At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and apparatus for re-generating configuration commands of a network
device using an object-based approach
A method is disclosed for re-generating a configuration command of a network device. A method includes receiving a request to re-generate a configuration...
Per block breakpoint determining for hybrid variable length coding
A method, and apparatus, and logic encoded in one or more computer-readable tangible medium to carry out a method. The method is to code an ordered sequence of...
Providing a service framework at an endpoint
A method for providing telephony features at an endpoint includes accessing a service framework at an endpoint. The service framework is operable to provide one...
Method and apparatus to deliver a DVB-ASI compressed video transport
A method and apparatus to compress a DVB-ASI bit stream including accepting the stream containing packets of compressed media, sync words, and stuffing words,...
Broadcast and multicast transmissions with acknowledgement scheduling
In one embodiment, a method includes scheduling acknowledgements from a plurality of receivers in a wireless network, transmitting an acknowledgement schedule...
Detecting an identifier change of an endpoint
Detecting an identifier change of an endpoint includes dialing an identifier associated with an endpoint to initiate a call to the endpoint. A network indicator...
Blocked redundant link-aware spanning tree protocol enhancement
An exemplary embodiment provides for a method for use in a network device of a plurality of network devices configured to implement a link management protocol...
Trunking with port aggregation for fabric ports in a fibre channel fabric
and attached devices
Trunking with port aggregation for fabric ports in a Fiber Channel (FC) fabric and attached devices is described. In some examples, a method of establishing a...
Monitoring quality of a packet flow in packet-based communication networks
A communication system includes multiple routers interconnected by a packet-based communication network. Each of the routers includes a monitoring application...
Troubleshooting voice over WLAN deployments
A voice over WLAN diagnostic system. In particular implementations, a method includes simulating, in response to a triggering event, Voice over Internet...
Applying router quality of service on a cable modem interface on a
In one embodiment, a cable modem determines network backpressure per service-flow, and transmits the network backpressure per service-flow to a router (e.g.,...
Method of detecting non-responsive network flows
A network device identifies a non-adaptive flow as follows. The network device drops packets on a random basis using a Random Early Detection (RED) algorithm. A...
Method for recovery of a controlled failover of a border gateway protocol
A method and apparatus for recovering from a controlled failover of a BGP speaker is provided. A user sends, to a network element, a request to switch a...
Passive cooling element
Flexible access control policy enforcement
A method and system for applying access-control policies. In particular implementations, a method includes determining one or more policies, and a...
Differentiated routing using tunnels in a computer network
In one embodiment, one or more tunnel mesh groups may be established in at least a portion of a computer network, where each tunnel mesh group corresponds to a...
A message-processing agent receives an object from a space in a Scalable Infrastructure System. The message-processing agent determines the destination of the...
Method for determining round trip times for devices with ICMP echo disable
A method and apparatus for determining reachability of a device connected to a computer network by receiving from a requesting device at least one ICMP echo...
Method and system for network configuration
Methods and systems have been provided for pushing critical configuration to a set of network devices. According to various embodiments of the invention, a...
Identifying modular chassis composition by using network physical topology
A method and apparatus for identifying internal occupants of a communications system apparatus with an Ethernet backplane and at least one internal occupant....
Multiple fiber optic gigabit ethernet links channelized over single
A method, an apparatus, and a system where multiple lower bandwidth optic Ethernet (e.g. 1000Base-FX) signals can be interleaved or encoded onto a single fiber...
Method for switching active calls
A method and apparatus for switching active calls from one entity to another on a network device. The method includes the steps of collecting the call...
Memory buffering with fast packet information access for a network device
A networking device employing memory buffering in which a first memory is logically configured into blocks, and the blocks are logically configured into...
System and method for grouping multiple VLANs into a single 802.11 IP
A system and method for identifying and grouping multiple virtual local area networks into a single multicast domain is provided. The system and method may be...
System and method for rate shifting for wireless VoIP
A method of rate shifting specially suited for the voice traffic, which differentiates poor channel conditions from a heavily loaded channel of a WLAN and...
Infrastructure-based enabling indication for dynamic frequency selection
in wireless networks
A wireless access point selection system. In particular implementations, a method includes receiving a notification that identifies a wireless access point that...
Enforcement of user level policies from visited networks in a mobile IP
In one embodiment, a system for providing mobile Internet Protocol (IP) connectivity includes a memory and a processor. The memory stores one or more user level...
Preventing loss of network traffic due to inconsistent configurations
within the network
In one embodiment, a method includes receiving at a processor at a node, notification of an error in a VLAN to topology mapping at the node, receiving a...
IP security within multi-topology routing
A method for IP Security within Multi-Topology Routing is disclosed. Disclosed methods may also include IKE extensions. A route eligible for IPSec protection is...
System and method for addressing dynamic congestion abatement for GSM
An apparatus for communicating data is provided that includes a cell site element associated with a base transceiver station and operable to receive a plurality...
Multiple multicast forwarder prevention during NSF recovery of control
failures in a router
In one embodiment, a multicast router initiates non-stop forwarding (NSF) recovery. In the NDF recovery, data traffic forwarding operations continue throughout...
Identifying a flow identification value mask based on a flow
identification value of a packet
Flow identification value masks are identified based on, and used to mask a flow identification value associated with packets in a router, packet switching or...
Methods and apparatus for generating a result based on a lookup result
from a lookup operation using an...
Methods and apparatus are disclosed for generating a result based on a lookup result from a lookup operation using an associative memory and processing based on...
Wireless network security mechanism including reverse network address
Methods, apparatuses and systems directed to preventing unauthorized access to internal network addresses transmitted across wireless networks. According to the...
Periodic exporting of information over a flow protocol
In some example embodiments, a apparatus and method are shown that include receiving a subscription instruction identifying a subscription to management...
Tuning aging parameters for flows in flow-based systems
In one embodiment, flows are monitored that are open for a length of time until ending by either a distinct ending or by being silent longer than a configured...
Applying a filter set to information provided to a subscribing client
Applying a filter to state information sent from a server to a subscribing client includes receiving a subscription request from the subscribing client, where...
Use of IPv6 in access networks
An embodiment method may comprise establishing a link layer connection to an access server, obtaining a management address, wherein the management address is at...
Method and system for migrating content on a network
A method and system for migrating content on a network. In one method embodiment, the present invention accesses a directory having a network address. A...
Substring search algorithm optimized for hardware acceleration
Techniques are provided for generating a hash value for searching for substrings in a data stream without reading more than one element (e.g. one byte) at a...
Processing structured electronic document streams using look-ahead
In an embodiment, an XPath automaton with state look-ahead capability can efficiently determine whether XML documents, received in a stream in serialized form...
System and method for providing a proxy in a short message service (SMS)
According to a particular embodiment, a method for distributing messages is provided that includes receiving one or more short message service (SMS) messages....
UMA/GAN integration within a legacy location based system
In one embodiment, techniques for authorizing a mobile device are provided. A registration request is received for the mobile device. The registration request...
Method and system for automatically identifying wireless signal quality of
A method for automatically identifying wireless signal quality of a region includes receiving signal quality information associated with wireless signals...
System and method for improved contact center services to disabled callers
A system and method for servicing a caller at a contact center includes prompting the caller for a password associated with a certificate of disability of the...
Low-power ethernet device
In accordance with the teachings of this disclosure, an Ethernet device is provided that draws current below a predetermined voltage, and as the voltage across...
Loss-free packet networks
In one embodiment, a method can include: receiving a packet in a device; classifying the received packet as a first packet type or a second packet type; when...
Fast re-routing in distance vector routing protocol networks
In one embodiment, a method includes sending an adjacency discovery message 1 from a local router over a direct link to a first neighbor router. An adjacency...
Maintaining secrecy of assigned unique local addresses for IPV6 nodes
within a prescribed site during access of...
A network includes network nodes and a gateway. Each network node has a corresponding unique in-site IPv6 address for communication within a prescribed site,...
Limiting unauthorized sources in a multicast distribution tree
Disclosed are, inter alia, methods, apparatus, data structures, computer-readable media, and mechanisms for limiting unauthorized multicast sources. One or more...