At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Congestion control in wireless mesh networks
A congestion control system. In particular implementations, a method includes receiving packets into one or more queues and monitoring the one or more queues for...
Keeping modems online upon N+1 switchover in cable modem termination
According to a first aspect, in a time period after a line card switchover, a CMTS router makes each ranging opportunity in a bandwidth allocation map...
Fault reporting tag for mesh access points
Mesh access point fault reporting. In particular implementations, a method includes receiving a fault indication indicating one or more failures; collecting...
Mounted video unit
Front-end structure for access network line card
A technique is described for facilitating communication in access networks such as cable networks. One aspect of the present invention is directed to an improved...
Automatic detection of functional defects and performance bottlenecks in
A network device, such as a router or switch, has a CPU and a memory operable to receive, store and output computer code. The code includes device configuration...
Method and system for secure transmission of an encrypted media stream
across a network
Embodiments of the invention provide a method and system for sending a session key file encryption key for use in the secure transmission of an encrypted media...
Accelerated data switching on symmetric multiprocessor systems using port
A router that includes a plurality of processors (SMPs) where there is "affinity" between particular processors and particular interfaces: Each of the router's...
Method and system for the assignment of security group information using a
A method and system for the assignment of security group information using a proxy is disclosed. The method includes receiving an address of a network device at...
Dynamically adding application logic and protocol adapters to a
programmable network element
Custom or user-defined application program extensions may be loaded into a network infrastructure element such as a router or switch without restarting the...
Methods and apparatus for providing content over a computer network
The invention is directed to methods and techniques in a communications device for delivering content. In particular the technique includes intercepting, from a...
Method for storing universal network performance and historical data
One embodiment of the present invention sets forth a method for storing data collected from a network. The method may involve storing collected data only when a...
Method and apparatus for association of a radio frequency identification
tag with digital data for distribution
A system for storing and retrieving data associated with an identification of a RFID device. The invention receives data and a list of RFIDs associated with...
Radiolocation in a wireless network using time difference of arrival
A method and an apparatus for radiolocation using time differences of arrival. The method includes receiving transmit timestamps from a set of wireless stations...
Methods and apparatus for achieving route optimization and location
privacy in an IPV6 network
Methods and apparatus for performing proxy registration on behalf of a node with a Home Agent supporting Mobile IP are disclosed. A first registration request is...
System accounting in a multiprocessor environment
In one embodiment, a method can include: (i) assigning an attribute to each of a plurality of processors, and designating one of the plurality of processors as a...
Extended handset functionality and mobility
A system includes an enterprise network having a call control system that manages telephony services for wireless handsets. At a remote site, a computing device...
Method and system for supporting cross cluster extension mobility in
A method to support cross cluster extension mobility (CCEM) in a communication network, which includes a plurality of clusters, each of the plurality of clusters...
Priority propagation with a hierarchical asynchronous transfer mode (ATM)
According to various embodiments, high priority traffic is obtained from one of a plurality of virtual channels servicing high priority traffic. High priority...
Centrally controlled routing with tagged packet forwarding in a wireless
Embodiments of the present invention include a method, an apparatus, and logic encoded in one or more computer-readable tangible medium to carry out a method....
Layer 2 address translation for service provider wholesale IP sessions
A method involving receiving, at a network device, a first layer 2 network packet from a client, the first layer 2 network packet encapsulating a layer 3 network...
Methods and apparatus providing VPN traffic matrix construction
A system receives a packet at a router, and pushes a label onto a label stack. The label stack is associated with the packet. The system provides a forwarding...
Distributed forwarding in virtual network devices
A virtual network device sub-unit includes an interface to a virtual network device link and a distributed forwarding module. The interface receives a packet,...
Using an L2 method to locate and associate with a wireless network in
communication with a mobile IP agent
A computer-readable carrier medium in wireless station for wireless network. Encoded in the carrier medium are instructions that when executed carry out a method...
Apparatus for detecting uplink ranging codes in a wireless communication
An apparatus for detecting uplink ranging codes includes a first transform unit for transforming data received from a mobile station to generate first outputs; a...
Multiple I-service registration protocol (MIRP)
In one embodiment, a method associated with a multiple I-service registration protocol (MIRP) includes receiving into an 802.1ah I-component an MVRP TCN from an...
Monitor for multi-protocol label switching (MPLS) networks
In one embodiment, a method includes receiving label data that indicates all interface labels that belong to each path ID of multiple path IDs associated with...
Queue aware flow control
A network flow control system utilizes flow-aware pause frames that identify a specific virtual stream to pause. Special codes may be utilized to interrupt a...
Modem timing offset compensation for line card redundancy failover
In one embodiment, a first ranging timing description describing at least a duration of time during which a subject cable modem (CM) may burst and a duration of...
Path reroute in a computer network
In an example embodiment, a method is provided that receives a first label from an area border routing device. Here, the first label is associated with a first...
Air-cooling of electronics cards
In one embodiment, an apparatus includes a card chamber, an air intake, an airway, an exhaust plenum, and at least one fan. At least one electronics card can be...
Method and apparatus for providing network security using security
A method and apparatus for providing network security using security labeling is disclosed. The method includes comparing first security level information and...
Redundant power and data over a wired data telecommunications network
A method and apparatus for redundant power and data over a wired data telecommunications network permits power to be received at a local powered device (PD) from...
Method for blocking denial of service and address spoofing attacks on a
A method is provided for blocking attacks on a private network (12). The method is implemented by a routing device (10) interconnecting the private network (12)...
IP unified agent using an XML voice enabled web based application server
A method for inter-process communication between non-persistent application instances includes establishing a first non-persistent application instance serving a...
End-to-end performance tool and method for monitoring electronic-commerce
A method and apparatus for monitoring electronic commerce transactions. A network delay agent, coupled to the access point for the electronic commerce provider's...
Method and system for identifying and reporting over-utilized,
under-utilized, and bad quality trunks and...
A method to identify and report over-utilized, under-utilized, and bad quality trunks and gateways in an Internet Protocol (IP) telephony network includes...
Location inspector in wireless networks
In one embodiment, a method includes receiving calibration data, computing one or more attributes of a pathloss model based on the calibration data, computing...
Optical data synchronization scheme
Asynchronous optical data is aligned with synchronous convergence points in an optical packet switching system. The convergence points can be any place where...
Surrogate stream for monitoring realtime media
In one embodiment, a separate surrogate monitor stream provides real-time media monitoring statistics for non-media savvy protocols. The surrogate monitor stream...
Providing point to multi-point communication for digital subscriber loops
Providing point to multi-point communication includes associating channels to endpoint nodes of a digital subscriber line, where each channel is associated with...
Root node redundancy for multipoint-to-multipoint transport trees
A mechanism is provided to configure a plurality of transport trees in a transport network, each of which correspond to a native tree (e.g., a bidirectional...
Method and apparatus to provide data streaming over a network connection
in a wireless MAC processor
A method of wirelessly transmitting or receiving a packet of information, and an apparatus to wirelessly transmit or receive a packet of information. In the case...
System and method for DSL subscriber identification over ethernet network
A DSLAM aggregation topology VLAN bundling mechanism includes an edge device port that receives a packet from a Digital Subscriber Line Access Multiplexer...
System and method for identifying wireless devices using pulse
fingerprinting and sequence analysis
Methods are provided for identifying devices that are sources of wireless signals from received radio frequency (RF) energy. RF energy is received at a device...
Method and apparatus for updating label-switched paths
A method of updating a label-switched path for forwarding data in a data communications network in response to a change in a network comprises the step,...
Translating MST instances between ports of a bridge in a computer network
In one embodiment, a first port of a bridge is configured for a first spanning tree (ST) and not a second ST, while a second port of the bridge is configured for...
Method and apparatus for automatically managing sub-layer interfaces
A method of generating a standardized network-management representation of a multiple-layer network communications interface sub-stack having a non-standardized...
Quality of service testing of communications networks
Network testing is conducted using a pair of traffic agents that acts as sender and receiver endpoints. The sending traffic agent generates and transmits a...
Admission control mechanism for multicast receivers
A method and system for controlling admission of an end user to a multicast channel over a network implementing a source filtering protocol. Incoming packet...