At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Independently verifying a transit point in a network environment
An example method for independently verifying a transit point in a network environment is provided and includes receiving, at a transit point in a packet...
Moment capture in a collaborative teleconference
The disclosed technology addresses the need in the art for capturing a moment of an active teleconference meeting. A teleconference system can enable meeting...
System and associated methodology for proximity detection and device
association using ultrasound
In one embodiment, a method includes receiving ultrasound frequency sweeps in a sound receiving device. Each of the plurality of ultrasound frequency sweeps is...
Instantiating an application flow into a chain of services in a virtual
In one embodiment, a method comprises creating a hierarchal chain of network services in response to instantiation within a data center of a virtualized...
Reducing real time media traffic in a network environment
An example method for reducing real time media traffic in a network environment is provided and includes examining a plurality of first requests in a first...
Dynamically mapping network trust relationships
In an embodiment, the method is comprising, receiving an access request, from an authenticator device, to grant a supplicant device access to a data network;...
Dynamic traffic shaping based on path self-interference
In one embodiment, a method is disclosed in which a device in a network receives self-interference information from one or more nodes in the network. A degree...
Ultra low latency multi-protocol network device
Presented herein are techniques to achieve ultra low latency determination of processing decisions for packets in a network device. A packet is received at a...
Enhanced path selection scheme for equal cost paths in communication
In one embodiment, a node in a communication network receives a label switched path (LSP) request and in response, the node determines at least two equal cost...
Collaborative inter-service scheduling of logical resources in cloud
The subject disclosure relates to a method for scheduling logical resources in cloud platforms. A cloud platform system identifies resource candidates for...
Learning machine-based granular segment/path characteristic probing
In one embodiment, a routing topology of a network including nodes interconnected by communication links is determined. Important nodes in the network which are...
Guaranteeing bandwidth for dual-homed hosts in fabric extender topologies
Techniques are provided for optimizing bandwidth in a network. Information describing a network bandwidth capacity of a port extender device is received at a...
Method and system for detecting changes in a network using simple network
management protocol polling
In an embodiment, methods and systems have been provided for detecting changes in a network using improved Simple Network Management Protocol (SNMP) polling...
Method and apparatus for monitoring and filtering universal serial bus
In one embodiment, a method includes obtaining at least one packet from a first element on a Universal Serial Bus (USB) bus. The at least one packet is intended...
Current redistribution in a printed circuit board
In one implementation, a multilayered printed circuit board is configured to redirect current distribution. The current may be distributed by steering,...
System and method to facilitate radio access point load prediction in a
A method is provided in one example embodiment and may include training a statistical model representing radio access point loads or load changes for radio...
Method and apparatus for identifying wireless access points using beacon
Techniques are described for identifying a wireless access point device using beacon messages and probe responses. An access point may generate and broadcast...
Shim layer abstraction in multi-protocol SDN controller
A Service Abstraction Layer (SAL) provides network level abstraction enabling applications to interface via multiple software-defined networking (SDN) protocols...
Elastic service chains
Presented herein are elastic service chain techniques. In one example, a network element receives data traffic to be processed by a service chain that specifies...
Supporting multiple IEC-101/IEC-104 masters on an IEC-101/IEC-104
In one embodiment, a network device, such as a router, receives a frame containing a message from a first terminal unit. The network device modifies the...
Universal labels in internetworking
In an embodiment, a method comprises: receiving a data communications packet comprising one or more labels in a label stack; determining whether a table...
Mechanism and framework for finding optimal multicast tree roots without
the knowledge of traffic sources and...
The proposed methodology enables finding the most efficient roots in the network to carry multicast traffic, while further providing a theoretical basis for...
Automatic resolution of virtual network instance to VLAN mapping conflicts
in dual-homed deployments in a...
In accordance with one example embodiment, there is provided a system configured for virtual local area network (VLAN) blocking on a virtual port channel (vPC)...
Methods and apparatus for testing and repairing digital memory circuits
An ActiveTest solution for memory is disclosed which can search for memory errors during the operation of a product containing digital memory. The ActiveTest...
System and method for providing feeds based on activity in a network
A method is provided in one example and includes receiving network traffic associated with a particular user; developing a personal vocabulary for the...
System and method for identifying talk burst sources
According to one aspect, a method includes obtaining, at a client included in a push-to-talk (PTT) system, a plurality of talk bursts including at least a first...
Output management of prior decoded pictures at picture format transitions
Systems and methods may be provided for determining whether or not to output the "decoded pictures yet to be output" (DPYTBO) after decoding a random access...
Distributed real-time media composer
A system and a method allowing simultaneous exchange of audio, video or data information between a plurality of units over a communication network, supported by...
Offload operations for overlay networks
Techniques are presented herein for receipt/transmission of packets to/from a host via a connected input/output (IO) device. In general, a packet is associated...
Spoofing technique for transparent proxy caching
In one embodiment, a proxy device in a computer network receives a redirected client request having a request source address as a client address and a request...
Framework for dynamically programmed network packet processing
One or more functions to be performed on a packet at one or more network nodes along a network path are determined at a network device. A packet is generated...
Network-based dynamic data management
In one embodiment, a router operating in a hierarchically routed computer network may receive collected data from one or more hierarchically lower devices in...
Viewing shared documents in a sharing session
In a sharing session between a presenter and several attendees, the presenter can share any type of document quickly and without substantial prior preparation....
Identifying threats based on hierarchical classification
A system and a method are disclosed for identifying network threats based on hierarchical classification. The system receives packet flows from a data network...
Computer network access control
Receive, at an access control node (ACN) of a first network enclave, a plurality of data packets inbound to the enclave. The characteristics of each received...
Method and system for including network security information in a frame
A method and apparatus for including network security information in a frame is disclosed. Network security information is included in a secure portion of...
Zone-based firewall policy model for a virtualized data center
Techniques are provided for implementing a zone-based firewall policy. At a virtual network device, information is defined and stored that represents a security...
Redirecting of network traffic for application of stateful services
Techniques are presented herein for redirection between any number of network devices that are distributed to any number of sites. A first message of a flow is...
Techniques for auto assigning IP telephone extension numbers based on a
Techniques are provided for assigning extension numbers to Internet Protocol (IP) telephony devices. The techniques include receiving a message from the IP...
Network assisted virtual machine mobility
A first addressing message is received at a first switch in a network fabric indicating that a first virtual machine has undergone migration from connection to...
Path maximum transmission unit handling for virtual private networks
Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a...
Stateless flexible boot control
Techniques are provided herein for optimizing boot order for devices in a data center environment. These techniques may be embodied as a method, apparatus and...
Display screen with a graphical interface
OAM and time slot control in a deterministic ARC chain topology network
In one embodiment, a network of nodes is configured to communicate according to a configuration of Available Routing Construct (ARC) chains as well as...
Reducing proliferation of network-to-link-layer address resolution
In one embodiment, the processing by a packet switching device of a received network-to-link-layer address resolution request message (e.g., Address Resolution...
Flexible deterministic binary scheduler
A method for allocating port assignments for transmitting a reserved network stream across a network node comprises determining a cycle time associated with a...
Application services based on dynamic split tunneling
One embodiment provides selectively routing Domain Name System (DNS) request for sub-domains associated with a first network through a tunnel associated with...
Bi-directional flow stickiness in a network environment
An example method for bi-directional flow stickiness in a network environment is provided and includes receiving a packet of a flow from a source address in a...
Recording packet routes using bloom filters
In one embodiment, a Bloom filter is provided in a data packet signal functional to preferably encode the identifier of each nodal device and record the nodal...
Light emitting diode (LED)-based multi-bitrate data links
In one embodiment, a method comprises receiving, by an apparatus, first data at a first bitrate and second data at a second bitrate faster than the first...