At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Methods and devices for the coordination of flow control between a TCP/IP
network and other networks
Methods and devices are provided for implementing flow control coordination in a gateway between a TCP/IP network and a second network. The second network may...
Monitoring, controlling, and preventing traffic congestion between
A system for monitoring congestion at processors includes queues and a congestion monitor. The queues receive packets, and each queue is associated with a...
Provider edge-controlled redundancy using pseudo link aggregation control
In one embodiment, a system comprises a plurality of provider edge (PE) devices, the PE devices having a plurality of ports; and a pseudo-link aggregation...
Restoring multi-segment pseudowires following failure of a switching PE
In one embodiment, a protected switching provider edge (S-PE) and a backup S-PE may be operated, where the protected S-PE has at least one multi-segment...
Method and apparatus for forwarding label distribution protocol multicast
traffic during fast reroute
A computer apparatus comprising a processor and a forwarding engine arranged to forward LDP multicast traffic along a multicast tree having a primary and a...
Method and apparatus for creating a network topograph that includes all
select objects that are in a network
A method is disclosed for creating a network topograph that includes all select objects that are in a network. A set of one or more non-select objects in the...
Network address translation with IP redundancy
Redundant gateway methods, apparatus and systems using more than one gateway device in a gateway device group for communications directed outside of a LAN....
Psuedowire termination directly on a router
A method, apparatus and computer program product for routing data within a packet-switched network using a PW wherein the PW is terminated directly on the...
System and method for providing quality of service to DSL internet
A method and system provides quality of service in a DSL network interfaced with the Internet. A connection engine determines whether a connection from an...
System and method for providing a handoff leg associated with a
preexisting leg in a network environment
A method for facilitating communications between wireless networks is provided that includes communicating with a mobile station and transferring a...
Techniques for marking and manipulating voice message segments through a
telephone user interface
In one embodiment, techniques for manipulating a voice message using a telephone user interface are provided. The telephone user interface receives a mark begin...
Method and system for improving robustness of interference nulling for
A method and system are provided for improving the robustness of interference nulling for antenna arrays in a wireless communication network. The method is...
Executing and supporting a multiple bandwidth reservation request
In one embodiment, a method includes obtaining a first message that includes at least a first bandwidth request that specifies a first bandwidth and a second...
Method and system for transparently transcoding a multicast stream
A method and apparatus for transparently transforming a multicast stream is provided. The method includes transforming the multicast stream in a content engine....
Runtime flow debugging a network device by examining packet counters at
In one embodiment, the internal path traversed by packets between two user visible interface, selected by a user, is displayed. The path displayed includes...
Containment of rogue systems in wireless network environments
Methods, apparatuses and systems facilitating containment of the effects of rogue or unauthorized access points on wireless computer network environments....
Shared virtual device ports
In one embodiment, a solution is provided wherein multiple virtual devices may be configured on the same physical port of a network device. For example, a first...
Instrumenting packet flows
Real-time customer packet traffic is instrumented to determine measured delays between two or more points along a path actually traveled by a packet, such as...
System and method for detecting and regulating congestion in a
An apparatus for communicating data is provided that includes a cell site element associated with a base transceiver station and operable to receive a plurality...
Multiple context single logic virtual host channel adapter supporting
multiple transport protocols
Various embodiments provide methods and systems operable to receive a work queue pair from one of a plurality of host nodes, to scan the work queue pair for...
Automatically switching console connection
A method and system for configuring a network device is provided. In one implementation the method and system may include directing, via a multiplexer, a group...
Method and apparatus for generating a network topology representation
based on inspection of application...
A method is disclosed for generating a network topology representation based on inspection of application messages at a network device. According to one aspect,...
Proximity as an aid to caching and secondary serving of data
A proximity-based content control method "propagates" or positions content based upon "proximity" between various nodes on a network. The nodes between which...
Behavioral classification of communication sessions using active session
A method includes measuring behavioral characteristics of a plurality of communication sessions in a communication network. A subset of the sessions is...
Gracefully changing a node in a distributed computing network
In one embodiment, a method includes determining to change a number of objects controlled by a particular node in a network. Each object is a resource provided...
System and method for consolidating accounting data for a communication
A method for receiving accounting data from one or more lower layer elements, consolidating the accounting data received, and sending the consolidated...
Parallel cipher operations using a single data pass
Multiple cipher hardware algorithms are run in parallel over an input stream. For example, one algorithm can process the input stream using an old cipher key...
System and method for retrieving computed paths from a path computation
element using encrypted objects
In one embodiment, a path computation client (PCC) generates a path computation request and transmits the path computation request to a path computation element...
Method and system for communicating H.263 macroblock boundaries using
H.221 BAS for RFC2190-compliant fragmentation
A method includes receiving a Real-Time Transport Protocol (RTP) packet at a first gateway and translating the RTP packet into a H.221 frame. The H.221 frame...
Method and system for reducing latency in a multi-channel multicast
streaming environment in content-delivery...
Methods, systems and apparatus for reducing apparent latency in content-delivery networks are provided. Sources multicast certain `preview multicast streams` to...
Packet error handling
Systems and methods for handling packet errors in a system that combines a plurality of transport streams into a single transport stream for transmission to,...
Detection of forwarding problems for external prefixes
Methods and apparatus for enabling a provider to perform a tracing procedure to determine the existence forwarding problems within its network are disclosed....
Method for ensuring VLAN integrity for voice over internet protocol
A system and method for implementing telephony devices in a distributed network environment is disclosed. The present invention provides for checking data...
System and method for interworking communication protocols to provide
In one embodiment of the present invention, a method is provided for redirecting a session established between two endpoints. In such an embodiment, the method...
Spatial division multiple access for wireless networks
Multiple Input Multiple Output (MIMO) technology in conjunction with the IEEE 802.11 standard enables simultaneous communication of data packets to or from...
Managing an amount of tunnels in a computer network
In one embodiment, a maximum amount of available tunnels in a computer network to be shared by one or more path computation devices is configured on the path...
Minimizing spanning-tree protocol event processing and flooding in
In one embodiment, configuring one or more ports of an access layer entity connected to a distribution layer entity to suppress one or more network topology...
Method and system for providing configuration of network elements through
A method and system provides dynamic configuration of network elements using hierarchical inheritance. The method includes monitoring a data network, detecting...
Multi-speed stack interface
Various embodiments provide an apparatus and method for configuring a shared data rate in a stackable interface network. An example embodiment includes...
Hop cost as secondary metric for equal cost multi-paths
Systems, methods, and other embodiments associated with computing path costs based on link cost as a primary metric and hop cost as a secondary metric are...
Collecting network traffic information
An apparatus and method for collecting network traffic information is arranged to receive network traffic elements including one or more key fields having...
Efficient constrained shortest path first optimization technique
A technique performs an efficient constrained shortest path first (CSPF) optimization of Traffic Engineering (TE) Label Switched Paths (LSPs) in a computer...
Method and system device for deterring spam over internet protocol
telephony and spam instant messaging
A method, system and device for deterring spam on a communication medium are disclosed. The method includes detecting a call with a device for accessing the...
Method and apparatus to secure AAA protocol messages
A method and an apparatus are disclosed for securing authentication, authorization and accounting (AAA) protocol messages. An encryption key, a device...
Method and apparatus for communicating COPS protocol policies to
non-COPS-enabled network devices
A method and apparatus for communicating a COPS protocol policy to a non-COPS-enabled network device is provided. A COPS proxy is connected between a policy...
Server checking using health probe chaining
A load balancer sends a probe packet to a first server in a list of servers. Each server in the list sends the probe successively down the list of servers and...
Method and system for detecting changes in a network using simple network
management protocol polling
In an embodiment, methods and systems have been provided for detecting changes in a network using improved Simple Network Management Protocol (SNMP) polling...
Network element discovery using a network routing protocol
A data processing apparatus comprises instructions to perform sending and receiving one or more messages conforming to a network routing protocol, such as Open...
Approach for managing state information by a group of servers that
services a group of clients
An approach for managing state information by a group of servers that services a group of clients is disclosed. One server is designated as the primary server...
Distributed client services based on execution of service attributes and
data attributes by multiple nodes in...
A network provides distributed client services based on participation in respective resource groups by computing nodes, each resource group including a...