At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Retransmission-based stream repair and stream join
The Real-time Transport Protocol (RTP) and its related standards define a retransmission packet format and a way to give feedback via Negative ACKnowledge...
Methods and systems for providing improved handoffs in a wireless
Methods and systems are provided for using a PDSN in a wireless communication network that includes multiple IP addresses and multiple corresponding physical...
Technique for reducing resources allocated to an existing reservation in a
A technique that allows existing reservations to be partially preempted by higher-priority reservations. An intermediate node receives a request to reserve...
Virtual server recirculation
In one embodiment, a method can include: (i) classifying a packet in a server load balancer (SLB) for determining if the packet is destined for a virtual...
Location based multicast policies
Disclosed herein in an example embodiment is a multicast policy infrastructure that allows administrators to integrate location awareness for a particular...
System and method for providing queue time credit for self-servicing
A system and method for servicing a caller at a contact center includes providing self-service menu options to the caller through an automated system, and...
Network consolidation for virtualized servers
Techniques are disclosed for virtualized server kernel and virtual networks consolidation. The network consolidation allows a data center to migrate from an...
Arrangement for controlling content distribution by dynamically
controlling bandwidth for transfer of the...
A broadband network device is configured, in a broadband network, for dynamically controlling an upstream link bandwidth of a user node configured for...
Packet firewalls of particular use in packet switching devices
One or more firewalls are used to perform firewall functionality on packets based on the entry and exit accesses of each of the one or more firewalls being...
System and method for implementing a subrate recovery for lost packets in
a communications environment
A method for communicating data is provided that includes receiving a plurality of bits associated with a communications flow and recovering data lost from a...
Methods and apparatus to validate configuration of computerized devices
A system verifies configuration of a device within a network via an exchange of verification credentials, which are requested, received and authenticated. The...
System and method for distributing information in a network environment
A method for distributing information in a network environment is provided that includes receiving a communication flow and executing a routing decision for the...
Identifying network path including network proxies
A method and system for identifying a network path between a source node and a destination node are disclosed. In one embodiment, the method includes generating...
System and method for providing security backup services to a home network
Methods and systems of providing security backup services to a home network are described. In one embodiment, the gateway for a home network is registered with...
Reserve release proxy
A method, system, apparatus, and signal-bearing media for finding a logical unit data structure associated with a command and a logical unit of a device,...
Top of hour presence and calendar state interaction
In one embodiment, a method includes identifying a critical time when a current presence state associated with a first client is scheduled to change to a timed...
Call optimization in meet-me conference calls
One method for joining a meet-me conference call includes establishing a communication channel, in response to a request to join a conference call; receiving,...
Optical switching architectures for nodes in WDM mesh and ring networks
Switching architectures for WDM mesh and ring network nodes are presented. In mesh networks, the switching architectures have multiple levels--a network level...
Techniques for voice instant messaging on a telephone set
Techniques for voice instant messaging (VIM) on a programmable telephone set include receiving configuration data that includes VIM ID data that indicates a...
Shift register with dynamic entry point particularly useful for aligning
Disclosed are, inter alia, methods, apparatus, computer-storage media, mechanisms, and means associated with a shift register with a dynamic entry point, which...
System and method for improving network performance and security by
controlling topology information
A system for optimizing the performance of a network. In an illustrative embodiment, the system includes a memory containing one or more data structures data...
Integrating security server policies with optimized routing control
In one embodiment, a first set of one or more control policies at a control server of a network domain may be transmitted to a routing master controller of the...
Multi-homing based mobile internet
In one embodiment, a method of providing mobile internet comprises receiving a down-link packet having a endpoint identity protocol element (EIP), the EIP...
Dynamic rate limiting in wireless mesh networks
A dynamic rate limiting mechanism for wireless mesh networks. In particular implementations, a method comprising monitoring one or more clients associated with...
System and method for securing mesh access points in a wireless mesh
network, including rapid roaming
An authentication method in a mesh AP including using standard IEEE 802.11i mechanisms between the mesh AP and an authenticator for authenticating the mesh AP...
Method and apparatus for cell identification in wireless data networks
A method including wirelessly receiving a packet at a wireless station belonging to a cell of a wireless network, the network for communicating according to a...
Multiple density configurations and algorithms for intelligent power
savings infrastructure in wireless LANs
Described in example embodiments herein are techniques for implementing power savings in a wireless local area network (WLAN). In accordance with an example...
Remote monitoring of real-time internet protocol media streams
In one embodiment, a packet filter (or "trap") is installed on one or more interfaces of a router, switch (intermediary) or other node in an IP network that...
Apparatus for routing cable across housing
A system for routing fiber optic cable includes a hinged housing, a cable storage device connected to a first portion of the housing, and a cable guide. The...
Field failure data collection
The operation of a powered device is monitored to detect a failure condition, the powered device connected to power sourcing equipment by a communications...
Pipeline for high-throughput encrypt functions
A method and network device to process network data is described. The method may comprise receiving the network data and security operation data at a security...
Method and device to process network data
A method and network device to process network data is described. The method may comprise, when the network device is unable to process the network data,...
Method and apparatus for making end-host network address translation (NAT)
global address and port ranges aware
Disclosed are methods and apparatus for handling data having an embedded address (and port). In general terms, a host of a private network is operable to obtain...
Reliable reception of messages written via RDMA using hashing
In one embodiment, a first network system obtains from a second network system, as a result of an RDMA read operation or an RDMA write operation, a message and...
Methods, apparatus and computer readable medium for processing order
The invention is directed to techniques for processing order messages exchanged between a client and an order server. The order messages can be for products and...
Multicast operations using prioritized state information
A classification mechanism to allow selected classes of multicast entries to be acted upon in a chosen order of priority during multicast distribution tree...
System and method for providing recovery and resynchronization for a
An apparatus is provided in one example embodiment and it includes a first node coupled to an active endpoint and a standby endpoint. The first node...
Adaptive, deterministic ant routing approach for updating network routing
An adaptive, deterministic approach for updating network routing information is disclosed. From among a set of routers, each of which is associated with an...
P-GANC offload of URR discovery messages to a security gateway
In one embodiment, a security gateway receives an IPSec Initiation (IPSec INIT) request from a client. The security gateway may communicate with a AAA server to...
Pipelined packet switching and queuing architecture
A pipelined linecard architecture for receiving, modifying, switching, buffering, queuing and dequeuing packets for transmission in a communications network....
Switched unicast in an internet protocol television environment
In one embodiment, a processing device is coupled between at least one content source and at least one subscriber device within an Internet Protocol television...
Methods and apparatus for sending a multicast packet from multiple network
interfaces using the same MAC source...
Methods and apparatus are disclosed for sending a multicast packet from multiple network interfaces across multiple networks using the same media access source...
System and method for facilitating network performance analysis
A system for facilitating network performance analysis. In an illustrative embodiment, the system includes a first module capable of quantifying network...
Mobile network backward compatibility support
In one embodiment, a method for supporting backward compatibility in a mobile network can include: receiving a packet in a first device that can support a first...
Wireless transmitter identity validation in a wireless network
An apparatus, a method, and logic encoded in computer readable media that when executed operable to carry out the method. The method includes wirelessly...
Method and apparatus for simply configuring a subscriber appliance for
performing a service controlled by a...
A method and apparatus for configuring an appliance, such as a network node, for performing s service, such as communicating with a network, controlled by a...
Probes for predictive determination of congestion based on
remarking/downgrading of packets
In one embodiment, a technique for detecting the re-marking of a parameter in a network packet is provided. The technique involves sending a request packet that...
Sampling rate-limited traffic
Out-of-profile rate-limited traffic is sampled to provide data for analysis, such as for, but not limited to, identifying a threat condition such as a...
Video testing using a test pattern and checksum calculation
A method, an apparatus, and logic for testing a video data path. One method includes sending video data corresponding to a video test pattern to an input port...
Detecting an inline power shutoff failure
Power control circuitry (i) applies an inline power signal from a power source to first and second terminals when a control signal delivered to the power...