparatus for reducing the effect of surrounding noise in a push-to-talk (PTT) system are disclosed. In one embodiment, a method includes obtaining a...
User interface with key timeout
An electronic device, such as a telephone, includes a key operable to be pressed into a depressed position, said key being associated with a function, and a...
System and method for communicating data packets
A method for communicating data packets is provided that includes receiving a data packet at a first processor. A packet handle and interface handle are attached...
Video flow control and non-standard capability exchange for an H.320 call
In one embodiment, a system includes first and second gateway devices operable to communicate with respective first and second video terminals in accordance with...
Intraserver tag-switched distributed packet processing for network access
An access server architecture, and methods for use of the architecture to increase the scalability of and balance processor load for a network access server...
Techniques for integrated routing of call circuit signaling and the
Techniques for processing an IP packet at a router that supports SS7 signaling include receiving IP routing data that associates a network link and a destination...
Load balancing between service component instances
Service requests, which are used to properly process a network access request received from a client, are processed by routing the service requests between at...
Label switching in fibre channel networks
Methods and apparatus are provided for label switched routing in fibre channel networks. Techniques are provided for implementing label switching based on...
Internet protocol authentication in layer-3 multipoint tunneling for
wireless access points
Enhanced tunnel communication mode creation, management and tuning in a network that includes wireless access points (APs) and user authentication. Tunnels can...
Identifying one or more access points in one or more channels to
Identifying one or more access points in one or more channels to facilitate communication includes identifying an access point in a channel in a first channel...
Minimizing single points of failure in paths with mixed protection schemes
Methods and apparatus for substantially minimizing single points of failure for circuit paths in networks with mixed protection schemes are disclosed. According...
Forwarding traffic flow information using an intelligent line card
Methods and apparatus are provided for monitoring traffic characteristics using intelligent line cards. Selected flows are configured for monitoring based on...
Dynamic retrieval of routing information for inter-AS TE-LSPs
A technique dynamically triggers an exchange of reachability information between a tail-end (remote) domain target node (e.g., a tail-end node) of a traffic...
Minimum variance location estimation in wireless networks
In one embodiment, a method includes receiving received signal strength data, computing an aggregate square error surface based on the received signal strength...
Threshold access based upon stored credentials
A method and apparatus for authorizing an access requester to access a data communication network is provided. A determination is made that a threshold access...
Method and apparatus for changing power class for a powered device
A method and apparatus for changing power class for a powered device are provided. During operation, a powered device, such as an IP telephone, receives power...
Inline power control
A physical layer for an inline power device of a network power system. The network power system includes inline power devices such as power source equipment and...
Methods and apparatus for providing multiple policies for a virtual
A system provides a request for a policy from a policy server, and receives the policy from the policy server. The policy indicates processing to be applied to a...
Selecting a communications protocol
According to one embodiment of the present invention, a method, a logic, and systems for selecting a communications protocol are disclosed. An initial request...
Securing telephony communications between remote and enterprise endpoints
A system for securing telephony communications between an enterprise telephony endpoint and a remote telephony endpoint includes an isolated packet-based...
Method and apparatus using a random indication to map items to paths and
to recirculate or delay the sending of...
Methods and apparatus are disclosed using a random indication to map items to paths and to recirculate or delay the sending of a particular item when a...
Distributed network communication system which selectively provides data
to different network destinations
A system and method for providing access and/or roaming features on a network system. The network system includes a plurality of wireless and/or wired access...
Method for a wireless station to determine network metrics prior to
associating with an access point of a...
In a wireless station, a method includes, prior to the station being associated with a wireless network, wirelessly receiving L2 frames transmitted from one or...
Method and apparatus for storing tree data structures among and within
multiple memory channels
Methods and apparatus are disclosed for storing tree data structures among and within multiple memory channels, which may be of particular use with, but not...
Node exclusion within a network
In one embodiment, a method involves selecting a connection, and attempting to establish a satisfactory link using that connection. If the link is not...
Verifying packets received over a physical link
A solution is provided wherein physical link parameters may be negotiated after a link is brought up by having the two devices involved in the link exchange...
Technique for providing dynamic modification of application specific
policies in a feedback-based, adaptive...
A feedback-based adaptive network is described wherein at least a portion of the network elements report operating information relating to network conditions to...
Detecting change in a transport protocol window size without data
A method detects a change in TCP receive window size while preventing fragmentation of data. A TCP stack receives a segment that advertises a receive window size...
Combining multilink and IP per-destination load balancing over a multilink
Load balanced transport of best efforts traffic together with delay-bounded traffic over a multilink bundle combines fragmentation and fragment distribution for...
Supporting options in a communication session using a TCP cookie
A defender operable to support options in a communication session intercepts a connection request packet sent from a client to a server. The defender identifies...
System for providing secure multi-cast broadcasts over a network
A system for providing secure multi-cast broadcasts. The system includes a broadcasting processing system, a security server processing system, and at least one...
Router software upgrade employing redundant processors
Systems and methods for replacing software controlling active routers while minimizing impact on network operation are provided by virtue of one embodiment of...
Method and apparatus for providing sticky bindings using version vectors
In a network having a plurality of routers and also an application running at a plurality of replicas, a system for maintaining a client session between a client...
Intrusion detection in a data center environment
An intrusion detection system (IDS) is capable of identifying the source of traffic, filtering the traffic to classify it as either safe or suspect and then...
Predictively responding to SNMP commands
A method for predictively responding to network management data requests includes populating a memory with prefetched response data based on whether one or more...
Method and system for dynamically pre-positioning content in a network
based detecting or predicting user presence
A method, system and apparatus are provided for dynamically pre-positioning content from servers located in a network, which may be a content distribution...
Method and system for automatically interconnecting IPv4 networks across
an IPv6 network
A method and system for automatically interconnecting IPv4 networks across an IPv6 network are disclosed. The method includes receiving an IPv4 packet at an...
System and method for mapping an index into an IPv6 address
A system and method maps Virtual Local Area Network (VLAN) designations to Internet Protocol version 6 (IPv6) site identifiers (IDs), and embeds site IDs into...