At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
User datagram protocol traceroute probe extension
The embodiments described herein provide methods and apparatuses for implementing a User Datagram Protocol traceroute probe extension. In an example embodiment,...
Method of implementing a backup path in an autonomous system
A method of implementing a backup path in an autonomous system (AS) for failure of an inter-AS link is described. The method comprises forwarding data elements...
Finite state machine of traffic stream metrics for adaptation of
load-based call admission control in wireless...
In one embodiment, a method includes receiving a call admission request; in a first state, applying a first call access control (CAC) algorithm to the call...
Constructing repair paths around multiple non-available links in a data
A data processing apparatus is configured for initiating a not-via approach for creating repair path information for a first link between the first network node...
Method and system for providing voice QoS during network failure
A method and system for providing QoS in a network after a network failure are disclosed. The network includes at least one primary tunnel and at least one...
Locking mechanism for rack mounted devices
A locking mechanism to minimize access to a portion of a rack-mounted electronic device is provided. The locking mechanism includes a bar supported at one end to...
Free-standing video unit
Enterprise wireless local area network (LAN) guest access
In one embodiment, detecting a wireless network access request, forwarding data associated with the detected wireless network access request to a first...
Method and apparatus for passing security configuration information
between a client and a security policy server
Techniques for passing security configuration information between a security policy server and a client includes the client forming a request for security...
Method and apparatus providing scalability for channel change requests in
a switched digital video system
A method, apparatus and computer program product for providing scalability for channel change requests in a Switched Digital Video system is presented. A request...
Network traffic visualization
A system containing a visualization application which enables the user or other user to obtain information about various types of transactions involving the...
Early detection of false start-of-packet triggers in a wireless network
An apparatus, a carrier medium storing instructions to implement a method, and a method in a node of a wireless network able to receive packets that exactly or...
Power and data redundancy in a single wiring closet
Redundancy of data and/or Inline Power in a wired data telecommunications network from a first network device and a second network device configured as power...
Inline power allocation for power over Ethernet applications
A method and system for requesting inline power at a powered device coupled to power sourcing equipment in a communications network are disclosed. The method...
A Mobile Ethernet Protocol that is used to logically extend a "home VLAN", through an Ethernet/IP "campus network", to mobile nodes on "foreign subnets". The...
Channel assignment for a multi-channel dual-radio mesh backhaul
In an example embodiment, a method for determining backhaul channel assignments for multi-channel dual radio mesh nodes. The method comprises acquiring collision...
Server-initiated language translation of an instant message based on
identifying language attributes of sending...
Language translation of instant messages between a sending party and a destination party is automatically performed, based on the instant messaging system...
VSB transmitter using locked filter
Systems and methods for generating spectrally efficient modulated optical signals are provided. Capacity of WDM optical communication links may be increased...
Method and system for recording automatic call distributor calls
A method for recording automatic call distributor calls includes receiving from a caller a call for distribution to one of a plurality of agents and distributing...
Record boundary preservation protocol enhancement
In one embodiment, a method to exchange Q-bit data packets between TCP/IP and X.25 devices includes receiving an incoming packet sequence and translating the...
Auto probing endpoints for performance and fault management
In one embodiment, a method for automatically probing endpoint in a network for performance and fault management is provided. The method may comprise receiving...
Dynamically anchoring a communication session in an IP network
Anchoring a communication session for a mobile node involves a signaling node that intercepts a routing information request sent by a switching center of a...
Method and apparatus for classifying a network protocol and aligning a
network protocol header relative to...
Techniques for routing a payload of a first network protocol, which includes header information for a second network protocol, include communicating a packet. In...
Method and apparatus for carrying telephony network traffic over an ATM
A method that sends ATM source identification and an ATM-TDM correlation tag from an ATM source gateway to a telephony signaling control network; and then...
Method and apparatus for rapidly reconfiguring computer networks
A method for operating a computer network includes: a become_root_primary command is issued to a first router to set an ID so that a spanning tree protocol (STP)...
Dynamically transitioning static network addresses
In an embodiment, an apparatus comprises one or more processors; logic coupled to the one or more processors for execution and configured to perform receiving,...
Method for computing FRR backup tunnels using aggregate bandwidth
Systems and methods for estimating aggregate bandwidths of primary traffic flows are provided. Tighter upper bounds on aggregate bandwidths for arbitrary...
Network-wide connection-based debug mechanism
An improved mechanism for analysing connection establishment/teardown process or identifying failure points (i.e. nodes) in a PNNI network through the use of a...
Method and apparatus for forwarding data in a data communications network
A method is disclosed of forwarding data in a data communications network comprising a plurality of nodes and links therebetween, each link having an associated...
Sharing performance measurements among address prefixes of a same domain
in a computer network
In one embodiment, performance measurements may be obtained at a local domain from a set of one or more responding targets of a particular remote domain. The...
Retransmit timeout suppression in large scale networks
A method, apparatus, and network communication node for suppressing transmission of a request packet, in the context of a request-response network protocol, if a...
Method and apparatus for constructing a repair path for multicast data
A method is disclosed for constructing a repair path for multicast data around a non-available component in a data communications network having as components...
Erbium and Erbium/Ytterbium cladding pumped hybrid optical amplifier
An optical fiber amplifier apparatus and optical signal amplification method are provided. In one example, the amplifier apparatus comprises an optical combiner...
Interaction based on facial recognition of conference participants
In one embodiment, a method includes capturing a facial image of a participant to a video conference session from a video stream of the video conference session....
USB device and stand unit
Methods and apparatus for verifying modules from approved vendors
A technique verifies a that a module is from an approved vendor. The technique involves obtaining vendor data and a first magic code from a module (e.g., a small...
Programmable test clock generation responsive to clock signal
A clock signal within an application-specific integrated circuit (ASIC) is characterized while operating a subsystem. Subsequently, also on the ASIC, a testing...
Lock manager rotation in a multiprocessor storage area network
In one embodiment, a solution is provided wherein a lock manager is kept moving among multiple cores or processors in a multi-core or multi-processor...
Tunnel availability detection with reduced control plane overhead
Network devices can detect whether a tunnel is available (e.g., usable to convey traffic in both directions) by implementing a tunnel detection protocol that...
Communication systems and methods with social network filtering
A method for a computer system include determining a first social distance for a first user with respect to a second user, determining a second social distance...
Simple fibre channel speed negotiation across transport
A method for negotiating speed between a Fiber Channel (FC) local client and a remote FC client across a DWDM network is provided. A transmission speed of the...
Roaming using reassociation
A method and system for handling roaming mobile nodes in a wireless network. The system uses a Subnet Context Manager to store current Network session keys,...
Method and apparatus for encapsulating long messages over limited fibre
channel extended link service
A method and apparatus for encapsulating long messages over limited Fiber Channel ELSs. The method includes ascertaining if the authentication message has a...
Resolving a layer 3 address in a processor system with a unified IP
Resolving a Layer 3 address includes maintaining an address resolution table at each slave processor of a number of slave processors. The slave processors have a...
Filling token buckets of schedule entries
Disclosed are, inter alia, methods, apparatus, data structures, computer-readable media, and mechanisms, for filling token buckets of schedule entries, such as...
System and method for local packet transport services within distributed
A system and method for routing packets within a router having a plurality of loosely-coupled route processors, including a first route processor, and a line...
Selectively forwarding traffic through tunnels in a computer network
In one embodiment, an autoroute filter list may be configured with a list of traffic identifiers. Accordingly, at a tunnel head-end node, an autoroute operation...
Half-duplex multicast distribution tree construction
In one embodiment, a method includes sending upstream to a nearest neighbor node, by a Client Label Switched Router (LSR), a downstream label map message of a...
Implementing read-only zones in a switching fabric
The Switch includes a port configured to receive a command frame when installed in a switching Fabric. The frame identifies a source device and a destination...
Determination of available service capacity in dynamic network access
A capacity aware system that facilitates activation of a new service in a dynamic network is provided. The system calculates the available capacity of the...