At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method for determining round trip times for devices with ICMP echo disable
A method and apparatus for determining reachability of a device connected to a computer network by receiving from a requesting device at least one ICMP echo...
Method and system for network configuration
Methods and systems have been provided for pushing critical configuration to a set of network devices. According to various embodiments of the invention, a...
Identifying modular chassis composition by using network physical topology
A method and apparatus for identifying internal occupants of a communications system apparatus with an Ethernet backplane and at least one internal occupant....
Multiple fiber optic gigabit ethernet links channelized over single
A method, an apparatus, and a system where multiple lower bandwidth optic Ethernet (e.g. 1000Base-FX) signals can be interleaved or encoded onto a single fiber...
Method for switching active calls
A method and apparatus for switching active calls from one entity to another on a network device. The method includes the steps of collecting the call...
Memory buffering with fast packet information access for a network device
A networking device employing memory buffering in which a first memory is logically configured into blocks, and the blocks are logically configured into...
System and method for grouping multiple VLANs into a single 802.11 IP
A system and method for identifying and grouping multiple virtual local area networks into a single multicast domain is provided. The system and method may be...
System and method for rate shifting for wireless VoIP
A method of rate shifting specially suited for the voice traffic, which differentiates poor channel conditions from a heavily loaded channel of a WLAN and...
Infrastructure-based enabling indication for dynamic frequency selection
in wireless networks
A wireless access point selection system. In particular implementations, a method includes receiving a notification that identifies a wireless access point that...
Enforcement of user level policies from visited networks in a mobile IP
In one embodiment, a system for providing mobile Internet Protocol (IP) connectivity includes a memory and a processor. The memory stores one or more user level...
Preventing loss of network traffic due to inconsistent configurations
within the network
In one embodiment, a method includes receiving at a processor at a node, notification of an error in a VLAN to topology mapping at the node, receiving a...
IP security within multi-topology routing
A method for IP Security within Multi-Topology Routing is disclosed. Disclosed methods may also include IKE extensions. A route eligible for IPSec protection is...
System and method for addressing dynamic congestion abatement for GSM
An apparatus for communicating data is provided that includes a cell site element associated with a base transceiver station and operable to receive a plurality...
Multiple multicast forwarder prevention during NSF recovery of control
failures in a router
In one embodiment, a multicast router initiates non-stop forwarding (NSF) recovery. In the NDF recovery, data traffic forwarding operations continue throughout...
Identifying a flow identification value mask based on a flow
identification value of a packet
Flow identification value masks are identified based on, and used to mask a flow identification value associated with packets in a router, packet switching or...
Methods and apparatus for generating a result based on a lookup result
from a lookup operation using an...
Methods and apparatus are disclosed for generating a result based on a lookup result from a lookup operation using an associative memory and processing based on...
Wireless network security mechanism including reverse network address
Methods, apparatuses and systems directed to preventing unauthorized access to internal network addresses transmitted across wireless networks. According to the...
Periodic exporting of information over a flow protocol
In some example embodiments, a apparatus and method are shown that include receiving a subscription instruction identifying a subscription to management...
Tuning aging parameters for flows in flow-based systems
In one embodiment, flows are monitored that are open for a length of time until ending by either a distinct ending or by being silent longer than a configured...
Applying a filter set to information provided to a subscribing client
Applying a filter to state information sent from a server to a subscribing client includes receiving a subscription request from the subscribing client, where...
Use of IPv6 in access networks
An embodiment method may comprise establishing a link layer connection to an access server, obtaining a management address, wherein the management address is at...
Method and system for migrating content on a network
A method and system for migrating content on a network. In one method embodiment, the present invention accesses a directory having a network address. A...
Substring search algorithm optimized for hardware acceleration
Techniques are provided for generating a hash value for searching for substrings in a data stream without reading more than one element (e.g. one byte) at a...
Processing structured electronic document streams using look-ahead
In an embodiment, an XPath automaton with state look-ahead capability can efficiently determine whether XML documents, received in a stream in serialized form...
System and method for providing a proxy in a short message service (SMS)
According to a particular embodiment, a method for distributing messages is provided that includes receiving one or more short message service (SMS) messages....
UMA/GAN integration within a legacy location based system
In one embodiment, techniques for authorizing a mobile device are provided. A registration request is received for the mobile device. The registration request...
Method and system for automatically identifying wireless signal quality of
A method for automatically identifying wireless signal quality of a region includes receiving signal quality information associated with wireless signals...
System and method for improved contact center services to disabled callers
A system and method for servicing a caller at a contact center includes prompting the caller for a password associated with a certificate of disability of the...
Low-power ethernet device
In accordance with the teachings of this disclosure, an Ethernet device is provided that draws current below a predetermined voltage, and as the voltage across...
Loss-free packet networks
In one embodiment, a method can include: receiving a packet in a device; classifying the received packet as a first packet type or a second packet type; when...
Fast re-routing in distance vector routing protocol networks
In one embodiment, a method includes sending an adjacency discovery message 1 from a local router over a direct link to a first neighbor router. An adjacency...
Maintaining secrecy of assigned unique local addresses for IPV6 nodes
within a prescribed site during access of...
A network includes network nodes and a gateway. Each network node has a corresponding unique in-site IPv6 address for communication within a prescribed site,...
Limiting unauthorized sources in a multicast distribution tree
Disclosed are, inter alia, methods, apparatus, data structures, computer-readable media, and mechanisms for limiting unauthorized multicast sources. One or more...
Systems and methods for access port ICMP analysis
Systems and methods perform analysis of ICMP packets received at a network device port to determine if the ICMP packet is valid and thus should be forwarded....
System and method for determining a network for processing applications
for a communication session
A method for selecting an IP address for an application used in a network environment may include receiving data of a network's capabilities, receiving data of...
Method and system for blocking communication within a conference service
A method for providing a conference service includes hosting a conference between a plurality of endpoints and communicating at least one media stream received...
Method and apparatus to enable an IPe domain through EIGRP
In one embodiment, a system, method, and apparatus for preventing excessive transmission of routing information in a communications network occurs by receiving...
Dynamic link aggregation
A method and apparatus for dynamically distributing traffic over links grouped together in a data transmission channel are disclosed. In one embodiment, the...
ERSPAN dynamic session negotiation
A method and network device to generate a remote traffic monitoring session using an automated technique to configure the source and destination devices of the...
System and method for authenticating an element in a network environment
A method for authenticating an element in a network environment is provided that includes receiving a request for one or more triplets. One or more of the...
Techniques for graceful restart in a multi-process operating system
A method and apparatus is disclosed for graceful restart in a multi-process operating system. A transport protocol process, which is capable of restarting...
Hierarchical protection switching framework
A hierarchical protection switching framework uses detectors and protectors. A protector registers with a detector to receive notifications. A detector...
Unified transmission scheme for media stream redundancy
In one embodiment, a network session is established for transmitting a media stream. The media stream is encoded into a first set of media stream packets and...
Method and apparatus for using far end camera control (FECC) messages to
implement participant and layout...
A method, an apparatus and a medium encoded with instructions for providing layout selection, participant selection, and/or participant-to-participant far end...
Power cord retainer
An apparatus is provided in one example implementation and includes a body portion that includes a first member and a second member. The members taper at one...
Mounted video unit
Mounted video unit
Free-standing video unit
Regularly occurring write back scheme for cache soft error reduction
In one embodiment, a processor regularly writes one or more cache entries back to memory to reduce the likelihood of cache soft errors. The regularly occurring...