At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Link adaptation based on generic CINR measurement according to
log-likelihood ratio distribution
Techniques are provided to compute the carrier to interference-plus-noise ratio (CINR) in a wireless communication system using log-likelihood ratio (LLR) data...
Coding background blocks in video coding that includes coding as skipped
A method, an apparatus, and a method to encode a block in a picture of a time sequence of pictures such as video. The method includes selecting the mode for...
Default internet traffic and transparent passthrough
A method for routing packets sent from a user to the internet is provided for systems in which the user is connected to a private network. The method includes:...
Techniques for inserting internet protocol services in a broadband access
Techniques for inserting a network service in an Ethernet access network operated by an access service provider include sending routing data to customer...
Methods and apparatus providing two stage tunneling
A system receives a packet at a first node. The packet is destined for a second node. The system identifies a full routing node from a plurality of network...
Dynamic update of a multicast tree
In an example embodiment, a multicast tree is accessed. The multicast tree defines one or more destination label switch routers and paths from a source label...
Static neighbor wake on local area network
In one embodiment, a method includes obtaining traffic that is to be forwarded to a neighboring device, and determining if the neighboring device is in a state...
Redundancy at a virtual provider edge node that faces a tunneling protocol
core network for virtual private...
In one embodiment, a method includes receiving configuration data at a particular node of a first set of multiple nodes. The configuration data includes data...
Performance management of mobile intelligent roaming using mobility detail
Techniques are provided herein to improve the manageability of handover performance of multi-mode wireless client devices when roaming between a wireless local...
Method and system for reserving facility resources for a conference
A method for reserving conference resources includes communicating a conference notification to each of a plurality of conference invitees. The conference...
Transient loop prevention in a hybrid layer-2 network
In one embodiment, a first switch at a border between a first network of a first protocol (P1 network) and a first network of a second protocol (P2 network) is...
Using burst tolerance values in time-based schedules
Schedules may use burst tolerance values to adjust the scheduling in a time-based schedule, such as, but not limited to, adjusting for accumulated but not used...
Multilevel coupled policer
A multilevel coupled policer is configured to police packets using at least two policing levels, including a first-level of class policers and a second-level...
Dynamic response to traffic bursts in a computer network
In one embodiment, a node receives traffic sent from one or more sources toward one or more destinations (e.g., Multipoint-to-Point, MP2P traffic). The node may...
Multimedia data flow dropping with notification
A method and system for correcting a congestion condition within a network, the method including notifying the sender and receiver of a multimedia data flow or...
Load sharing and redundancy scheme
Methods and apparatus for providing a device for forwarding packets in a network are disclosed. A first router and a second router having a shared set of...
Radiolocation using path loss data
Determining the location of a station or potential rogue access point in a wireless network including accepting an ideal path loss model and calibrating the...
Disaster vulnerability assessment in buildings
The number and identities of people in a building along with personal data that is useful in disaster response planning are determined from a database receiving...
Form factor adapter module
Various example embodiments are disclosed. According to an example embodiment, a form factor adapter module may include a small form factor (SFF) host connector...
Preventing network denial of service attacks by early discard of
A method of preventing network denial of service attacks by early discard of out-of-order segments comprises creating a reassembly queue for a connection...
Session redundancy using a replay model
A mechanism for synchronizing states of components in a first routing engine to corresponding components in a second routing engine is provided. In order to...
Powered device classification in a wired data telecommunications network
In a wired data telecommunication network power sourcing equipment (PSE) coupled to a powered device (PD) carries out an inline power discovery process to...
Method for fast, secure 802.11 re-association without additional
authentication, accounting, and authorization...
A method wherein an access point authenticates itself with neighboring access points and establishes secure and mutually authenticated communication channels...
Method and apparatus for automatically optimizing routing operations at
the edge of a network
An Optimized Edge Routing (OER) technique provides efficiently data routing at the edge of a network or subnetwork. The technique employs a Master node that...
Providing support for responding to location protocol queries within a
Various systems and methods are disclosed for providing support for responding to location protocol queries within a network node. One such method involves...
Method for dynamic uplink sounding region allocation
The present invention discloses a method for allocating an uplink sounding region dynamically to obtain downlink channel quality information (CQI) about a...
System and method for detecting radio frequency signals over a range of
The present invention is directed to a power detection circuit for use in a wireless transmitting device. The circuit makes use of multiple gain paths so that...
Controlling an exposure time for digital cameras
Various methods, apparatuses, and systems in which a digital photography device includes a global shutter to control exposure time, a sensor array, and a flash...
Allocation of route targets based on service offered
A network controller to allocate route targets for communication services provided on one or more corresponding virtual private networks, the route targets...
Dynamic, policy based, per-subscriber selection and transfer among virtual
A service gateway maintains forwarding components operative to forward data packets within corresponding VPNs, and also maintains subscriber sessions for...
VoIP call routing information registry including hash access mechanism
A VoIP call routing information registry including a hash access mechanism. In particular implementations, a method includes receiving a telephone number;...
Modem relay originator
A network device and a method for its operation are disclosed. The network device has a first interface to a client device to allow reception of client device...
Retransmitting lost packet with subsequent received packet
In one embodiment, a method comprises transmitting onto a wireless connection, by a device, a first wireless data packet destined for a second device; in...
Partitioned forwarding of packets originated on a broadcast link among
layer 2 forwarding devices of different...
The designated forwarding device functionality for forwarding of packets originated on a broadcast link among layer 2 is shared among multiple forwarding...
Method and system to restart IS-IS when LSP wraps
A method, system, apparatus and machine-readable medium for transmitting a packet through a network to convey network topology is provided. The method includes...
Techniques for distributing data among mobile nodes based on dynamically
generated data objects in a...
Techniques for managing data distributed over nodes in a network include receiving, at an original node, content data that describes a physical entity that is...
Technique for efficient probing to verify policy conformance
A technique efficiently sends probe packets from a source to a target in a destination prefix over two or more paths of a computer network. According to the...
Technique for determining whether to reestablish fast rerouted primary
tunnels based on backup tunnel path...
A technique dynamically determines whether to reestablish a Fast Rerouted primary tunnel based on path quality feedback of a utilized backup tunnel in a...
Adaptor for a router blade
An apparatus for connecting a router blade to a router chassis is provided. The apparatus includes an engagement portion; a first side portion coupled with the...
Network distributed fax device
An embodiment of the present invention includes a fax communication system for communicating fax information transmitted from a sending fax device to a fax...
Architecture for scaling just-in-time placement of advertising content
In one embodiment, a method comprises determining ad placement times for each of a plurality of associated streams. The method also comprises determining an ad...
Three bit error detection using ECC codes
An Error Correction Code (ECC) encoding module encodes an input data word by calculating parity bits according to an ECC index mapping. An ECC ...
Accelerated tape backup restoration
According to the present invention, methods and apparatus are provided improving reading of a remote tape device by a host through multiple fibre channel...
System, method, and software for integrating cloud computing systems
A method for integrating cloud computing systems includes establishing a connection between a cloud computing system architecture and cloud computing systems....
Configurable downloading of content pointed to in electronic messages
Systems and methods for downloading content referenced by a pointer or link in an electronic message. The downloaded content is stored locally in a cache for...
Methods and apparatus for achieving route optimization and location
privacy in an IPv6 network
Methods and apparatus for performing proxy registration on behalf of a node with a Home Agent supporting Mobile IP are disclosed. A first registration request...
Virtual address translation to support wireless access to data networks
In a telephony communication system, mobile devices request access to packet-based networks using network access requests that identify access point names...
Queuing and routing telephone calls
A method and system to process communications in an automatic communication distributor is described. The method may comprise receiving a communication and...
Determining a local emergency dial-string
Determining a local emergency dial-string includes determining location information of an endpoint in a network. The location information indicates a current...
Self-timing method for adjustment of a sampling phase in an oversampling
receiver and circuit
This invention discloses a self-timing method for phase adjustment. An analog signal is digitized at a first and second phase with respect to the symbols...