At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method of constructing a backup path in an autonomous system
A method of constructing a backup path in an autonomous system (AS) for failure of an inter-AS link is described. The method comprises identifying an alternate...
System for identifying localized burst errors
A system for detecting one or more localized burst errors in a receiving message comprised of a plurality of codewords. The system comprises a trellis code...
Method and system for optimized switchover of redundant forwarding engines
A method of failure recovery in a network element is disclosed. The method includes indicating to a number of forwarding engines that a forwarding engine has...
Using authentication server accounting to create a common security
A common security database is maintained by a RADIUS server based on the attributes the RADIUS server receives through accounting packets. When the common...
Dial-out link selection via static route redistribution
Dial-out route service is forwarded by a gateway to reduce congestion in a data communication network. The first gateway determines availability of it ports to...
Network processor system including a central processor and at least one
The present invention consists of a general purpose, software-controlled central processor (CP) augmented by a set of task specific, specialized peripheral...
Configuration objectification and version control
A technique maintains configurations of an intermediate node in a version control system. Entities within the intermediate node are represented by objects. Each...
System and method for managing network services in a distributed system
A system includes a network and multiple network devices. The network devices run instances of various services. If a particular network device becomes...
Methods and apparatus for redetermining social maps upon expectation of
A method for a computer system includes receiving an identifier from a user, initiating a user session in response to the identifier, determining a social map...
Highly resilient architecture for DWDM networks providing 1+1 optical
A WDM communication system that includes links traversing substantially inaccessible regions may tolerate multiple failures. In one implementation, a primary...
Communicating signals through two twisted pairs
In one embodiment, a method includes communicating with a Digital Subscriber Line (DSL) transceiver unit through a first twisted pair that comprises a first...
Flexible time stamping
In an example embodiment, an apparatus comprising a physical layer processing device that comprises logic configured to process a packet received from a physical...
Withdrawing multiple advertised routes based on a single tag which may be
of particular use in border gateway...
Disclosed are, inter alia, methods, apparatus, data structures, computer-readable medium, mechanisms, and means for withdrawing routes based on a tag. One...
Service path selection in a service network
A service chain system is provided. The system includes a packet of data that is operable to pass through a network of service nodes as defined by a service...
Mechanisms for using NAT at a session border controller
Disclosed are apparatus and methods for managing session data in a session border controller (SBC), where the session data is sent from a first node, such as a...
Fast multicast convergence at secondary designated router or designated
In one embodiment, a method includes receiving at a network device designated as a secondary designated router or forwarder, an indication that a receiver wants...
Providing multiple virtual talk group communication sessions
Providing virtual talk groups to an endpoint includes managing the virtual talk groups, where a virtual talk group comprises one or more members operable to...
Extending an IP everywhere network over a plurality of flooding domains
In one embodiment, a border node receives a message that includes routing information indicating connection of a network device to a domain. The border node then...
Directed acyclic graph discovery and network prefix information
distribution relative to a clusterhead in an ad...
Each mobile router in an ad hoc mobile network is configured for concurrently attaching to multiple parents advertising respective parent depths relative to a...
Network assessment and fault isolation
Fault isolation in a network includes embedding in-band traceroute packets in a media stream, passing the traceroute packets into a network connecting a proximal...
Locking hinge design
In accordance with an example embodiment, there is disclosed herein an apparatus comprising a top case having a top surface and a side surface and a bottom case...
System and method for offloading a processor tasked with calendar
The invention comprises system and method for offloading a processor tasked with calendar processing of channel status information. The method comprises...
Method and apparatus providing device-initiated network management
A method is disclosed for managing a network entity that is initiated by the network entity, the method comprising the computer-implemented steps performed at...
Method and apparatus for exchanging heartbeat messages and configuration
information between nodes operating in...
A node (101, FIG. 1), within a networked computer system (100), is capable of supporting communications with other nodes relating to operating multiple...
Methods and apparatus for determining social relevance in near constant
A computer system includes a database configured to store a plurality of social network relationships, a graphing system coupled to a database, wherein the...
Method and apparatus for managing forwarding of data in an autonomous
A method of managing forwarding of data in a first autonomous system (AS) is described. The first AS includes a plurality of border routers having inter-domain...
Congruent forwarding paths for unicast and multicast traffic
A mechanism that provides congruent forwarding paths for unicast and multicast data traffic over a service provider core network includes issuing, by a receiver...
Interference mitigation in a wireless communication system
By virtue of one embodiment of the present invention, dynamic signal to noise ratio measurements made on received signals are used to identify degraded segments...
Method and system for addressing attacks on a computer connected to a
A method for addressing attacks on a computer connected to a network includes receiving at a router a TCP SYN request to be screened. The method also includes...
Method and apparatus for optimization of remote procedure call
A method and apparatus is disclosed for optimization of Remote Procedure Call (RPC) communications. A first RPC request to open a first transport connection is...
A system for diagnosing the configuration and use of devices in an interconnected network. The system may be used to analyze a network and/or discrete network...
Method and apparatus for computing a path in a system with nodal and link
Methods and apparatus for defining an alternate circuit path within a network given nodal diverse or link diverse constraints are disclosed. According to one...
Techniques for replacing point to point protocol with dynamic host
Techniques for providing remote access to a service provider network include exchanging multiple Dynamic Host Configuration Protocol (DHCP) formatted messages...
On demand session provisioning of IP flows
A method for on demand session provisioning includes receiving a first packet from a user at a service selection gateway. The service selection gateway provides...
System and method for providing an eCamp feature in a session initiation
protocol (SIP) environment
A method for facilitating a data session in a session protocol environment is provided that includes identifying a first endpoint and receiving a status...
Approach for canceling events
An approach for processing events generally involves receiving event data that specifies one or more attributes of an event that has occurred. A determination is...
Protocol for efficient exchange of XML documents with a network device
A method and apparatus for the configuration of a network device through the exchange of XML documents is provided. A network device transmits multiple chunks of...
Method and apparatus for accessing a database through a network
A system includes a client which can communicate through a network and a database layer with any of several databases. The client communicates with the database...
Method and apparatus for efficient propagation of large datasets under
A network of nodes caches replicated datasets in which dataset changes are efficiently propagated as a set of changes even under failure conditions. A master...
Method and system for providing a camp-on service
A method for providing a camp-on service includes receiving from a caller a request to communicate with a called party via a first communication method and...
Classifying signals at a conference bridge
Classifying signals includes receiving signals from communication devices, where each signal is received from a communication device. The following is repeated...
System and method for detecting and directing traffic in a network
A method for detecting and directing traffic in a network environment is provided that includes receiving a packet included within a communication flow that is...
Method for compressing route data in a router
A method for a router having a routing table and a forwarding table. In an embodiment, the method includes creating an entry for use in the forwarding table, the...
In-band multicast signaling using LDP
A mechanism is provided by which a transport tree identifier can be generated using one or more identifiers for a multicast datastream. The transport tree...
Extended telephony functionality at end points
A system includes telephony devices that provide services and applications through the execution of scripts in web pages.
Identify a secure end-to-end voice call
We describe a system embodiment comprising generating a Secure Real-Time Transport Protocol (SRTP) encapsulated packet and including a secure media indicator...
User datagram protocol traceroute probe extension
The embodiments described herein provide methods and apparatuses for implementing a User Datagram Protocol traceroute probe extension. In an example embodiment,...
Method of implementing a backup path in an autonomous system
A method of implementing a backup path in an autonomous system (AS) for failure of an inter-AS link is described. The method comprises forwarding data elements...
Finite state machine of traffic stream metrics for adaptation of
load-based call admission control in wireless...
In one embodiment, a method includes receiving a call admission request; in a first state, applying a first call access control (CAC) algorithm to the call...