At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and apparatus for reusing DHCP addresses in home addresses of
mobile IP clients
Methods and apparatuses for conserving addresses. The invention allows a mobile node to manage its own address, shifting responsibility away from the home...
Method and system for network configuration
Methods and systems have been provided for pushing critical configuration to a set of network devices. According to various embodiments of the invention, a...
Two-stage network device configuration process
A method and apparatus for modifying the configuration of a network device, such as a router, using a two-stage configuration model is provided. A first request...
System and method for performing cascaded lookups to forward packets
Cascading a lookup over multiple lookup tables when performing multicast forwarding involves accessing a first lookup table based on at least part of a...
Method and system for using signal quality information
A method includes receiving destination information comprising a desired destination and receiving regional signal quality information comprising signal quality...
Channel randomization and time diversity for MIMO system
A method is provided for creating an artificial a fast fading channel in a MIMO communication system. The method includes encoding a series of source data to...
Reserving resources over a DOCSIS downstream external physical interface
In one example, a resource reservation protocol is modified to allow a Modular Cable Modem Termination System (M-CMTS) core to use the protocol to reserve, for...
Discovery of rogue access point location in wireless network environments
Methods, apparatuses and systems facilitating location or containment of rogue or unauthorized access points on wireless computer network environments....
Automatic prioritization of BGP next-hop in IGP convergence
In one embodiment, an inter-domain routing protocol stores an inter-domain routing protocol route having an associated next-hop address. A routing table is...
Transporting multicast over MPLS backbone using virtual interfaces to
perform reverse-path forwarding checks
A mechanism is provided in which multicast reverse path forwarding can be performed at a provider network egress edge router wherein core routers of the...
QoE based admission control
In one example, a Cable Modem Termination System (CMTS) analyzes received service flow traffic to estimate Quality of Experience (QoE) at the endpoints. An...
Logical floor determination for a wireless device using weighted AP
received signal strengths
An apparatus configured to acquire received signal strength intensities (RSSIs) for a wireless device from a plurality of access points (APs) located on a...
Managing redundant network components
A method for managing redundant network components is disclosed. A network component operable to perform in an active mode is monitored. The network component...
Methods and apparatus for provisioning phantom power to remote devices
An apparatus provisions power from a power budget to remote devices configured to obtain phantom power. The apparatus includes, among other things, a controller...
Input-output memory management unit (IOMMU) and method for tracking memory
pages during virtual-machine migration
An input-output memory management unit (IOMMU) and method for tracking memory pages during virtual-machine migration are generally described herein. The IOMMU...
Methods and apparatus for web content transformation and delivery
In a client, a system receives a set of transformation functions for use in transforming a first content, requests the first content from a gateway, and...
Techniques for migrating a point to point protocol to a protocol for an
Techniques for managing a persistent session associated with a particular Media Access Control (MAC) include determining at a broadband remote access server...
System to dynamically detect and correct errors in a session
A system for detecting and correcting an error in session between a client and a host over a network. When the system receives an indication of an error in a...
Method and apparatus for rate limiting client requests
As a server device receives packets from a client device, the server device counts the number of packets received over a particular time interval and compares...
Detecting cloning of network devices
Techniques are provided to detect cloning of network device identity when network device is seeking registration for service in a network. A control server...
Authorizing an endpoint node for a communication service
A network system for authorizing an endpoint node for a communication service includes an operator network and an organization network. The operator network...
Sharing AGC loop between demodulator and spectrum analysis system
Systems and methods for sharing an AGC loop between a wireless data demodulator and a spectrum analysis module that operates simultaneously with the data...
Method and system for interference reduction
A method and system for interference reduction for telecommunication systems are disclosed. The system comprises a base station control device (BCD) for...
Real-time face detection using temporal differences
An apparatus, a method, and a computer-readable medium having instructions encoded thereon that when executed cause a method to be carried out. The method...
Data driven configuration of call management applications
A call manager uses a call management application in conjunction with a live dial database to control routing of calls for managed devices. To generate the live...
Ethernet layer 2 protocol packet switching
In one embodiment, an apparatus includes an access node, and the access node includes ports. The access node is operable to perform downlink switching based...
Virtual loop carrier system with automatic configuration of ATM endpoints
In an ATM network having ATM endpoints connected to a central server over respective virtual circuits, ATM endpoints are configured for Internet Protocol (IP)...
MPLS device enabling service providers to control service levels in
forwarding of multi-labeled packets
A MPLS device which receives configuration data identifying a group of multi-labeled packets and desired EXP (corresponding to the 3-bit experimental bit field...
System and method for managing a list of entries containing routing
A system and method adds and manages entries on a list of entries of routing information to allow the top entry to be used for routing to a destination...
Data driven route advertisement
Various methods and systems for performing data-driven route advertisement are disclosed. One method involves inhibiting advertisement of a route that is...
Minimizing packet loss during fast roaming
A packet loss reduction system. In particular implementations, a method includes responsive to indications of roaming intent of a wireless client relative to...
Returning domain identifications without reconfiguration
In one embodiment, a technique for returning Domain IDs to a Fibre Channel fabric without a full build fabric (BF) phase is provided. A switch in the fabric may...
Aggregation and propagation of sensor data within neighbor discovery
messages in a tree-based ad hoc network
In one embodiment, a method comprises attaching, by a mobile router, to an attachment router according to a protocol requiring establishment of a tree topology...
Method and apparatus to test a data path in a network
A method and apparatus for testing a data path in a network is described. The method may comprise creating a closed loop in the data path so that test data...
Method and system for providing interoperable communications with
A method for providing interoperable communications with congestion management includes facilitating communications of a plurality of virtual talk groups. Each...
Failure tolerant high density dial router
A Fault Tolerant Dial Router (FTDR) includes redundant subsystem resources that operate independently of telephone line interface connections. The redundant...
System and method for displaying a videoconference
According to one embodiment of the present invention, a method for displaying a videoconference includes receiving a first video feed. The first video feed...
Methods and apparatus for selecting a server to process a request
The invention is directed to techniques for selecting a resource from several resources to process a request from a client. A client sends the request to a data...
Method and system for inserting advertisements in unified messaging
A method and an apparatus for inserting an included message into an e-mail message, wherein the e-mail message is transferred through a unified messaging...
Configuring an operating state of a terminal device
Techniques are described herein for achieving network-based wake-up functionality for power management functions using a standard network controller for...
Data communications device for communicating with and concurrently
providing power to a set of powerable devices
A method for managing the delivery of power for a plurality of devices includes allocating a power limit for each of the plurality of devices and providing...
Providing probe signals from a node to a centralized controller
Providing probe signals from a node includes receiving at the node an instruction to send the probe signals over channels, where the instruction comprises probe...
Technique for distinguishing between link and node failure using
bidirectional forwarding detection (BFD)
A technique distinguishes between link and node failure using bidirectional forwarding detection (BFD) in a computer network. According to the novel technique,...
DHCP proxy for static host
A DHCP proxy agent is provided to send on behalf of a static host a DHCP request so that an access layer security feature such as DHCP snooping/IPSG can be...
Guaranteed delivery of application layer messages by a network element
A method is disclosed by which network elements such as packet routers and packet switches guarantee the delivery of application layer messages within a...
Automobile personal radio recorder
In one embodiment, an audio recorder is disclosed that interfaces with an automobile radio. The audio recorder includes a radio tuner that receives radio...
System and method for integrated queue management
A system and method for integrated queue management are provided. The method may include receiving, from a user, a request for a connection to one of a...
Map message expediency monitoring and automatic delay adjustments in
An M-CMTS compatible UEQAM device implements circuitry to identify and analyze MAP message in the data stream sent from the M-CMTS Core with respect to timing...
Method for routing information over a network employing centralized
A method and apparatus for centralized control of a network is described. The network includes a number of nodes. The method includes creating a database and...
Role determination for network devices
Techniques for selecting authentication roles when establishing a link between devices in a secure network are provided. By assigning role levels to devices,...