At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for policy selection and switching function in a network
A method is provided in one example embodiment and includes receiving a request for a service for a subscriber at an access gateway; receiving a default...
System and method for providing route information
A system and method changes a rate at which routing information is sent to increase it upon the detection of one or more events, maintaining the then current...
Exporting real time network traffic latency and buffer occupancy
Techniques are presented herein to facilitate the monitoring of occupancy of a buffer in a network device. Packets are received at a network device. Information...
Global state resynchronization for path computation element failure during
a reoptimization process
In one embodiment, a router initiates reroutes of one or more tunnels at the router as part of optimization of a plurality of tunnels in a computer network, and...
System and method for layer-2 multicast multipathing
An example method is provided and includes a multicast data message from a data source, the message in a first virtual local area network and being associated...
QSFP+ to SFP+ form-factor adapter with signal conditioning
Techniques are provided for sending and receiving data communications between an enhanced Quad Small Form-Factor Pluggable (QSFP+) transceiver module and an...
Hardware virtualization module for exclusive controlled access to CPU
In one embodiment, a method comprises providing an apparatus having exclusive access to each of one or more central processing units (CPUs) of a computing...
System for handling a broken uniform resource locator
A method and apparatus for receiving a request for a Uniform Resource Locator (URL), determining the URL is broken, retrieving query data from a first database...
Power negotiation protocol
In one embodiment, a method includes a first device providing a first power to a second device using a first set of conductors out of a plurality of conductors....
Sub-slotting to improve packet success rate in carrier sense multiple
In one embodiment, a communication device in a frequency hopping communication network determines an intention to forward a first packet in a particular...
Video bandwidth optimization
In one embodiment, a method includes receiving at a network device, video from a first endpoint, analyzing the video received from the first endpoint,...
In an example embodiment, a Voice over IP (VoIP) system that provides for media forking at the caller's (ingress) gateway. The gateway receives data with a...
Integration of network admission control functions in network access
In one embodiment, a method includes receiving a communication from an endpoint device at a network access device located within a data path between the...
Encryption key management for storage area network devices
An encryption key management system is provided for storage area network devices. A create key request is received at a storage area network switch. The key is...
Timestamp estimation and jitter correction using downstream FIFO occupancy
First, a packet may be received and a timestamp value may be placed on the packet. The timestamp value may comprise a place time value comprising a time when...
Protocol independent multicast designated router redundancy
In one embodiment, a method includes transmitting a packet from a router located in a communication path between a source and a receiver, the load balancing...
Multicast group assignment using probabilistic approximations
In one embodiment, a source node (e.g., responsible node) determines a plurality of destination nodes of a message, and generates a probabilistic data structure...
Dual adjacency between edge devices at a network site
Devices, methods and instructions encoded on computer readable medium for implementation of a dual-adjacency between edge devices of a network site. A first...
Pilot-less noise estimation
Presented herein are pilot-less noise estimation techniques that utilize a correlation between attributes of a received signal and the noise to generate...
Converting traditional computer product licenses into cloud-based
Techniques are provided for converting a node-locked licensing scheme to a cloud-based management of licenses to use computer products. In one example, a...
Ranking of computing equipment configurations for satisfying requirements
of virtualized computing environments...
Performance test data of a plurality of virtualization computing equipment configurations is collected and stored for each of a plurality of virtualization...
Service-aware distributed hash table routing
In one embodiment, a node in a computer network joins a global ring associated with a distributed hash table (DHT), and maintains a DHT routing table and DHT...
System and method for monitoring two-wire communication in a network
An example method is provided and includes receiving, from a host device, a first signal over a two-wire bus to an address on the two-wire bus corresponding to...
Air filtration and visual barrier for enclosure with front-to-back airflow
An enclosure has a perforated front door with a replaceable filter, and a perforated rear side allowing air to flow through the enclosure. The enclosure also...
Uplink signal bandwidth characterization from channel state information
Techniques are provided to determine whether or not incident power at a wireless communication device in at least two frequency channels is from the same...
Method and apparatus for hands-free control of a far end camera
One embodiment of the present invention sets forth a method for intuitively controlling a far-end camera via physical movements. The method includes the steps...
System and method for displaying a videoconference
According to one embodiment of the present invention, a method for displaying a videoconference includes receiving a first video feed. The first video feed...
Integrating telephony and voice mail routing
A data processing system comprises call processing logic comprising a voice mail subsystem, or a call management subsystem configured to process voice-over-IP...
Reduction of chaining in conference sessions
Techniques are provided for adding a participant at an end point device to an ongoing conference session. An ongoing conference session is established, where...
Streaming network coding
In one embodiment, a method comprises supplying, by a network node to a peer network node, a randomization seed assigned to the network node for generating a...
System and method for performing signaling on behalf of a stateless client
A system for, and method for, performing state-based signaling on behalf of a stateless client. In one embodiment, the system includes a controller, couplable...
Active load distribution for control plane traffic using a messaging and
Techniques are provided herein for a device in a network to receive information configured to indicate a control plane traffic load level for one or more server...
Apparatus and method for providing a congestion measurement in a network
Example embodiments of a system and method for providing a congestion measurement in a network are disclosed. In an example embodiment information is received...
Low latency networking device using header prediction
A network device receives a packet that includes a plurality of header fields. The packet is parsed to sequentially obtain the plurality of header fields. One...
System and method for reducing netflow traffic in a network environment
A an example method includes building a dictionary between an exporter and a collector by encoding a first data record of a flow according to a dictionary...
Congestion-based notification during fast reroute operations in stateful
path computation element environments
In one embodiment, once activation of use of a backup tunnel is detected for a primary tunnel, then a level of congestion of the path of the backup tunnel may...
Methods and apparatuses for identifying and alleviating internal
bottlenecks prior to processing packets in...
Methods and apparatuses for identifying and alleviating bottlenecks prior to processing packets in internal feature modules are described. First, a method is...
Network switch employing a proxy to facilitate power savings in a
In an example embodiment, an IP phone is connected to a network switch that has an established communications channel to a call control server. The network...
System and method for pinning virtual machine adapters to physical
adapters in a network environment
A method for pinning virtual machine adapters to physical adapters in a network environment is provided and includes capturing a first Bridge Protocol Data Unit...
Providing an announcement for a multiparty communication session
Providing an announcement for a multiparty communication session involves establishing a communication session between at least two endpoints. A request to add...
Scalable multicast route distribution in a multitenant data center fabric
in a network environment
A method is provided in one example embodiment and includes determining a route target ("RT") membership for a network element; determining at least one...
In an example embodiment, a method for synchronizing clocks between a plurality of clocked devices where one of the plurality of clocked devices is not directly...
DWDM fast lightpath setup using network status information
Techniques are presented herein to setup a wavelength on a path from a source node to a destination node. Cross-talk margin information already computed for one...
Methods and systems for automatic device provisioning in an RFID network
using IP multicast
Methods and systems for automatic provisioning of RFID devices in an RFID network are described. A device, such as a Reader, has within its read field a special...
Delegating authority of licenses to use computer products in a
Techniques are provided for delegating authority over licenses to use computer products in a disconnected network. In one example, a collector device receives a...
Security in virtualized computer programs
In an embodiment, a data processing method comprises implementing a memory event interface to a hypercall interface of a hypervisor or virtual machine operating...
System and method for simultaneously storing and read data from a memory
A system and method for providing high-speed memory operations is disclosed. The technique uses virtualization of memory space to map a virtual address space to...
Extensible patch management
Extensible patch management provides mechanisms by which data, database and binaries for one or more components of an application may be updated. The patch...
Video conference system endpoint display and stand
Dynamic channel assignment for WLAN deployments with IEEE 802.11ac access
Techniques are provided for selecting channels for use by access points operating in a wireless local area network. Metrics are computed for at least one set of...