At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Host detection by top of rack switch devices in data center environments
Techniques are provided for detecting and identifying host devices in a network. At a switch device, a packet is received from a server that is interfaced with...
Hierarchical programming of dual-stack switches in a network environment
An example method for hierarchical programming of dual-stack switches in a network environment is provided and includes receiving packets from the network at a...
Symmetric service chain binding
A plurality of network nodes are deployed in a network, each network node configured to apply a service function to traffic that passes through the respective...
Detecting and mitigating forwarding loops in stateful network devices
In one embodiment, a stateful device receives a packet on a particular interface of a stateful device in a computer network, where the packet includes source...
Supporting arbitrary routing criteria in software defined networks
System, method, and computer program product to route data communications based on non-routing criteria, by receiving, by a network element, a data packet,...
Multiple path availability between walkable clusters
In one embodiment, a method comprises creating, in a computing network, a hierarchal routing topology for reaching a destination, the hierarchal routing...
Fibre channel over Ethernet support in a trill network environment
An example method for Fibre Channel over Ethernet (FCoE) support in a Transparent Interconnection of Lots of Links (TRILL) network environment is provided and...
Server-layer path negotiation between client and server network layers
In one embodiment, negotiation is performed between the client-layer (e.g., Layer-3 or Layer-2) network and the server-layer (e.g., optical) network to...
System and method for providing cryptographic video verification
A method is provided in one example embodiment and includes generating a first document and a second document associated with video data that includes a group...
Exclusive and overlapping transmission unit allocation and use in a
One embodiment allocates and uses exclusive and overlapping transmission units in a network. One embodiment includes sending information, from a first network...
Configuring new paths in a wireless deterministic network
In one embodiment, a first node in a wireless deterministic network communicates to a second node configuration information identifying a destination-facing...
Monotonic segmented digital to analog converter
In one implementation, a digital analog converter (DAC) is monotonic because the output moves only in the direction of the input and segmented because a more...
Apparatus and method for controlling a charging circuit in a power over
A charging circuit and method for charging a power storage device in a power over Ethernet environment are necessary to prevent unnecessary power consumption....
Multi-fabric SAN based data migration
In one embodiment, a network device in a network obtains information identifying first storage and second storage. The network device notifies one or more other...
Selective access to executable memory
In an embodiment, a data processing method comprises, in a computer executing a supervisor program: the supervisor program establishing a plurality of different...
Rule-based virtual address translation for accessing data
In one embodiment, rule-based virtual address translation is performed for accessing data (e.g., reading and/or writing data) typically stored in different...
Electromagnetic isolating ball spring
A device including a port barrel, a ball spring, a first enclosure part, and a mounting plate disposed adjacent to the first enclosure part is disclosed. The...
Variable optical attenuator
In one embodiment, a variable optical attenuator includes a core configured to propagate optical data signals and a cladding surrounding at least part of the...
Localizing a mobile data path in a radio access network under control of a
mobile packet core in a network...
A method is provided in one example embodiment and includes establishing a control channel between a first entity associated with an access network and a second...
Network-enabled light fixture for locating movable object
In one embodiment, a method comprises a wireless detector in a lighting element detecting a movable object within a prescribed detection zone of the wireless...
Optimizing a neighbor list of access points
In an example embodiment, a neighbor radio/access point (AP) list is obtained. The neighbor AP list is optimized for a client that is associated with a current...
Wireless roaming and authentication
In one embodiment, a method includes receiving a Wi-Fi authentication request from a mobile device at a wireless controller, the request including a network...
Handling redirect calls
In a particular embodiment, a network device receives, from a first device, a first call request for a second device. The network device may then send the first...
Service insertion architecture
In one embodiment, an apparatus can include a service broker configured to: (i) register a service classifier, and to provide context information to the service...
Local reroute protection for multicast multiprotocol label switching
In one embodiment, a merge process can determine a primary tree among nodes in a communication network, determine a backup tree for a protected segment of the...
Rich media status and feedback for devices and infrastructure components
using in path signaling
A STUN message is received at a router device in a network from a client device in the network along a network path. The STUN message is evaluated for...
Changing group member reachability information
In an embodiment, a method comprises obtaining a second network address at a computer node, which has been already associated with a first network address and...
System and method for optimizing within subnet communication in a network
A method for optimizing within subnet communication in a network environment is provided and includes receiving, at a Top-Of-Rack (ToR) switch, an advertisement...
System and method for routing using path identifiers
In one embodiment, a method includes receiving a first packet sent by a first node. The packet includes a first Layer 3 source address, a first Layer 3...
Breaking loops in overlay networks using an IP transport header
In one embodiment, a device receives a payload encapsulated in an Internet Protocol (IP) transport header having a time-to-live (TTL) value, and decapsulates...
Trigger message routing according to a service class
In one embodiment, a machine type communication (MTC) device can receive registration associated with a new device upon the new device registration for a...
Remote monitoring and controlling of network utilization
A non-transitory computer-readable storage medium storing instructions which, when executed by processors, cause the processors to perform: at a management...
Advertising layer 0 network topology information to a layer 3 network
In one embodiment, techniques are provided to generate a Border Gateway Protocol-Link State (BGP-LS) advertisement message comprising information configured to...
Graceful handling of critical traffic blackholing faults
In one embodiment, a network device may detect a data plane critical fault condition, while a corresponding control plane is not experiencing a critical fault...
Hierarchical schema to provide an aggregated view of device capabilities
in a network
In one embodiment, an aggregation device within a computer network domain receives one or more capability messages from one or more devices in the computer...
System and method for provisioning connections as a distributed digital
cross-connect over a packet network
A method includes receiving a request to provision a path associated with at least a portion of a packet network and determining whether a router is associated...
Dynamically optimized many tree multicast networks
In one embodiment, an example method is provided and includes sending link data from a node to a control entity; querying the control entity for a Many Tree...
Precision timing in a data over cable service interface specification
An accurate non-Data Over Cable Service Interface Specification (non-DOCSIS) clock signal is generated at the downstream output of a DOCSIS network. In one...
Copy protection from capture devices for photos and videos
Embodiments provide techniques for providing copy protection from capturing a displayed image using one or more camera devices. Embodiments generate a plurality...
Power over Ethernet parameter storage
Presented herein are techniques for storing parameter values determined by a power sourcing equipment (PSE) device during a Power over Ethernet (PoE) detection...
System and method for navigating using multiple modalities
A system for navigating includes an interface operable to receive position information of a first modality. The position information of the first modality is...
System and method for reducing paging in UTRAN/GERAN/E-UTRAN networks when
idle signaling reduction is active
Systems and methods are provided for avoiding excessive paging through messaging-based solutions on a mobile network that supports multiple radio access...
Using neighboring access points to provide client device location data
Techniques are presented to determine a location of a wireless client device operating in a wireless local area network. A beacon report request action frame is...
In one example embodiment, a panel assembly is provided that includes a first panel element having a first side edge to be attached to a communications rack,...
DOCSIS out-of-band control signal frequency conversion for legacy set-top
Techniques are provided for up-converting a downstream set-top box control signal to a frequency that is above a cable television system upstream communications...
Mosaic presentation screen production
In one embodiment, a method implemented on a computing device includes: receiving one or more video mosaic source services, each of the one or more video mosaic...
Method for pairing a computer with a video conference device
A method including: generating a random identification token on a computer, said identification token identifying the computer; modulating the identification...
Technique for implementing virtual fabric membership assignments for
devices in a storage area network
A technique is provided for facilitating fabric membership login for an N_Port of a storage area network. A communication from a network node is received. The...
Overlaying receive schedules for energy-constrained devices in
In one embodiment, a time at which a first device in a frequency-hopping communication network is expected to transmit a data message is determined. A first...
System and method for managing out of order packets in a network
A method is provided in one example embodiment and includes creating at a network element an entry designating an out of order ("OOO") sequence number range...