Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Using a particular learning algorithm or technique

Subclass of:

370 - Multiplex communications

370254000 - NETWORK CONFIGURATION DETERMINATION

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
370256000 Spanning tree 147
Entries
DocumentTitleDate
20130070647METHOD OF PSEUDO-DYNAMIC ROUTING IN A CLUSTER COMPRISING STATIC COMMUNICATION LINKS AND COMPUTER PROGRAM IMPLEMENTING THAT METHOD - The invention relates to the pseudo-dynamic routing in a cluster comprising nodes, of the static communication links connecting these nodes. The routing is based on load levels associated with the links After having received (03-21-2013
20130070646LONG RANGE, LOW POWER, MESH NETWORKING WITHOUT CONCURRENT TIMING - A first sensor node 03-21-2013
20130070645ADDRESS TABLE FLUSHING IN DISTRIBUTED SWITCHING SYSTEMS - Methods and systems for improved address table flushing in distributed switching systems may be provided. In accordance with embodiments of the disclosure, a switch may include a plurality of line cards and a processor. Each line card may including a table of addresses. The processor may be configured to, in response to receipt of a plurality of simultaneous requests, each request a request to flush addresses associated with a particular flooding domain present on the switch, perform flushing of addresses based on an aggregate number of address entries for each particular flooding domain associated with the requests.03-21-2013
20130070644DISCOVERING NETWORK INFORMATION AVAILABLE VIA WIRELESS NETWORKS - Network information may be discoverable without requiring a connection to that network. For example, Access Network Query Protocol (“ANQP”) may allow a device to discover information about a network prior to the device associating with that network. In other words, ANQP allows a network terminal to request additional network information prior to establishing network capability. The additional network information that may be discoverable includes network latency, cellular capabilities, hotspot capabilities, mobility capabilities, neighbor reports, station identification, and multiple hotspot session identification.03-21-2013
20080285484METHOD FOR ANALYZING A NETWORK ENVIRONMENT - A method for analyzing a network environment, in which the method comprises the following steps: Acquiring a plurality of connection data of all network cards of a terminal device; according to connection data, determining whether or not a terminal device uses a PPPoEconnection is used to connect to a network system; determining whether or not an IP address of the terminal device is a public IP address and determining whether or not the terminal device uses DHCP to acquire a target IP address.11-20-2008
20130044641FEDERATING INTERCONNECTION SWITCHING ELEMENT NETWORK TO TWO OR MORE LEVELS - A network control system for interconnecting several separate networks. The system includes i) several interconnection switching elements, each of which is for connecting one of the separate networks to a common interconnecting network, ii) a first set of network controllers for managing a first set of the interconnection switching elements at a first set of separate networks in order for machines at different networks within the first set to communicate with each other, iii) a second set of network controllers for managing a second set of interconnection switching elements at a second set of separate networks in order for machines at different networks within the second set to communicate with each other, and iv) a third set of network controllers for managing the first and second sets of network controllers in order for machines at networks in the first set to communicate with machines at networks in the second set.02-21-2013
20130028141METHOD AND APPARATUS FOR ALLOCATING BACKBONE VLAN IDENTIFIERS - Methods and apparatuses for allocating backbone virtual local area network identifiers (BVIDs) to connection requests in a provider backbone bridging-traffic engineering (PBB-TE) network are described. During operation, a system (e.g., a network management system) can receive a set of connection requests for a set of connections that are desired to be set up in the PBB-TE network. Next, the system can allocate a BVID to each connection request in the set of connection requests so that, once the set of connection requests are set up in the PBB-TE network, conflicting connections in the PBB-TE network have different BVIDs.01-31-2013
20130028140USING SERVICE DISCOVERY TO BUILD ROUTING TOPOLOGIES - In one embodiment, a particular route optimizing device of a computer network (e.g., an NMS or a device in the network) discovers one or more registered services for the computer network, the registered services indicating one or more corresponding routing characteristics associated with the respective registered service. By comparing the one or more service-related routing characteristics with a current routing characteristic of a routing topology of the computer network (where the routing topology built based on a current routing topology strategy), it can be determined whether to update the routing topology strategy based on the comparison. In response to determining to update the routing topology strategy, one or more devices in the computer network may then be informed of an updated routing topology strategy and associated service-related routing characteristics, where the one or more devices are configured to update the routing topology based on the updated routing topology strategy, accordingly.01-31-2013
20080259822DYNAMIC PACKET TRAINING - A packet control mechanism for a computer data system that dynamically adjusts packet training depending on the utilization load on the processor. The dynamic adjustment of packet training can be to enable and disable packet training, or adjust the number of packets in the packet train. In preferred embodiments, the computer data system includes a processor utilization mechanism that indicates a load on a processor. When the packet control mechanism determines the load on the processor is above a threshold limit, the packet control mechanism reduces the processor load by compressing the packets into the packet train. The compressing of the packets is stopped or reduced when the processor load is below a threshold in order to increase the data throughput on the network interface.10-23-2008
20080259821DYNAMIC PACKET TRAINING - A packet control mechanism for a computer data system that dynamically adjusts packet training depending on the utilization load on the processor. The dynamic adjustment of packet training can be to enable and disable packet training, or adjust the number of packets in the packet train. In preferred embodiments, the computer data system includes a processor utilization mechanism that indicates a load on a processor. When the packet control mechanism determines the load on the processor is above a threshold limit, the packet control mechanism reduces the processor load by compressing the packets into the packet train. The compressing of the packets is stopped or reduced when the processor load is below a threshold in order to increase the data throughput on the network interface.10-23-2008
20090122724Peer-to-Peer Network including Routing Protocol Enhancement - Methods, apparatuses and systems that enhance the operation of peer-to-peer networks with routing protocols. In a particular implementation, peer nodes of a peer-to-peer network use an enterprise routing protocol to construct p2p network routing tables that support identification of peer nodes implementing a distributed hash table. This allows each peer node on the p2p network to know about every other node, and to learn, within IP network routing convergence times, of the arrival, departure, and failure of peer nodes in the p2p network. It also allows for single hop queries to other peer nodes.05-14-2009
20090122723Dynamic Network Management System, Dynamic Network Management Device, and Dynamic Network Management Method - A technology is disclosed for providing the global connectivity to the mobile node which is connected to the mobile access router forming the mobile network. According to the technology, it is possible for the mobile node 05-14-2009
20090040946Executing an Allgather Operation on a Parallel Computer - Methods, apparatus, and products are disclosed for executing an allgather operation on a parallel computer that includes a plurality of compute nodes organized into at least one operational group of compute nodes for collective parallel operations, each compute node in the operational group assigned a unique rank, that includes: determining a contention-free logical ring topology for the compute nodes in the operational group; configuring, for each compute node in the operational group according to the contention-free logical ring topology, a routing table to specify a forwarding path to the next compute node in the logical ring topology; and repeatedly, for each compute node in the operational group until each compute node has received contributions for all of the other compute nodes in the operational group, forwarding a contribution for the allgather operation to the next compute node in the logical ring topology along the forwarding path.02-12-2009
20120176937AD HOC NETWORK - The present disclosure set forth a method for a node to participate in an ad hoc network. The first node receives a first link information broadcasted omnidirectionally by a second node. The first link information indicates if the second node is communicating via a first directional link in a first polarization with a third node. The first node establishes a second directional link in a second polarization with the second node.07-12-2012
20120176940COURSE SEARCHING METHOD AND NODE DEVICE - A node device for searching for a course between start and end points in a network under constraining conditions includes a holding unit holding the constraining conditions corresponding to node devices and links connecting the node devices and indexes corresponding to the node devices and the links as network topology information; a making unit making combinations of the constraining conditions from which a part of the constraining conditions is removed; a searching unit searching for the course between the start point and the end point under the constraining conditions; a joining unit obtaining a joined result by joining the successfully searched for course to the network topology information; and a presenting unit comparing a piece of the network topology information corresponding to course information of the successfully searched for course with the removed part, extracting a nonconforming portion, and storing the joined result and the extracted nonconforming portion.07-12-2012
20130028142RESILIENCY-AWARE HYBRID DESIGN OF CONTROLLER-SWITCH CONNECTIVITY IN A SPLIT-ARCHITECTURE SYSTEM - A method and apparatus for optimizing the resilience of a network using a combination of in-band and out-of-band signaling is disclosed. The metric used in the embodiment's algorithm to determine resilience is the maximum number of protected neighbors. Nodes closer to the controller are assigned a higher weight than those further from the controller because if their connection to the network is interrupted, all their downstream nodes will be affected and disconnected. Therefore, when determining a path to the controller, switches with alternate paths to the controller are preferred. Dedicated connections using out-of-band signaling are assigned to convert unprotected nodes to protected nodes thus improving the resilience of the network.01-31-2013
20130077529AUTOMATED DEVICE DISCOVERY ON A NETWORK - A system and method provide automated discovery of devices on a network. The system may include specialized communications between devices for monitoring and tracking the devices. In particular, devices may transmit and/or receive messages over the network that includes information for discovering, identifying, and/or managing each of the devices on the network.03-28-2013
20130077533METHOD FOR COMMUNICATING WITH OTHER DEVICES, AND COMMUNICATION DEVICE - One embodiment relates to a method performed by a converged personal network service (CPNS) enabled entity. The communication method comprises a step in which the CPNS enabled entity transmits a request message for instructing performance of a discovery procedure to a first PNE which belongs to a first network if a second PNE which belongs to a second network is not found in the coverage of the first network at the state where the CPNS enabled entity is established as a gateway for managing the first network; a step in which the CPNS enabled entity receives, from the first PNE, a response message; and a step of transmitting, based on the response message, a bridge request message for requesting that the second PNE operates as a bridge for interconnecting the first network and the second network, to a second gateway which manages the second network.03-28-2013
20130077528Route Topology Discovery in Data Networks - A system and method for performing topology discovery in a data network is provided. Network elements utilizing a distance-vector protocol, such as EIGRP, advertises routes and metric information. A resource control point or other element analyzes the advertised routes and metrics and determines the nexthop, thereby providing a topology map of the network.03-28-2013
20130077532Method for Communicating With Other Devices, and Communication Device - One embodiment of the present invention relates to a method for communicating with other devices, performed by a communication device comprising a converged personal network service (CPNS) enabled entity. The communication method comprises a step in which the CPNS enabled entity operates in a personal network entity (PNE) mode to establish a connection to a first device, wherein the first device is established as a gateway and thus manages a first network. The communication method further comprises a step of activating a bridge function in cases where the communication device has moved into the coverage of a second network managed by a second device.03-28-2013
20130077531Communication Method Between a Device and Another Device - The present invention relates to a method for communicating with another device through a first device having a Converged Personal network Service (CPNS) enabled entity. The communication method includes receiving a search request message including information regarding the mode of a second device when the CPNS enabled entity of the first device, set in the gateway mode, moves into the coverage area of a second network managed by the second device. The communication method includes: when it is confirmed that the CPNS enable entity of the second device is set with a gateway on the basis of the mode information, confirming whether there is at least one available PNE in all coverage areas of the first network and the second network; and determining whether to change the mode of the CPNS enable entity of the first device on the basis of whether there is at least one available PNE, as well as whether to change the mode of the second device. Here, according to the result of the determination, the mode of the CPNS enabled entity of the first device may be changed to a combined mode in the gateway mode.03-28-2013
20130077530Scaling IPv6 on Multiple Devices Virtual Switching System with Port or Device Level Aggregation - Systems and methods are provided to support a large number of hosts while keeping the size of the FIB CAM low. Higher scalability may be achieved by consuming less FIB CAM space as hosts are added to a network. An L3 switching module may be provided capable of supporting a large number of virtual machines and/or hosts while maintaining a small FIB CAM size on a multiple device virtual switching system with port or device level aggregation.03-28-2013
20130039219SYSTEM AND METHOD FOR CONTROLLING A POWER LINE NETWORK - A system and a method for controlling a power line network are provided. In the system and the method, a control unit device in every control network generates its own control network identification (CNID) and sends query messages to the other control networks to ensure each CNID is unique in the signal-reachable networks. The system and the method differentiate messages of the local control network from messages of the other control networks based on received signal strength of the messages in order to correctly demarcate multiple control networks.02-14-2013
20130039221FREQUENCY BAND SELECTION FOR MULTIPLE HOME NETWORKS - A network-capable device is configured to: automatically detect the presence of a MoCA network (or other network, depending on the network protocol in the application environment), and configure itself for communication on that network at the appropriate communication frequencies. The network-capable device can be configured to create a new network (e.g., a new MoCA network) if there is no network broadcast signal within a band. Preferably, the network-capable device requires little or no user intervention to configure itself for operation at network operating frequencies or to create a new network where none is detected.02-14-2013
20130039218LIMITING MAC ADDRESS LEARNING ON ACCESS NETWORK SWITCHES - A LAN includes a CORE switch linked to some number of TOR switches, and each of the TOR switches are linked directly to some number of host devices. Each of the switches in the LAN operate to process and transmit data frames they receive from neighboring LAN devices. Each TOR switch in the LAN builds and maintains a layer-2 forwarding table that is comprised of MAC address information learned from frames they receive from neighboring LAN devices. Selected ports/VLANs on some or all of the TOR devices are designated to be CORE/switch facing ports (CFP) or host facing ports (HFP). Each of the CFPs are configured to only learn the MAC address in unicast frames it receives and each of the HFPs can be configured to learn the MAC address of both unicast and multicast data frames provided the destination MAC address included in the unicast frame is known.02-14-2013
20130039220CONFIGURATION OF SYNCHRONISATION NETWORK HAVING SYNCHRONIZATION TRAILS FOR TIME SYNC AND FREQUENCY SYNC - Configuring a node (02-14-2013
20130034022Method of Unified Parameter Mapping - A method of unified parameter mapping for a communication device comprising a medium access control (MAC) abstraction sub-layer for converging a plurality of media in a network system is disclosed. The method comprises obtaining a unified parameter and value of the unified parameter from an upper layer of the MAC abstraction sub-layer, and a medium type of a MAC layer underlying the MAC abstraction sub-layer, determining a special parameter for configuration of the medium type of the MAC layer and a format of the special parameter according to the medium type of the MAC layer and the unified parameter, and generating value of the special parameter according to the value of the unified parameter and the format of the special parameter.02-07-2013
20130034023METHOD FOR CREATING WI-FI P2P GROUP - A method and an apparatus for creating a Wireless Fidelity (Wi-Fi) Peer-to-Peer (P2P) group are provided. The method includes creating a 1:N P2P group by connecting a third P2P device to a 1:1 P2P group created by setting a first P2P device as a group owner and setting a second P2P device as a group client, transmitting, by the second P2P device, a request message requesting creation of a new P2P group, to the third P2P device, transmitting, by the third P2P device, a response message to the request message, and creating the new P2P group between the second P2P device and the third P2P device through exchange of the request message and the response message.02-07-2013
20130034024METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR IMPLEMENTING A VIRTUAL POSTING SERVICE - A virtual posting service includes detecting, via a communications device over a wireless network, a presence of another communications device within a defined geographic community that is accessible by the wireless network. The service also includes determining a mode status of the other communications device. If the mode status of the other communications device is determined to be passive discover mode, the service includes automatically transmitting content stored in the communications device to the other communications device. If the mode status of the other communications device is determined to be active discover mode, the service includes transmitting a portion of the content stored in the communications device to the other communications device responsive to an inquiry from the other communications device. The inquiry includes search criteria. If the mode status is broadcast mode, the service includes receiving a communication over the wireless network from the other communications device.02-07-2013
20130034021AUTOMATED NETWORK CONFIGURATION IN A DYNAMIC VIRTUAL ENVIRONMENT - In a computer-implemented method, a port profile is associated with a virtual machine that requires a VLAN connection to an external network through an edge port. The port profile includes a VLAN identification associated with the VLAN connection and an edge port identification associated with the edge port. The method further comprises deploying the virtual machine to a target physical server, wherein both the target physical server is in communication with a network switch comprising the edge port. After deploying the virtual machine to the target physical server, the virtual machine is automatically provided with a VLAN connection to the external network in accordance with the port profile associated with the virtual machine. Similarly, a port profile may be associated with a virtual machine as it is created and deployed to a server, wherein the VLAN connection is configured according to the associated port profile.02-07-2013
20130034020LINK SHARING WITHIN A COMMUNICATION SYSTEM - A method and apparatus for choosing members of a local-area network and choosing a network coordinator among the members is provided herein. During operation a mobile node will determine presence information for nodes within its local area. These nodes will be solicited by the node to be part of a local-area network. Of all nodes that accept the request to form a local area network, a network coordinator for the local-area network will be chosen by determining which node's data budget allows for the cheapest transfer of data. The node with the best data budget is then chosen to be a network coordinator.02-07-2013
20130044640Method of Processing Device Discovery - A method of processing device discovery for a first communication device in a network system is disclosed. The method comprises generating a discovery management frame including an identity and a medium access control (MAC) address of the first communication device, broadcasting the discovery management frame, and when a response corresponding to the discovery management frame is received from the second communication device, adding an entry with the identity and the MAC address of the second communication device in a device table stored in the first communication device.02-21-2013
20100110933Change Management of Model of Service - A system for managing a computer implemented service, according to given requirements has a template (05-06-2010
20100039960Wireless Communication Device, Program, Wireless Communication Method, and Wireless Communication System - A wireless communication device includes: a communication portion that periodically transmits management information for forming a wireless network with at least one wireless communication device, a determination portion that determines, based on one of an attribute and a supply speed of information supplied from a given device, whether to add the information to the management information, and a generation portion that adds the information to the management information according to a determination result of the determination portion.02-18-2010
20130083699METHODS AND APPARATUS FOR DISTRIBUTED MEDIUM ACCESS IN WIRELESS PEER-TO-PEER NETWORKS - An apparatus, a method of the apparatus, and a computer program in the apparatus are provided in which the apparatus determines a group to which each of a plurality of wireless devices is associated based on signals received from the plurality of wireless devices. The apparatus selects a group for access to a wireless medium from a plurality of groups based on the group determined for each of the plurality of wireless devices and based on reducing interference with the plurality of wireless devices. Each of the plurality of groups has a different priority. The apparatus communicates using peer-to-peer communication on the wireless medium with a priority based on the selected group.04-04-2013
20130083700METHODS AND APPARATUS FOR CENTRALIZED MANAGEMENT OF ACCESS AND AGGREGATION NETWORK INFRASTRUCTURE - In some embodiments, an apparatus comprises a core network node configured to be operatively coupled to a set of network nodes. The core network node is configured to define configuration information for a network node from the set of network nodes based on a template, where the configuration information excludes virtual local area network (VLAN) information or IP subnet information. The core network node is further configured to send the configuration information to the network node.04-04-2013
20130083701Flexible Radix Switch - A system and method for interconnecting nodes and routing data packets in high radix networks includes constructing or redefining a network structure to provide improved performance. Computation and data storage nodes are connected to a network of switching nodes that provide near optimum bandwidth and latency for networks of any size. Specialized interconnection patterns and addressing methods ensure reliable data delivery in very large networks with high data traffic volume.04-04-2013
20120182903INFERRING CONNECTIVITY IN THE PRESENCE OF CONFLICTING NETWORK DATA - The connectivity information provided by a variety of inference engines is integrated to provide a set of inferred links within a network. A consolidation is performed among inference engines that operate at a base level of connectivity detail to create a model of the network at this base level. The connectivity information provided by inference engines at each subsequent higher level of connectivity abstraction is then overlaid on the base level connectivity. By separately consolidating the connectivity information at each level of abstraction, the rules for dealing with conflicts can be simplified and/or better focused to resolve the conflict. By assuming that the more detailed lower level information is likely to be more accurate, rules can be developed to modify the connectivity models produced by the higher level techniques to conform to the lower level connectivity details while still maintaining the integrity of the higher level connectivity models.07-19-2012
20130089004CONTROL SYSTEM - The present invention relates to a system for controlling a group of devices, comprising: —a network of nodes interconnected in a topology to form a meshed network, and —a coordinator making it possible to communicate with the nodes in the network, in which each device is connected to a node in the network, in which each node comprises: —a receiver making it possible to receive an instruction, —an instructor making it possible to transfer an instruction to the device connected to the node, and —a transmitter making it possible to transmit the instruction to a neighbouring node.04-11-2013
20130089005Simple Topology Transparent Zoning in Network Communications - An autonomous system (AS) comprising a topology transparent zone (TTZ) comprising a plurality of TTZ nodes, wherein the plurality of TTZ nodes includes an edge node and an internal node, wherein each of the plurality of TTZ nodes is configured to connect to another TTZ node via an internal link, and a plurality of neighboring external nodes connected to the TTZ edge nodes via a plurality of external links, wherein no link state advertisements (LSAs) describing the internal links are distributed to the neighboring external nodes.04-11-2013
20130089003METHOD FOR TWO-STAGE PACKET AGGREGATION FACING WIRELESS SENSOR NETWORK OF HYBRID TOPOLOGY STRUCTURE - A method for two-stage packet aggregation facing wireless sensor network with hybrid topology structure including: building various nodes in a wireless sensor network into a hybrid topology structure which combines the star topology and mesh topology; establishing a two-stage packet aggregation architecture for periodic sensor data based on the above described topology structure; determining the packet format, aggregating and disaggregating the two-stage packets based on the topology structure and aggregation architecture; according to the application, the aggregated nodes in the network configuring router nodes and aggregation attributes of the nodes; according to the aggregation attribute, the sensor nodes performing the first-stage aggregation and generates an first-stage aggregation packet; according to the aggregation attributes, the router node implementing second-stage aggregation and generating a second-stage aggregation packet; the aggregation nodes taking charge of disaggregating the aggregated packets. Embodiments of the invention adopt the above described hybrid topology structure, feature a two-stage packet aggregation method, decrease the overhead of packet-head, reduce the energy consumption of the nodes and inter-node interference, and save communication resources.04-11-2013
20130089002UCDS: Unifying Connected Dominating Set Using Localized Two Hop Information with a Flexible Dominating Factor - The present disclosure is directed to a method for forming a connected dominating set (CDS) for a graph. The method may include directing each node of the graph to broadcast a dominating factor and neighboring node information; identifying a dominating set based on the dominating factor of each node in comparison with dominating factors of neighboring nodes according to a dominating set rule definition; identifying a connecting set for connecting nodes according to a connecting set rule definition; and forming the CDS as a union of the dominating set and the connecting set.04-11-2013
20130089001ASSOCIATING WI-FI STATIONS WITH AN ACCESS POINT IN A MULTI-ACCESS POINT INFRASTRUCTURE NETWORK - A wireless network client may be configured to use push button configuration (PBC) techniques to associate with wireless networks that include multiple access points. When the configuration buttons on a smart network host device, such as a wireless network host device, and an enrolling client device are pressed, one of the access points is selected to perform the push button configuration process with the client device. The selected access point then enters a PBC mode, allowing the client and selected access point to perform the authentication and configuration exchange.04-11-2013
20120218918WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, PROGRAM, AND WIRELESS COMMUNICATION SYSTEM - Provided is a wireless communication apparatus including an application, a communication control unit for controlling a search process for discovering at least one peripheral wireless communication apparatus and a connection process to a peripheral wireless communication apparatus, and a display control unit for generating a display screen including display of the at least one peripheral wireless communication apparatus discovered by the search process. The communication control unit starts control of the search process by start of the application, and controls the connection process to a wireless communication apparatus selected on the display screen.08-30-2012
20090092064ROUTING SWITCH DETECTING CHANGE IN SESSION IDENTIFIER BEFORE RECONFIGURING ROUTING TABLE - An automatic network topology identification technique is described herein. Each node in the network periodically or constantly transmits its unique address to its neighboring node. Once a node receives a different message from its neighbor, the node identifies a topology change in the network. In one embodiment, a current topology is associated with a session number. When a change in the topology is detected, the detecting node increments the session number and broadcasts the change in topology. The other nodes, detecting the changed session number, now know that there has been a change in the network. In response, the nodes in the network modify routing tables and other information stored at the node related to the topology. In one embodiment, the technique is used to reassign shortened addresses to each device on the network to support a dual-addressing mode of the network. The dual addressing mode substitutes reduced-length addresses (referred to as short addresses) for standard addresses (referred to as long addresses) for traffic whose source or destination is internal to a given virtual network topology. The required length of short addresses used for a given virtual topology is dependent on the number of devices reachable within the topology.04-09-2009
20130058256PORT MAPPING METHOD AND APPARATUS, AND COMMUNICATION SYSTEM - Embodiments described herein disclose a port mapping method and apparatus, and a communication system. A method includes: obtaining static port mapping information that includes a corresponding relationship between a public network port number, a DHCP client identifier, and a private network port number; obtaining a corresponding relationship between the DHCP client identifier and a private network IP address, and a public network IP address of a NAT gateway; and establishing a port mapping relationship according to the obtained public network IP address of the NAT gateway, the corresponding relationship between the DHCP client identifier and the private network IP address, and the static port mapping information.03-07-2013
20130058255MANAGED SWITCH ARCHITECTURES: SOFTWARE MANAGED SWITCHES, HARDWARE MANAGED SWITCHES, AND HETEROGENEOUS MANAGED SWITCHES - Some embodiments provide a system that includes a set of network controllers for receiving definitions of first and second logical switching elements. The system includes several managed switching elements. The set of network controllers configure the several managed switching elements to implement the defined first and second logical switching elements. The system includes several network hosts that are each (1) communicatively coupled to one of the several managed switching elements and (2) associated with one of the first and second logical switching elements. Network data communicated between network hosts associated with the first logical switching element are isolated from network data communicated between network hosts associated with the second logical switching element.03-07-2013
20120307685Method and Apparatus of Active Scanning in Wireless Local Area Network - Disclosed are a method and apparatus for active scanning of a station in a wireless local area network (WLAN), the method for active scanning in a wireless local area network (WLAN), the method including: receiving a probe request frame including probe request relaying information from a probe requesting station (STA) initiating the active scanning; determining whether to relay the the probe request frame; and relaying the probe request frame to an access point (AP) if it is determined to relay the probe request frame, the probe request relaying information including a transmitter address field that indicates an address of an STA transmitting the probe request frame, and a probe requesting STA address field that indicates an address of the probe requesting STA. With this imbalance between scanning coverage and service coverage in a TV WS is solved to thereby more efficiently perform scanning.12-06-2012
20120224509AIR INTERFACE SELECTION BETWEEN NODES IN PEER-TO-PEER/AD-HOC NETWORKS - Aspects describe pairs of nodes negotiating air interfaces in a peer-to-peer and/or ad hoc network. The negotiation can take into account the capability of each node. The negotiation can be performed on a default link and after negotiation, the nodes can facilitate a communication handoff to the negotiated link. Further, one or more nodes can support multiple air interfaces, wherein nodes that support multiple air interfaces can establish more than one air interface with peer nodes over similar air interfaces or over different air interfaces as a function of negotiation between the nodes.09-06-2012
20130064139APPARATUS AND METHOD FOR DETECTING CRITICAL NODES AND CRITICAL LINKS IN A MULTI-HOP NETWORK - A method includes obtaining a matrix defining a topology of a multi-hop network, where the topology identifies nodes and links between the nodes in the multi-hop network. The method also includes identifying one or more Eigenvalues and/or one or more Eigenvectors of the matrix. The method further includes determining whether the topology of the multi-hop network defines a disconnected network using the one or more Eigenvalues and/or the one or more Eigenvectors. For example, one or more Eigenvalues of the matrix can be identified, and a determination can be made whether a second smallest Eigenvalue equals zero. As another example, Eigenvectors corresponding to two smallest Eigenvalues of the matrix can be identified, and a determination can be made whether the Eigenvectors have opposite zero and non-zero entries such that, for all entries in the Eigenvectors, an i03-14-2013
20130064140NODE INTERFACE INDICATORS - Techniques described herein provide for sending data packets from source to destination nodes. Indicators, such as counters, may determine the configuration of node interfaces. The data packets may be sent based on a comparison of current and stored indicators.03-14-2013
20130064138Mechanism for controlling device-to-device discovery procedcure - There is provided a mechanism for registering and attaching a UE to a D2D discovery function. After identifying an ID information of at least one PLMN assigned for a D2D discovery and communication, a request for registering and attaching the UE to the D2D discovery function at the identified PLNM is sent to the network. The network sends a grant for the D2D discovery together with an indication corresponding to an identity of the at least one PLMN used for communicating resources dedicated to the D2D discovery and communication.03-14-2013
20130163470TRAFFIC OPTIMIZATION OVER NETWORK LINK - In one embodiment, a method includes receiving a TCP (Transmission Control Protocol) packet at a service device configured to optimize traffic over a network link, inserting a discovery identifier in the TCP packet, encapsulating the TCP packet in a UDP (User Datagram Protocol) packet, and transmitting the UDP packet over the network link. An apparatus is also disclosed.06-27-2013
20130163471METHODS FOR DISCOVERING AND ANALYZING NETWORK TOPOLOGIES AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus for discovering and analyzing a network topology includes obtaining information regarding a network including a relationship of a plurality of nodes of the network. At least one value for each of a plurality of centrality parameters is determined for each of the plurality of nodes. At least one topology score for each of the plurality of nodes is generated based on one or more of the centrality parameter values. One or more relatively significant nodes are identified based on one or more of the topology scores and output.06-27-2013
20090232028CONFIGURATION SYSTEMS AND METHODS FOR UTILIZING LOCATION INFORMATION TO CONFIGURE DEVICES IN APPLICATION SYSTEMS - A method for configuring at least one of a first device, a second device, and an application system is disclosed. The application system may be utilized in a spatial unit. The spatial unit may include a plurality of spatial subunits. The method may include determining a first spatial subunit in the spatial unit. The first spatial subunit may be related to the first device. The method may also include identifying, based on a result of the determining, a second device that is physically disposed in the first spatial subunit. The method may also include configuring the at least one of the first device, the second device, and the application system using at least a first rule, wherein the first rule may involve at least the first device and the second device.09-17-2009
20090046601TOPOLOGY CONTROLLED DISCOVERY FOR NEXT HOP DETERMINATION - In a particular embodiment of the present invention, a particular node in an ad hoc network is configured with a desirable number of neighbor nodes and equipped with a transmission power level hierarchy. The particular node may adjust a transmission power level to a different level in the transmission power level hierarchy, based on a number of responses received from neighbor nodes after the particular node broadcasts a request at current transmission power level. This adjustment process is repeated until the particular node acquires a desirable number of neighbor nodes.02-19-2009
20090046603PATH DISCOVERY AND MESSAGE TRANSFER IN PARTIALLY CONNECTED MOBILE AD HOC NETWORKS - A method and system is presented for path discovery and asynchronous message transfer in a partially connected middleware communication space comprising mobile ad hoc networks. Embodiments of the present invention use mobile devices to bridge separated islands of networks and store and propagate messages. The system and software architecture supports methods for routing, messaging caching, and transferring. More specifically, embodiments provide methods and systems that extend a communication space concept into a distributed environment and combine it with the standard Web Services technologies, i.e., SOAP, and WS series protocols. The communication space provides an extension of Web Services to mobile ad hoc networks and provides asynchronous message caching, transferring and routing.02-19-2009
20090046602RADIO FREQUENCY LOCAL AREA NETWORK - An apparatus and a method for routing data in a radio data communication system having one or more host computers, one or more intermediate base stations, and one or more RF terminals organizes the intermediate base stations into an optimal spanning-tree network to control the routing of data to and from the RF terminals and the host computer efficiently and dynamically. Communication between the host computer and the RF terminals is achieved by using the network of intermediate base stations to transmit the data.02-19-2009
20120113870CONFIGURATION OF NETWORK LINKS IN A VIRTUAL CONNECTION ENVIRONMENT - A method for establishing connections in a virtual connection environment by passing links, to external systems through a bridge. The bridge participates in the spanning tree, protocol procedure to reach a stable topology. Active bridge connections then behave as a simple pass through to external systems. The virtual connect domain appears to external systems as a single system void of any possible communication loops.05-10-2012
20120113869METHOD AND APPARATUS FOR IMPROVING UPLINK TRANSMISSION MODE CONFIGURATION - A method, an apparatus, and a computer program product for wireless communication are provided in which a first message to reconfigure an uplink transmission mode of a user equipment (UE) from a first uplink transmission mode to a second uplink transmission mode is transmitted. Further, a reconfiguration scheme to assure at least one of two or more second messages are recognizable by the UE during a transition period after transmission of the first message is implemented. In another example, a UE and eNB may be equipped to respectively transmit and receive a first message to reconfigure a SRS mode used by a UE. In such an aspect the first message may respectively indicate and be used to determine an SRS transmission port specified in a field capable of indicating a number of SRS transmission ports that is greater than a number of physical UE antenna ports.05-10-2012
20120113868ORCHESTRATING WIRELESS NETWORK OPERATIONS - A wireless communication system is disclosed. A data store stores for each of a plurality of nodes, each node comprising a wireless communication system element, a node image data comprising metadata about or otherwise associated with the node. In various embodiments, the data store has the capability to create and support an organically changing schema, and provides a mechanism to propagate changes to the schema or data, but only as necessary. A processor receives an indication of an objective and uses node image data stored in the data store to identify programmatically from among the plurality of nodes a node to help achieve the objective and to determine the configuration of the node.05-10-2012
20120113867METHOD FOR KEEPING THE ROUTING TABLES OF AN UNSTABLE DISSEMINATION NETWORK UP TO DATE - A method for keeping the routing tables of the nodes of an unstable dissemination network up to date, the nodes joining or leaving said network unpredictably. A node periodically sends a synchronization message to all other remote nodes. The period for sending a synchronization message to all other remote nodes increases when the network is tending to stabilize, the remote nodes all being synchronized and the local routing table not evolving. A node sends a synchronization message to another remote node particularly when the other node is desynchronized.05-10-2012
20130163472AUTO-CONFIGURING MULTI-LAYER NETWORK - An auto-configuring multi-layer network including different communication protocols, namely both wired and wireless protocols, interchangeably and indifferently to interconnect various devices such as, for example, controllers, actuators, alarms, sensors, interfaces, etc. The auto-configuring multi-layer network uses a virtualization functionality that mirrors devices from one layer having a given communication protocol unto another layer having a different communication protocol.06-27-2013
20080298275Autonomous Infrastructure Wireless Networks - A method for deploying a cellular wireless communication network is provided. The method consists of: providing one or more micro base stations; autonomously deploying the micro base stations using a network access point linked to a cellular wireless communication network; and enabling configuration of the micro base stations to execute network operation commands from a network controller associated with the wireless communication network. Another aspect consists of enabling cooperation and network connectivity between micro base stations and other base stations, including micro base stations and large network base stations. Network connectivity to one or more cellular communication terminals associated with individuals or businesses subscribing to the cellular wireless communication network is enabled. A wireless network is also provided which is configurable to link a cellular wireless network through a high data transmission connection so as to define at least one access point between the micro base station and the wireless network. The network includes a wireless interface and receives operation commands from a network controller for configuration of micro base stations, to support the linking of cellular wireless terminals to the wireless network via the wireless interface by operation of the micro base station, as an intermediary. A corresponding system and computer readable medium is also provided12-04-2008
20120236757Convergent network topology discovery and mapping - Convergent network topology discovery and mapping. A topology discovery protocol allows for the discovery of the different respective communication links within a convergent network that may become composed of any of a number of different respective network types (e.g., a local area network (LAN), wireless LAN (WLAN/WiFi), a multimedia over coax alliance (MoCA) network, a HomePlug network, and a wireless point to point (P2P) system, etc.). Such a topology discovery protocol may be implemented as a Layer 2 peer-to-peer link layer discovery protocol (LLDP). Topology discovery may be limited to neighboring nodes only (e.g., reporting information corresponding only to those nodes directly connected to a given node). Any desired device within the overall convergent network may serve as a mapper operative communication device (e.g., that device which performs the mapping service such as in accordance with generating a graph corresponding to the topology indicating of connectivity among the various communication devices).09-20-2012
20130163473IP ROUTER AND METHOD OF ALLOCATING IP ADDRESS - An Internet Protocol (IP) router and a method of allocating an IP address are provided. The IP router includes: an IP management unit which, if the IP router is connected to a second router connected to a second WAN, is allocated a preset number of IP addresses from the second router; and a Dynamic Host Configuration Protocol (DHCP) server unit which allocates the allocated IP addresses to at least one communication device connected to the IP router to form a sub network between the at least one communication device connected to the IP router and a communication device connected to the second router.06-27-2013
20080253306Distributed routing table architecture and design - A Distributed Routing Table (DRT) mesh can comprise two or more nodes, each of which maintains its own routing table that represents some or all of the overall routing knowledge of the DRT mesh. Each node can be comprised of modular components that can perform various defined functions such that the features and abilities of the node can be customized by an application based on which modular components are instantiated. A routing table management module can maintain individual routing tables at each node, and can ensure that only entries that are close to the node, in a network topology sense, are maintained in the routing table. In addition, a security module can verify received messages based on an agreed-upon root certificate.10-16-2008
20100014442METHOD AND APPARATUS FOR LOOP PREVENTION IN COMMUNICATION NETWORKS - A method and apparatus route data packets in communication network. A current routing topology of the network is analyzed and a digest value representing the current routing topology is determined. The digest value is encapsulated within the data packet. The data packet is forwarded according to the current routing topology.01-21-2010
20100014443Methods and Systems for Location Estimation - A network operating center for a network comprising known-location and unknown-location nodes can be configured to receive from each unknown-location node estimates of the distances from that node to each of its neighbor nodes. The network controller can then choose an initial location estimate for each unknown-location node and compute distances from the initial location estimates to the corresponding neighbor nodes. The network operating center can then choose subsequent location estimates of the unknown-location nodes by minimizing an error criterion based on a comparison of the received neighbor node distance estimates with the computed neighbor node distances.01-21-2010
20110280158IP-ADDRESS DISTRIBUTION DEVICE AND IP-ADDRESS DISTRIBUTION METHOD - A path-information obtaining unit obtains a piece of path information of a communication network by inquiring a port number of an Ethernet switch that transmits a MAC address of a request source of an IP address. An IP-address specifying unit specifies an IP address that corresponds to the piece of path information of the communication network by referring to an IP-address correspondence table, and distributes the specified IP address to the request source of an IP address.11-17-2011
20110286361Method for Detecting Network Asymmetrical Status and Asymmetrical Communication Channels for Power System - The present invention provides a new synchronization method named Multi-Node Echo Method (MNEM), which settles the problem of clock/data synchronization with asymmetrical channels. In MNEM, the echo messages are relayed among multi-node loop both by clockwise and anti-clockwise. Based on Multi-Node Echo Method, the invention further provides a method to detect symmetrical status of a communication network, a method to detect asymmetrical status of any channel in a communication network, and a method to calculate the sending and receiving delay values of any channel in a communication network, even when the channel is asymmetrical.11-24-2011
20120099480COMMUNICATION MANAGEMENT APPARATUS, COMMUNICATION NODE, AND COMMUNICATION SYSTEM, AND DATA COMMUNICATION METHOD - The communication management apparatus includes a network-presence-check processing unit that performs network presence check processing for generating network presence information, a token-circulation-order determining unit that determines token circulation order using the network presence information, a setup processing unit that notifies each of communication nodes in the network of token circulation destination information, a token-frame processing unit that, after transmission of a data frame by a data-frame-communication processing unit, transmits, based on the token circulation order, a token frame including information concerning a transmission right acquiring apparatus that acquires a transmission right next and determines whether the transmission right acquiring apparatus of the transmission right acquiring apparatus information of the received token frame is the own apparatus, and the data-frame-communication processing unit that performs transmission and reception processing for a data frame for acquiring the transmission right.04-26-2012
20120099479TECHNIQUES TO MANAGE WIRELESS CONNECTIONS - A system, apparatus, method and article to manage wireless connections are described. The apparatus may include a connection management module to automatically form a first connection between a first mobile device and a second mobile device, and a second connection between the second mobile device and a fixed device, wherein the first mobile device is to communicate information with the fixed device using the first and second connections. Other embodiments are described and claimed.04-26-2012
20110299425Addressing and Routing Scheme for Distributed Systems - The embodiments herein relate to distributed systems and more particularly, to logical address allocation and data routing in a distributed systems. A plurality of methods for logical address allocation are disclosed, which the network adapts based on the configurable parameters and the network working environment. Since the nodes are allocated logical address based on the algorithm, while routing the data packet each node calculates the shortest path next hop towards the destination based on the algorithm used for addressing and forward the data.12-08-2011
20110292836EVOLUTION OF ETHERNET NETWORKS - An Ethernet network comprises nodes which support a plurality of different forwarding modes. A range of VLAN Identifiers (VIDs) are allocated to each of the forwarding modes. Connections are configured between a source node and a destination node of the network using different forwarding modes. Packets carrying data traffic are sent to the destination node by selectively setting a VID in a packet to a first value, to transfer a packet via a first connection and a first forwarding mode, and a second value to transfer a packet via the second connection and the second forwarding mode. Packets received from both of the connections and sent on to an end user. VLAN Identifiers can be allocated to different releases of functionality at nodes (e.g. software releases) such that packets are forwarded via a set of nodes supporting a first release, or via a set of nodes supporting a second release.12-01-2011
20110134801NETWORK DEVICE, AND CONTROL METHOD AND STORAGE MEDIUM THEREFOR - A network device capable of performing auto-negotiation at a proper communication speed. In the network device, a cable speed setting unit decides, based on LAN cable category information, a maximum communication speed that can be guaranteed by a LAN cable connected to a physical layer circuit of the network device, and a speed decision unit compares the maximum communication speed notified from the cable speed setting unit with each of communication speeds that can be set for the physical layer circuit and decides an upper limit communication speed for use when a communication speed is decided by auto-negotiation.06-09-2011
20110292834Maintaining Time Series Models for Information Technology System Parameters - A network-centric modeling mechanism is provided for updating network models in order to mitigate network issues. The network-centric modeling mechanism determines for each component in a plurality of components whether a system parameter in a set of parameters particular to the component has deviated from a predicted system parameter value in a set of predicted system parameter values past a predetermined threshold. Responsive to the system parameter deviating from the predicted system parameter value past the predetermined threshold, the network-centric modeling mechanism generates an event stream indicating a sufficient deviation. The network-centric modeling mechanism determines whether the event stream matches a previous pattern. Responsive to identifying the previous pattern that matches the event stream, the network-centric modeling mechanism preemptively mitigates any related issues in the component or in a related component in the plurality of components using topology-aware indices associated with the previous pattern.12-01-2011
20110292835METHOD, AND DEVICE FOR CONFIGURING WIFI PARAMETERS - A computer-implemented method for configuring Wireless Fidelity (WiFi) parameters is provided in an embodiment of the present disclosure, including: obtaining the WiFi parameters sent by a mobile access point (AP) that supports a WiFi function; by using a universal serial bus (USB) connection when the USB connection is established between a computer terminal and the mobile AP and implementing, by the computer terminal, WiFi Internet access configuration by using the WiFi parameters. A computer terminal for configuring WiFi parameters, a mobile AP that supports a WiFi function, and a system for configuring WiFi parameters are provided in other embodiments of the present disclosure.12-01-2011
20090274069INTER-ACCESS NETWORK TOPOLOGY DISCOVERY - The disclosure relates to building a topology map that can be used to provide a requesting wireless terminal with information relevant to its current location. Information on neighboring cells of different access networks is maintained in the topology map. An inter-access network (IAN) topology apparatus builds to topology map based on results of previous IAN session transfers such as handovers from one access network to a different access network. When the requesting wireless terminal currently accessing a current network makes a request for topology information, the IAN topology apparatus provides a list of cells of other than the current access network in the area of the requesting wireless terminal. The requesting wireless terminal uses the information to scan for cells of other access networks to potentially perform the IAN session transfer. The requesting wireless terminal conserves power by scanning only for accessible cells indicated to be in its area.11-05-2009
20100034120COMMUNICATION APPARATUS AND CONTROL METHOD THEREFOR - A communication parameter providing apparatus capable of providing a plurality of communication parameter sets to a reception apparatus. The communication parameter selects a communication parameter set which is suitable for and provided to the reception apparatus, based on a device type of the reception apparatus included in a message of automatic communication parameter setting protocol processing.02-11-2010
20090285126METHOD FOR ORGANIZING A NETWORK OF COMMUNICATING OBJECTS AND COMMUNICATING OBJECT FOR THE IMPLEMENTATION OF THE METHOD - A system and method organize a network of communicating objects in at least one partition comprising a plurality of communication cells respectively covered by a plurality of leader nodes, the network having a set of allocatable addresses split into a plurality of address pools distributively managed by the leader nodes. Upon a new node arrival, phase (a) and possibly phase (b) are executed. During phase (a), if the new node detects a leader node, it allocates address from its managed address pool and the new node assumes a member node roll in the leader node cell. If the new node does not detect any leader node in its vicinity, it goes on to the phase b). (b), wherein, if the new node detects a first cell member node, it assumes the role of leader covering a second cell, obtains an available pool of managed addresses and is allocated one of the obtained addresses.11-19-2009
20120236758HYBRID NETWORKING SIMPLE-CONNECT SETUP USING FORWARDING DEVICE - A simple connect setup function for hybrid networks is provided that allows a user to add devices optionally having a number of different network interfaces (e.g., that facilitate communications using different network technologies or protocols) to a hybrid network in a single, simplified operation that alleviates the need for the user to individually connect and/or configure a multitude of different network interfaces. The simple connect setup function also alleviates the need for the user to know on which devices the simple connect setup function must be activated for successful simple connect setup.09-20-2012
20090245140BIONETS ARCHITECTURE FOR BUILDING SERVICES CAPABLE OF SELF-EVOLUTION - Systems and methods are provided for effectuating a basis for implementing services capable of self-creation, self-evolution and/or substantive personalization without direct intervention from, e.g., a service provider. The resulting services are flexible and user-friendly, as a basic set of service primitives can be updated and extended at any point. Additionally, new and/or improved service functionality that is adapted to a user's behavior is done so in a non-intrusive manner. Additionally, implementation of service families, meta-service and readdressing as described above in accordance with various embodiments allows for the maximization of, e.g., a community training effect, when some interesting service finding of one community user can be easily shared and utilized by other users. Moreover, the systems and methods described herein for implementing/providing a basis for a flexible architecture minimizes resource consumption on the client side.10-01-2009
20090147703Method for Efficiently Retrieving Topology-Specific Data for Point-to-Point Networks - Network topology codes are computed and used as keys to retrieve topology-specific information for isomorphic networks.06-11-2009
20100128639METHODS AND SYSTEMS FOR SUPPORTING MULTIPLE NAME SERVERS IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can be configured to include a network configuration module that can set-up, configure, and manage network connections served by the provisioning server including name servers, such as Domain Name System (DNS) servers, in the network connections. The provisioning server can be configured to maintain a set of network modules, each network module corresponding to a different type of name server. Each of the network modules can be configured to include logic for generating or altering a configuration file for the corresponding type of name server.05-27-2010
20080316943Method for Establishing a Wireless, Autonomous Communications Network, Transceiver and Base Station of a Wireless, Autonomous Communications Network and Corresponding Wireless, Autonomous Communications Network - The present disclosure provides optimal network performance and network illumination in a wireless, autonomous communications network with a dynamic network topology achieved by auto-configuration. Functional alogorthemic enhancements of the communications network are used, enabling the communications network to automatically determine the current network configuration and the accessibility of the transceivers that are associated with the communications network by using measurements and to determine the optimal position of a master station at any one time from the data obtained from the measurements.12-25-2008
20130182615ENERGY-SAVING MANAGEMENT METHOD AND SYSTEM FOR WIRELESS SENSOR NETWORK, AND REMOTE MANAGEMENT SERVER - The disclosure provides an energy-saving management method and system for a wireless sensor network, and a remote management server. In the method, the wireless sensor network sends remaining energy information of a node, and/or network topology information, and/or node hibernation information to a remote management server through a gateway device; the remote management server stores the information, makes an energy-saving decision according to the information, and sends the energy-saving decision to the wireless sensor network through the gateway device; and the wireless sensor network makes a response according to the energy-saving decision. Through the solutions, the remote management server provides the wireless sensor network with an energy-saving strategy so as to reduce the processing amount of the wireless sensor network caused by network topology management, thereby reducing the power consumption, prolonging the lifetime, and implementing the remote energy-saving management of the wireless sensor network.07-18-2013
20130182614PEER-TO-PEER COMMUNICATION IN AD HOC WIRELESS NETWORK - For a peer-to-peer call in an ad hoc wireless network, a wireless device performs discovery of a target wireless device, performs authentication of the target wireless device and generates a session key (e.g., using a pre-shared key or a certificate provisioned on the wireless device), forms an ad hoc wireless network with the target wireless device, and communicates peer-to-peer with the target wireless device via the ad hoc wireless network. The wireless device may perform discovery with a list of identifiers for wireless devices designated to communicate with this wireless device. The wireless device may derive a service set identifier (SSID) used to identify the ad hoc wireless network based on its user-specific identifier (e.g., its phone number) and/or a user-specific identifier for the target wireless device. The wireless device may also performs IP address discovery using the user-specific identifier for the target wireless device.07-18-2013
20130182613COMMUNICATION APPARATUS, COMMUNICATION METHOD THEREFOR, AND PROGRAM - A communication apparatus searches for another network after a network is created, participates in another network in accordance with a role, in communication parameter setting processing, of a communication apparatus existing in another network, and executes the communication parameter setting processing. After the communication apparatus decides to receive the communication parameters from another communication apparatus, the communication apparatus determines an activation state of a providing function of a provider apparatus of the communication parameters, and requests the provider apparatus to provide the communication parameters in accordance with the determination.07-18-2013
20130182612Method for Efficiently Retrieving Topology-Specific Data for Point-to-Point Networks - Network topology codes are computed and used as keys to retrieve topology-specific information for isomorphic networks.07-18-2013
20110149806METHOD AND APPARATUS FOR SERVICE DISCOVERY IN WI-FI DIRECT NETWORK - A method and an apparatus for service discovery in a Wi-Fi direct (WFD). The method includes: generating by a first WFD device a service discovery request frame for discovering whether a service is supported by a second WFD device in the WFD network; transmitting the generated service discovery request frame from the first WFD device to the second WFD device; and receiving at the first WFD device a service discovery response frame from the second WFD device in response to the transmitted service discovery request frame, wherein the service discovery request frame and the service discovery response frame are generated by using a Wi-Fi protected setup (WPS) information element (IE).06-23-2011
20100085898METHODS FOR DETECTING ROUTING LOOPS BETWEEN HOME AGENTS - Certain aspects of the present disclosure provide methods for detecting a routing loop between at least two home agents utilizing the mobile internet protocol (MIPv6) standard. In a first method, the home agent sends a test message to the last care of address associated with a mobile node and receives a reply if there is no loop. In a second method, the home agent parses a packet and checks if the address of any of the inner headers matches the address of the home agent to find a loop between home agents.04-08-2010
20110267981NETWORK ARCHITECTURE - The present invention provides a network architecture. An embodiment includes a plurality of nodes interconnected by links. Each node can maintain knowledge of other nodes in a database. The database contains a list of other nodes in the network, and a ‘next-best-step’ for each of those other nodes, pointing to a neighbouring node that is the next best step to that other node. Where a particular node of the network is not in the list, then the next-best-step is assumed to be the next-best-step most commonly identified in the database. Such a network will form a “core” wherein any node in the network can find any other node in the network by first seeking out that other node at the core. Once the nodes locate each other via the core, a more optimum route forms in the network according to the most desirable path between those nodes.11-03-2011
20120106399IDENTITY MANAGEMENT SYSTEM - A local identity management module is described that is able to identify each of a plurality of user devices. The user devices communicate with the outside world via a network address translation device that converts an internal address of the user devices to a single internet protocol address, typically the internet protocol address of the network address translation device. An external identity management system can communicate with the local identity management module in order to identify which of said plurality of user devices made a particular request and, in some embodiments, to identify a user of said user device.05-03-2012
20120106397IMPROVEMENTS TO BODY AREA NETWORKS - A method of performing communications of network devices (05-03-2012
20080291848Information distribution system, terminal apparatus used in same system and recording medium on which is recorded a program, as well as information processing method - To provide an information distribution system which forms a tree-shaped hierarchical structure and distributes contents information, and in which it is possible for a connection destination of a terminal apparatus newly participating in a hierarchical structure of a distribution channel to be selected by a user of the terminal apparatus. A terminal apparatus, when participating in a hierarchical structure of a certain distribution channel, acquires information on the hierarchical structure, and displays participation statuses in the hierarchical structure of a plurality of terminal apparatus configuring the hierarchical structure in a predetermined topology information display area 11-27-2008
20090285125Iterative synchronous and Asynchronous Multi-User Detection with Optimum Soft limiter - An iterative method for multi-user detection in Code Division Multiple Access (CDMA) Systems is used to improve the capacity of the network for random codes. A soft limiter function is used in the output of each step of iterations to accelerate the convergence and also to improve the interference cancellation power of this method.11-19-2009
20090285124WIRELESS MESH NETWORK TRANSIT LINK TOPOLOGY OPTIMIZATION METHOD AND SYSTEM - A method and configuration manager generates a routing topology for a wireless mesh network. The wireless mesh network has a plurality of internal nodes, at least one edge node, and at least one originating device. A plurality of potential routing solutions is determined which contain a plurality of paths through the wireless mesh network from the at least one originating device to the at least one edge node such that data communicated from the at least one originating device reaches the at least one edge node in no more than a predetermined number of hops. Each potential routing solution is based on at least one measured wireless communication parameter between internal nodes. Metric calculations for each potential routing solution are computed to determine a preferred routing solution. The wireless mesh network is configured to route traffic using the preferred routing solution.11-19-2009
20120294193Method and System for Increasing Forwarding Efficiency of Virtual Private LAN Service Network - The present invention provides a method and system for increasing forwarding efficiency of a virtual private LAN services network. The method includes: a root node provider edge (PE) in the VPLS network transmitting at least one of broadcast message, multicast message and unknown unicast message to leaf nodes PE in the same VPLS through a point-to-multipoint pseudo wire (P2MP PW). The present invention transmits messages through the P2MP PW between a PE and other PEs, thus decreasing the number of redundant messages on a physical link, increasing the forwarding efficiency of network, and reducing the network operating costs.11-22-2012
20120294192METHOD AND APPARATUS OF CONNECTIVITY DISCOVERY BETWEEN NETWORK SWITCH AND SERVER BASED ON VLAN IDENTIFIERS - A management computer for managing configuration of servers for connection to a switch comprises a port discovery module to: instruct a target server, for connection to a target switch port, to create a virtual adapter on a virtual switch associated with a physical NIC in the target server; obtain a list of VLAN IDs on all switch ports; select one or more VLAN IDs from the list based on a preset policy; set one such VLAN ID onto the virtual adapter; instruct the target server to manipulate the virtual adapter to send a packet with the set VLAN ID to the target switch port; if the switch accepted the packet sent to the target switch port, update a switch port mapping using the set VLAN ID as a discovered VLAN ID to map the physical NIC associated with the virtual adapter to the target switch port having the discovered VLAN ID.11-22-2012
20100214960Method for establishing bidirectional data transmission paths in a wireless meshed communication network - The invention relates to a method for establishing a bidirectional data transmission path in a wireless meshed packet-switched communication network, wherein a logical topology in the form of at least one routing tree can be proactively established, wherein a root network node (R) of the routing tree sends first unidirectional data transmission paths regarding routing request messages (RANs) specifying the root network node (R) to the network nodes (M08-26-2010
20100061275Algorithm for Network Route Selection - A method for selecting a path in a physical network that selects nodes for the path based on the coordinates of the nodes in a representation of the subject network in space. From a working node M that is included in the selected path, the next node that is selected for the path is a node N such that (a) a link MN exists, and (b) the link MN forms an angle relative to a line that connects working node with the destination node that is smaller than the angle that any other link from node M forms with the line that connects working node with the destination node03-11-2010
20100061274AUTOMATIC TERMINATION PATH CONFIGURATION - There is provided herein a system and method for automatic configuration of data routings for use with electronic data such as phone calls, faxes, etc. In the preferred embodiment, when more than one carrier might potentially terminate the transmission, the carriers are ordered based on some screening criterion (e.g., transmission price). Data transmissions are then assigned to the carriers based on the sorting order, with the second place and lower carriers (e.g., the higher priced carriers) not being selected unless the first carrier cannot complete the transaction. The switch instructions necessary to implement this scheme are generated automatically.03-11-2010
20100128640APPARATUS AND METHOD FOR CALCULATING AN OPTIMUM ROUTE BETWEEN A PAIR OF NODES IN A COMMUNICATION NETWORK - A node apparatus and method for calculating a route between a pair of nodes in a communication network. There is provided a topology table for storing topology information on links being used by an existing path in the communication network, and a virtual topology table is generated. The virtual topology table stores topology information in which links being used by the existing path are virtually released and made unused. An optimum route for a path connecting a pair of nodes in the communication network is computed on the basis of the virtual topology table.05-27-2010
20100142408Designing minimum total cost networks using iterative rounding approximation methods - Minimum cost networks, such as fiber optic networks used in telecommunications, are obtained by defining available network elements having cost, required pairs, connectivity and penalty cost values and selecting from these available elements using an iterative rounding approximation method that constructs an LP relaxation incorporating the element parameters, finds an optimal basic solution, applies a selection criterion to pairs and edges in the optimal basic solution, and constructs a residual LP relaxation with selected pairs and edges. By fixing selected pairs and edges values to 1 in the residual LP, successive iterations of the method provide a design which is a 3-approximation solution to the minimum cost design problem.06-10-2010
20120057506Large network association procedure in power efficient manner - The embodiments herein generally relate to distributed systems and more particularly, to association procedure in a large network. In this invention time is divided into different zones each for specific task such as to wake-up dormant devices, to synchronize unassociated devices, to transmit identity frame and then to associate with network coordinator device. In each time zone plurality of nodes perform the specific task simultaneously. This improves the power efficiency and speeds up the association procedure. This technique also improves neighboring table information, which enables better localization.03-08-2012
20080273473Method and System for Realizing Network Connection Service - A method and system for implementing a network connection service is provided. In the invention, the port information of the network ingress node and the network egress node is registered with the directory server or configured manually. During the establishment of the network service connection, a request for establishing the network connection service between the source user node and the destination user node is initiated, and the directory server is queried in response to the request to obtain the connection and adaptation mode for establishing the network connection service, which is supported by both the network ingress node and the network egress node, and the network connection is established and the adaptation configuration is performed according to the connection and adaptation mode to establish the network connection service.11-06-2008
20080291847Topology and route discovery and management for relay networks - Various example embodiments are disclosed relating to route discovery and management in relay networks. In an example embodiment, a first message may be received at a first network station in a wireless network. It may be determined whether the received first message includes an identifier of a second network station indicating an attachment of a network node to the second network station. The received first message may be modified to include an identifier of the first network station indicating an attachment of the network node to the first network station if it is determined that the received message does not include the identifier of the second network station. The received first message may be forwarded to a third network station. Various techniques may also be provided for updating and managing a network topology, e.g., for discovering, updating, and selecting communication paths for network traffic.11-27-2008
20100142409Self-Forming Network Management Topologies - The present invention relates to a network management system, a network element and a method for managing the network management system, the system operating in a computer or telecommunication network. The network comprises at least one network element that is able to communicate in the network through links. A network management software is contained and run on the network element. According to the present invention the network management software comprises controlling means for each management function or functions that the network element is part of, the controlling means being able to form, reform and/or terminate the topology for the management function. It further comprises register means for each management function or functions that the network element is part of, the register means being able to register and share information about the topology for the management function.06-10-2010
20080304427Node Self-Configuration And Operation In A Wireless Network - A device performs a self-configure process for operations in a managed network to allocate a network address for the device by determining if the device will operate as a gateway of the managed network, obtaining a network address for communication with external devices outside of the managed network in response to determining that the device will operate as a gateway, scanning for neighbor devices operating in the managed network and maintaining a database of neighbor devices located in the scanning, and selecting a managed network to join based on the database of neighbor devices in response to determining that the device will operate as a node.12-11-2008
20110007671METHOD FOR ACQUIRING INFORMATION, USER EQUIPEMENT, AND NETWORK EQUIPMENT - A method for acquiring information includes: receiving an Internet Protocol (IP) address acquisition request or Packet Data Network (PDN) address allocation information sent by User Equipment (UE); determining a PDN address capability according to the IP address acquisition request or the PDN address allocation information; and sending the determined PDN address capability to the UE. An UE and network equipment are also provided. The PDN address capability is determined by the network and is sent to the UE, so as to indicate to the UE the IP address information that may be acquired in a current PDN connection, such that when the network cannot provide an IP address for the UE any more, the UE is prevented from acquiring other IP addresses in other manners, avoiding service abnormality.01-13-2011
20110007670Stacking System and a Method for Switching Traffic in the Stacking System - The invention provides a stacking system and a method for traffic switching in the stacking system, comprising: when newly joined devices in the stacking system make the daisy chain topology change to ring topology, block a stack port of one of the newly joined devices; after the devices in the stacking system perform another topology convergence process, the master restores the configuration of the newly joined devices; after the configuration of the newly joined device one of whose stack ports is blocked is restored, it sets its blocked stack port to the forwarding state, calculates the shortest path based on the ring topology, and sends first notification packets for topology change from daisy chain type to ring type through its two stack ports; each device that receives the first notification packets re-calculates its shortest forwarding path respectively and switches the traffic, and then forwards the first notification packets. This invention can prevent traffic interruption that occurs when the topology of a stacking system changes from daisy chain to ring.01-13-2011
20110007669Method and Apparatus for Controlling Packet Transmissions Within Wireless Networks to Enhance Network Formation - Network formation in wireless networks according to an embodiment of the present invention is enhanced based on control of network formation packet transmissions (e.g., Packet Radio Organizational Packet (PROP) transmissions). A source-initiated approach controls re-transmission of inquiry/reply PROP packets based on the presence of a neighboring node. This reduces the size and amount of PROP packets transmitted during neighbor discovery. In addition, the source-initiated approach controls re-transmission of PROP packets indicating a change in an upstream or control type node (e.g., LNC PROP). In this case, the node determines the presence of steady-state conditions (e.g., maintenance of conditions for the original LNC PROP transmission), and enables a single re-transmission of the LNC PROP packet, thereby reducing the transmission of unnecessary or duplicate LNC PROP packets (e.g., containing substantially the same information as previously transmitted packets since conditions have remained the same).01-13-2011
20100142410SYSTEM AND METHOD FOR PROVIDING VIRTUAL PRIVATE NETWORKS - A computerized system and method for automatically determining customized configurations for each of a plurality of endpoints of a virtual private network (VPN) and deploying the configurations to the endpoints, comprising: accepting, using an interface, parameters required for building the configurations from a user, the configurations enabling the endpoints to process a mixture of time sensitive and non-time sensitive data, and the parameters comprising: endpoint IP addressing scheme information and network design information; automatically generating, using at least one configuration engine, complete customized endpoint configurations for the parameters, and instantiating the configurations based on endpoint hardware-specific information, with no further input required from the user; and deploying, using a scheduler, the configurations to the endpoints of the at least one VPN, wherein the VPN is an mGRE VPN using NHRP protocol.06-10-2010
20080267091SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR SERVICE AND APPLICATION CONFIGURATION IN A NETWORK DEVICE - A method is provided that includes accessing information associated with at least one service or application in a social network. The method also includes detecting at least one event relating to the information associated with the at least one service or application within the social network and modifying the information associated with the at least one service or application in response to the at least one event.10-30-2008
20120195231DYNAMIC NAME GENERATION - A dynamic name of a device within a network may be generated by accessing information related to the device; accessing information related to a remote, neighbor device; generating a dynamic name of the device based on the accessed information related to the device and the accessed information related to the remote, neighbor device; and storing the generated dynamic name of the device. Alternatively, a topology map of devices within a network may be generated where a central controller may access, from memory, a dynamic name of controlled devices, the dynamic name of the controlled devices including information related to remote, neighbor devices of the controlled devices. The topology map may include dynamic names of the controlled devices.08-02-2012
20090180401METHOD AND DEVICE FOR LOOP WITHDRAWAL IN A MPLS NETWORK - A loop withdrawal method in multi-protocol label switching is disclosed. When detecting a rewinding event of colored thread, a node judges whether an upstream interface of the colored thread is in a stalled status, and if yes, prohibits distribution of a colored thread rewinding message via the upstream interface of the colored thread; otherwise, the node continues to distribute the colored thread rewinding message and transmit label mapping via the upstream interface. When detecting a withdrawal event of the colored thread, the node removes colored thread information of the upstream interface of the colored thread, judges whether the node has received another colored thread for a same service, and if yes, extends a new colored thread via a downstream interface of the colored thread; otherwise, the node continues to distribute a colored thread withdrawal message via the downstream interface of the colored thread.07-16-2009
20110205935Frequency Scanning to Form a Communication Network - A node forms a network by scanning for an existing network. If an existing network is not found, the node operates as a network controller node of the first network and admits at least one client node to the first network. As a network controller node, the node designates one of the client nodes as a scout node. The scout node removes itself from the first network and scans for a second network. If the scout node does not return to the first network after a predetermined time, it is assumed that the scout node has found a second network. The network controller node of the first network then designates the remaining client nodes as scout nodes, and then joins the second network as a client node. Therefore, multiple networks are avoided.08-25-2011
20120093036METHOD, SYSTEM AND NETWORK DEVICE FOR IMPLEMENTING LOCAL IP ACCESS - A method for implementing local Internet Protocol (IP) access includes: obtaining User Equipment (UE)'s first information that is used for implementing local IP access; and implementing local IP access of the UE according to the first information. A system for implementing local IP access is disclosed by the present invention. The system can communicate with UE and includes: a NodeB, configured to obtain UE's first information that is used for implementing local IP access, and implement local IP access of the UE according to the first information; and a core network node, configured to assist the NodeB in obtaining the UE's first information that is used for implementing local IP access. Besides, relevant network devices are also disclosed.04-19-2012
20090003242DATA ATTACHMENT POINT SELECTION - An algorithm for improving efficiency of data attachment points (DAPs) in a wireless access network (AN) is provided herein. By way of example, the algorithm can identify a serving access point (APs) coupling an access terminal (AT) to the wireless AN. A cost metric for the serving AP can be determined with respect to at least one data network access gateway (AGW) of the wireless AN. The cost metric can be compared with a similar cost metric of a current or default DAP assigned to the AT. If the cost metric of the serving AP is lower than the cost metric of the current/default DAP, the DAP can be re-assigned to the serving AP, minimizing wireless AN resource costs associated with the DAP.01-01-2009
20120069772COMMUNICATIONS SYSTEM PROVIDING MOBILE WIRELESS COMMUNICATIONS DEVICE APPLICATION MODULE ASSOCIATIONS FOR RESPECTIVE WIRELESS COMMUNICATIONS FORMATS AND RELATED METHODS - A communications system may include a plurality of electronic devices having respective different device types and each configured to wirelessly communicate via a plurality of different wireless communications formats. The system may also include a mobile wireless communications device including a plurality of application modules associated with respective electronic device types and configured to communicate via a first one of the wireless communications formats. The mobile wireless communications device may further include a control module configured to establish an initial wireless communications link with a given electronic device using a second one of the wireless communications formats, determine a respective device type for the given electronic device based upon the established initial wireless communications link, and cause a respective application module to establish a subsequent wireless communications link with the given electronic device using the second wireless communications format based upon the determined respective device type.03-22-2012
20120069771DISCOVERING RESOURCES - A method for discovering resources includes identifying one or more geographically fixed transceivers with which a mobile device is in communication and through which the mobile device can communicate with other devices. A resource geographically associated with the identified one or more transceivers is identified. Identification occurs without regard to a signal strength or strengths experienced between the mobile device and the one or more transceivers. The mobile device is caused to display data corresponding to the identified resource03-22-2012
20090147702Method and Apparatus for Forming and Configuring a Dynamic Network of Mobile Network Nodes - The invention includes methods for forming, configuring, and managing a dynamic wireless network. A dynamic wireless network may be formed from at least one wireless node. The dynamic wireless network uses a Role Assignment Protocol (RAP) adapted for assigning one or more roles to each of the at least one wireless node. The dynamic wireless network uses a Network Configuration Protocol (NCP) adapted for configuring each of the at least one node at least according to the assigned role(s). A dynamic wireless network may be modified in response to one or more conditions, such as a wireless node joining the dynamic wireless network, a wireless node leaving the dynamic wireless network, wireless nodes moving within the dynamic wireless network, and the like. A dynamic wireless network may be split into multiple dynamic wireless networks and, similarly, multiple dynamic wireless networks may merge to form one dynamic wireless network.06-11-2009
20090185508METHOD AND APPARATUS FOR DIRECTIONAL NETWORKING TOPOLOGY MANAGEMENT - A computer implemented method, apparatus, and computer program product to managing links in a network. A directional link management system comprises a network manager, a router, a situational awareness database, a neighbor discovery module, a topology manager, and a data link manager. The network manager provides performance parameters for a wireless network. The router routes information to neighbor nodes provides information about links between nodes in the wireless network environment. The situational awareness database stores information about the nodes. The neighbor discovery module detects a presence of a new node. The topology manager identifies a set of links for a node using the set of performance parameters, information about the links, and information about the nodes. The data link manager manages the identified links.07-23-2009
20090252063Method & system for configuring a network communications device - A method and system for auto-provisioning communications devices, the system includes a network appliance associated with a software and/or hardware module with instructions for managing the automatic configuration of communications devices.10-08-2009
20090252061METHODS AND APPARATUS TO IMPLEMENT A PARTIAL MESH VIRTUAL PRIVATE LOCAL AREA NETWORK SERVICE - Methods and apparatus to implement a partial mesh virtual private local area network service are disclosed. An example method to implement a partial mesh virtual private local area network service (VPLS) network disclosed herein comprises identifying a desired partial mesh topology of connections for interconnecting a plurality of provider edge devices comprising the VPLS network, and decomposing the partial mesh topology into a plurality of cliques, wherein each clique comprises a respective full mesh topology of connections for interconnecting a respective subset of the plurality of provider edge devices, and wherein a union of the plurality of cliques implements the desired partial mesh topology.10-08-2009
20090252062Methods for automatically configuring devices in telecommunication networks and devices for use with such methods - A method for automatically configuring a device by means of an automatic configuration means adapted for automatically configuring the device by means of a remote management protocol (RMP), comprising setting up an RMP session between the device and the automatic configuration means is disclosed, wherein when during the RMP session at least one parameter value of the object model of the device is changed, the device communicates the changed parameter value(s) to the automatic configuration means after the initiation and before the termination of the RMP session.10-08-2009
20090034433Method for Rebuilding an Ad Hoc Network and the Nodes Thereof - The invention relates to a method for rebuilding an ad hoc network, in particular a ZigBee-type network consisting (A) in collecting data of the network nodes in terms of quality of connections and non-optimal network trees, (B) in calculating a current optimised structure, (D) in setting optimisation data and injecting them into the network and (E) in rebuilding the network according to said current optimised structure.02-05-2009
20110222438TECHNIQUES FOR SELF-ORGANIZING ACTIVITY-DIFFUSION-BASED WIRELESS SENSOR NETWORK - Methods and wireless sensor nodes for aggregation-driven topology formation in a Wireless Sensor Network (WSN) are provided. A method for aggregation-driven topology formation in a WSN includes aggregating sensor data by one or more first sensor nodes, sending, by each of the one or more first sensor nodes, at least one activity diffusion message to each of at least one neighboring node of one or more second sensor nodes, wherein each activity diffusion message includes an activity diffusion weight, receiving, by each of the one or more second sensor nodes, respective of the at least one activity diffusion message from at least one neighboring node of the one or more first sensor nodes, accumulating, by each of the one or more second sensor nodes, activity diffusion weights included in the at least one activity diffusion message received from the at least one neighboring node of the one or more first sensor nodes, sending, by each of the one or more first sensor nodes, the aggregated data to at least one of the at least one neighboring node of the one or more second sensor nodes, and receiving, by the at least one of the at least one neighboring node of the one or more second sensor nodes, the aggregated data from respective of the one or more first sensor nodes.09-15-2011
20130121210SECURITY SYSTEM AND METHOD FOR WIRELESS COMMUNICATION WITHIN A VEHICLE - A method for reprogramming a node of an electronic communication system includes transmitting a signal from a first node to a second node. The signal requests that the second node be reprogrammed. The signal includes an identification of the first node. The second node is used to broadcast the identification of the first node to other nodes in the communication system. The second node is reprogrammed only if a predetermined quantity of the other nodes confirm, based on the identification, that the first node is legitimate.05-16-2013
20130121211FLOODING-BASED ROUTING PROTOCOL HAVING DATABASE PRUNING AND RATE-CONTROLLED STATE REFRESH - An enhanced, flooding-based link state routing protocol is described that provides pruning of link state data and, when needed, rate-controlled refresh of the pruned link state data from other routers of the flooding domain. A routing device comprises a network interface to send and receive packets over a layer-two (L2) communication medium. The routing device includes a control unit coupled to the network interface, and a flooding-based link state routing protocol executing on a processor of the control unit. The link-state routing protocol establishes an adjacency with a peer router. A database of the routing device includes entries that store a plurality of link state messages for a flooding domain of the link state routing protocol, wherein at least one of the entries in the database stores a partial link state message having a header portion and a payload having pruned link state data.05-16-2013
20090097417SYSTEM AND METHOD FOR IMPROVING SPOKE TO SPOKE COMMUNICATION IN A COMPUTER NETWORK - Various embodiments of the disclosed subject matter provide methods and systems for improved efficiency in spoke-to-spoke network communication. Embodiments provide systems and methods for registering a spoke with a hub, updating at least one database with spoke registration information at the hub, and advertising the spoke registration information to other spokes using a single control plane that includes transport security, peer discovery, and unicast routing information.04-16-2009
20090067347COMMUNICATION APPARATUS AND COMMUNICATION METHOD - A storage unit stores therein setting information and history information on a communication established by the setting information. When an information receiving unit receives new setting information, a judging unit judges whether the setting information stored in the storage unit reached a predetermined value. A determining unit compares the history information corresponding to the setting information, and determines a priority for each setting information based on a result of comparison. A deleting unit deletes setting information having the lowest priority from the storage unit, and a storing unit stores the new setting information in the storage unit.03-12-2009
20090097418System and method for network service path analysis - Systems and methods for network service path analysis analyze and manage the delivery of applications over a network. A program running on a computer utilizes a Layer 3 topology of a computer network to create a directed graph representing deliverability of packets across the network. By analyzing access control lists and firewall rule sets from the network, along with modeling routing protocol behavior and policy as packet filters, the program performs a series of matrix multiplications, using an optimized decomposition of the IP packet space. The resulting matrix contains all of the path information for all deliverable packets. The matrix populates a network path database that captures the set of packets deliverable between any pair of Internet Protocol addresses in the network.04-16-2009
20090219835Optimizing A Physical Data Communications Topology Between A Plurality Of Computing Nodes - Methods, apparatus, and products are disclosed for optimizing a physical data communications topology between a plurality of computing nodes, the physical data communications topology including physical links configured to connect the plurality of nodes for data communications, that include carrying out repeatedly at a predetermined pace: detecting network packets transmitted through the links between each pair of nodes in the physical data communications topology, each network packet characterized by one or more packet attributes; assigning, to each network packet, a packet weight in dependence upon the packet attributes for that network packet; determining, for each pair of nodes in the physical data communications topology, a node pair traffic weight in dependence upon the packet weights assigned to the network packets transferred between that pair of nodes; and reconfiguring the physical links between each pair of nodes in dependence upon the node pair traffic weights.09-03-2009
20080259820Creating Non-transit Nodes in a Link State Network - In one embodiment, a method includes receiving a first link state initiation (HELLO) message from a first neighboring router. The HELLO message requests that a recipient node send a unique identifier for itself in a link state routing protocol. In response to receiving the first HELLO message, a first response message is sent that includes a first identifier from an identifier pool. The identifier pool contains for a local node a plurality of network identifiers that are unique among all nodes in the network that uses the link state routing protocol. A second HELLO message is received from a different second neighboring router. In response to receiving the second HELLO message, a second response message is sent that includes a different second identifier from the identifier pool.10-23-2008
20120195232Method And An Apparatus For Providing Configuration Information To A Mobile Terminal - A method and a Mobile Access Gateway (MAG) node for use in an IP network. The MAG node comprises a server for providing configuration information. The server includes a memory for storing configuration information, and a processing unit configured to generate a request for configuration information associated with a mobile terminal that has attached to the network. The server caches the configuration information in the server memory, and includes one or more items of configuration information from the cached information in a message to be sent to the mobile terminal.08-02-2012
20090245141Ethernet Ring Protection-resource Usage Optimization Methods - Reconfiguring a ring network having N nodes and S spans that prevents a maximum usage parameter to be exceeded. The network is configured by selecting a span as a protection span to remain idle. An effect of the configuration on the network that causes the network to exceed a maximum usage parameter is calculated. The network is reconfigured by selecting a different span as a protection span to remain idle based on a result of the step of calculating that a previous span selected as the protection span to remain idle causes the network to exceed a maximum usage parameter such that the maximum usage parameter of the reconfigured network is not exceeded.10-01-2009
20100265848SYSTEM FOR AUTOMATIC CONFIGURATION OF A MOBILE COMMUNICATION SYSTEM - A communication system includes a receive antenna for receiving communication signals, processing circuitry for processing the received communication signals and repeating the signals for further transmission and at least one transmit antenna for transmitting the repeated signals. The processing circuitry utilizes configurable settings for controlling the operation of the communication system and the configurable settings are variable for varying the operation of the system. The processing circuitry is further operable for receiving inputs regarding current operating conditions of the communication system and for selectively adapting the configurable settings of the system based upon the operating condition inputs.10-21-2010
20090080345Efficient multipoint distribution tree construction for shortest path bridging - A telecommunications system includes a source node. The system includes a plurality of destination nodes. The system includes a network having links and end stations. The system includes a plurality of switches that create paths along links between the source nodes and the destination nodes where there is 100% efficiency along the paths with the paths traversing any link only once to the corresponding destination node from the source node, and the path being a shortest path between the source node and the destination node, where each switch has a Dijkstra computation complexity of O(N) in regard to forming the shortest paths. A method for telecommunications includes the steps of creating paths with a plurality of switches along links of a network between a source node and a plurality of destination nodes where there is 100% efficiency along the paths with the paths traversing any link only once to the corresponding destination node from the source node, and each path being a shortest path between the source node and the destination node, where each switch has a Dijkstra computation complexity of O(N) in regard to forming the shortest paths. There is the step of delivering with the switches frames from the source node to the destination nodes along the shortest paths.03-26-2009
20090316606METHODS, DEVICES AND SYSTEMS WITH IMPROVED ZONE MERGE OPERATION BY CACHING PRIOR MERGE OPERATION RESULTS - Methods, devices and systems for improved zone merge operations are disclosed. Two connected switches are arbitrated as an initiator and a receiver. The merge operation is initiated only by the initiator on an initiator/receiver inter-switch link. The initiator may initiate a merge request and the receiver may perform the computation of the difference between the old and the new zone. Either the whole configuration or only the differences are communicated between the switches. The merges may be done on a connected switch basis, not on a connected port basis. Only the principle ports in the principle inter-switch-link perform the merge operation. All the remaining ports, i.e. the non-principle ports, adopt the merge result of the principle ports. The zone information may also be cached on each switch such that merge calculations need not be performed again when a merge operation with the same configuration occurs in the future.12-24-2009
20100189014SYSTEM AND METHOD OF DISTRIBUTING NODE CONFIGURATION INFORMATION - A system of distributing node configuration information to a plurality of nodes in an event is provided. The system includes a first node, a second node operatively connected to the first node, and an event manager operatively connected to the first node and the second node. The event manager transmits the node configuration information to the first node and the second node, and transmits an indication to the first node and the second node to initiate communication between the first node and the second node using the node configuration information.07-29-2010
20100214957Method for network design to maximize difference of revenue and network cost - A method determines an optimal or near-optimal conveyance network layout in which revenue from serviced customer locations is maximized while the cost of installing and/or maintaining the conveyance is minimized. The conveyance may, for example, be a fiber optic telecommunications cable or a power or utility distribution system. Algorithms in the method generate primal and dual bounds in a Prize-Collecting Steiner Tree Problem in Graphs (PCSPG). Those algorithms originate from a Lagrangian Non-Delayed Relax-and-Cut (NDRC) based approach and incorporate ingredients such as a new PCSPG reduction test, an effective Local Search procedure and a modification in the NDRC framework that allows additional reductions in duality gaps to be attained.08-26-2010
20080212496COMMUNICATION NETWORK SYSTEM AND SIGNAL TRANSMISSION METHOD BETWEEN LEAF-NODES OF MULTICAST TREE AND NODE THEREOF - A method of leaf-node of the multicast tree signal transmission and communication network system and node thereof in the communication network. Establishing the connection between the source leaf-node and root node of the transmitting signal in the multicast tree; the source leaf-node of the transmitting signal in the multicast tree transmits signal to the root node through the established connection; the root node in the multicast tree receives the transmitted signal and transmits the signal to the destination leaf-node in the multicast tree. An establishing method of the preparative bi-directional connection from the root-node to the leaf-node in the multicast tree. When the multicast service supported multicasting tree was established in the connection-oriented network, each leaf-node in the multicast tree may act as the signal source node that send signal to other leaf-nodes in the multicast tree, and it is able to share the multicast tree possessive network resource furthest during the signal transmitting between multi leaf-nodes.09-04-2008
20100214959AUTOMATIC NETWORK ADDRESS ASSIGNMENT IN A WIRELESS MESH - A computing environment containing a mesh network that is adapted to provide a reliable transport mechanism over which services may be delivered. Nodes of the mesh can automatically select routable addresses without conflicts, which allows nodes of the mesh to be accessed, even as the mesh changes through the addition or deletion of nodes. Also, nodes communicate with a protocol that supports service advertisements. These advertisements can identify mesh nodes that supply services, such as file or print servers, for which devices that have not yet connected to the network may be searching. Advertisements can also identify services to be used by nodes in the network, allowing, for example, a node to select a gateway providing a reliable connection to an external network. The mesh network can be used as a transport for communication using protocols, such as TCP/IP, that generally exhibit poor performance when using unreliable transports.08-26-2010
20100246444METHOD FOR REGISTERING IN AN IMS DOMAIN A NON-IMS USER DEVICE - A flexible technique for registering in an IMS domain (09-30-2010
20100208622METHOD FOR ROUTING INFORMATION OVER A NETWORK EMPLOYING CENTRALIZED CONTROL - A method and apparatus for centralized control of a network is described. The network includes a number of nodes. The method includes creating a database and storing the database on a master node of the network. The database contains topology information regarding a topology of the network. Each of the nodes is coupled to at least one other of the nodes, with the master node being one of the nodes.08-19-2010
20100208621Method, System and Nodes for Network Topology Detection in Communication Networks - Method for switching to an appropriate network topology type in a telecommunication network including of a node (b) sending to a further node a message (M08-19-2010
20090073896ARRANGEMENTS FOR AUTO-MERGING AND AUTO-PARTITIONING PROCESSING COMPONENTS - In some embodiments, a method for auto-partitioning a scalable processing system is disclosed. The method can include establishing connection data, identifying a primary node and automatically transmitting partitioning commands to other nodes to configure them as secondary nodes. The partitioning commands can adjust the basic input output settings of the secondary nodes such that the system can boot as a single partitioned system. Other embodiments are also disclosed.03-19-2009
20090073895Method and apparatus for dynamic switching and real time security control on virtualized systems - In some embodiments, the invention involves securing network traffic to and from a host processor. A system and method is disclosed which utilizes a second processor on a virtualization technology platform to send/receive and triage messages. The second processor is to forward suspect messages to a virtual appliance for further investigation before routing the suspect messages to one of a plurality of virtual machines running on the host processor. When messages are not suspect, use of the virtual appliance is avoided and messages are routed to one of a plurality of virtual machines via a virtual machine manager running on the host processor. Other embodiments are described and claimed.03-19-2009
20090323557Method and Apparatus for Intertechnology IPv6 Address Configuration - Methods and apparatus for resolving incompatible network configurations are described herein. A mobile device having peripheral devices connected thereto receives a request from a peripheral device, determines whether the address configuration protocol associated with the peripheral device is compatible with the network to which the mobile device is connected, and if not compatible, the mobile device translates the address configuration protocol of the peripheral device to one compatible with the network.12-31-2009
20110032844Method and System for Configuring Wireless Routers and Networks - A method and system for configuring a wireless router and a wireless communications network includes establishing connectivity between a wireless router and at least one wireline router. Connectivity between the wireless router and a plurality of neighboring wireless routers is established through the wireline router. The wireless router is configured based on information exchanged with the neighboring wireless routers through the wireline router.02-10-2011
20110110271IMS-BASED DISCOVERY AND CONTROL OF REMOTE DEVICES - The present invention faces the issues of remotely controlling multiple LAN-attachable devices (05-12-2011
20100278079APPARATUS AND METHOD FOR DETERMINING A COINCIDENCE OF A POSITION WITH A REFERENCE POSITION - An apparatus for determining a coincidence of a position with a reference position, wherein radio signals from fixedly positioned radio transmitters can be received at the position, having a provider for providing properties of the radio signals of the fixedly positioned radio transmitters at the position, wherein the provided properties of the radio signals include transmitter identifications identifying the radio transmitters, a separator for separating the radio transmitters into a first number of radio transmitters previously recorded transmitter identifications of which at the reference position are identical with transmitter identifications provided at the position, and into a second number of radio transmitters previously recorded transmitter identifications of which at the reference position and transmitter identifications provided at the position are different, and a determiner for determining a measure of matching for the position on the basis of the provided properties of the radio signals, wherein both properties of the first number of radio transmitters and properties of the second number of radio transmitters are taken into account in the determination of a measure of matching, and wherein the properties of the first number of radio transmitters and the properties of the second number of radio transmitters enter the measure of matching differently.11-04-2010
20110128890METHOD, SYSTEM AND DEVICE FOR CONFIGURING TOPOLOGY OF A WIRELESS NETWORK - Methods, devices and computer program products facilitate self-configuration and self-optimization of radio networks. An internal topology discovery is performed to assess characteristics of a plurality of access points within an internal network. An external cell discovery can also be performed to identify one or more access points operating within an external network. Based on the assessments obtained through the internal and/or external topology discovery processes, operational parameters are assigned to each access point within the internal network. Such operational parameters can include a transmit power associated with each radio node.06-02-2011
20110128889Method for Selecting and Configuring Network Supernodes - A method for selecting and configuring network supernodes including the following operational steps: in a first set period T06-02-2011
20100278078CONFIGURATION MANAGEMENT OF IP/MPLS ROUTER RINGS - The invention is directed to managing changes to a configuration of routers connected in a ring network architecture. Embodiments of the invention alleviate risks to services carried over a ring of IP/MPLS routers when configuration changes are made to the ring, such as inserting a router into, or removing a router from, the ring. To that end, embodiments of the invention automate some steps of such a configuration change operation that were previously performed manually, and coordinate those steps with other steps of the operation using a procedure stored as instructions on a computer readable media and executed by a computer system in order to effect and validate a correct sequencing of the steps.11-04-2010
20130136033ONE-CLICK CONNECT/DISCONNECT FEATURE FOR WIRELESS DEVICES FORMING A MESH NETWORK - According to one embodiment of the invention, a system, electronic device and method are described for creating, connecting or disconnecting from a mesh network. The method comprises a first operation of detecting a duration of time (or number of press) that a mesh networking button of a wireless device has been actuated. Thereafter, in response to actuation of the mesh networking button up to a first predetermined duration (or presses), a first mesh network is created without additional input of information by a user. Optionally, in response to actuation of the mesh networking button for at least a second predetermined duration, where the second predetermined duration being longer (or different number of presses) in time than the first predetermined duration (or button presses), the electronic device issues a request to join a second mesh network detecting previously by the electronic device.05-30-2013
20130136034NETWORK DESIGN DEVICE - According to the information about a request bandwidth of a path newly requested between a starting site and an ending site of the requested path and the information about the type of a device candidate which may be provided at each site and the number of ports of each device, an objective function indicating a device cost and a constraint to be considered when the objective function is minimized are set. According to the arithmetic performance of a solver for executing the design, a problem scale corresponding to one path accommodation designing operation is set. Based on the set problem scale, a mathematical programming problem for minimizing the objective function is generated. An accommodation designing process is repeated on a plurality of paths until a solution to the mathematical programming problem is obtained by the solver, and all requested paths are completely designed.05-30-2013
20130136035METHODS AND SYSTEMS FOR PROVIDING MULTIPLE ACCESS WITHIN A NETWORK - Methods and systems for media access control allow master and slave nodes of a network to communicate using the same carrier while avoiding collisions of transmissions. At least one slave node is an implantable device. Master nodes initiate all data exchange sequences, and slave nodes are responsive to the data exchange sequences. The exchange sequences begin by master nodes contending for use of the carrier through a countdown procedure. A set order of communications occurs between a master node who won the contention and a slave node being communicated with by the master node to transfer a data frame. Contention is then repeated to determine the next master node that is allowed to transfer a data frame. New master nodes entering the network employ a discovery process to poll for existing devices in the network.05-30-2013
20110235550NETWORK LAYER TOPOLOGY MANAGEMENT FOR MOBILE AD-HOC NETWORKS AND ASSOCIATED METHODS - The approach for managing the topology in a MANET includes, at the network layer of a wireless mobile node, operating a link state or other routing protocol to discover routes from the at least one wireless node to other wireless nodes within the MANET. The routing protocol includes the use of a global topology database storing global network topology information. The method also includes, at the network layer, providing the global network topology information from the global topology database of the routing protocol to the MAC sublayer. Also, at the data link layer, the MAC sublayer is controlled to perform neighbor connection management based upon the global network topology information from the global topology database. The approach may provide enhanced QoS, latency and resistance to link and node failures within MANETs.09-29-2011
20100309819System and method for effectively implementing an enhanced router device - A system and method for enhancing electronic network communications includes an electronic network that is configured to include a plurality of distributed computer devices. A enhanced router device is coupled to the electronic network to support bi-directional communications. At least one electronic device communicates with the electronic network through the router device. A device support module of the router device cooperates with a device manager of the electronic device to automatically perform appropriate device configuration and management procedures for said electronic device.12-09-2010
20130142079Distributed Dynamic Virtual Machine Configuration Service - An approach is provided in which a local module receives a discovery message from a virtual network endpoint that is devoid of a corresponding virtual IP address. The local module sends one or more unicast network configuration messages to a dynamic configuration service and, in turn, the local module receives one or more unicast network configuration responses from the dynamic configuration service. One of the unicast network configuration responses includes one or more network configuration parameters. The local module configures the virtual network endpoint according to one or more of the network configuration parameters.06-06-2013
20110128891MANAGING AND PROVISIONING VIRTUAL ROUTERS - Methods and systems are provided for provisioning and managing network-based virtual private networks (VPNs). According to one embodiment, a routing configuration for each of multiple network-based customer VPNs is generated for multiple customers based on (i) site reachability information for multiple service processing switches and (ii) a global customer routing profile for a network-based customer VPN of the plurality of network-based customer VPNs. Multiple virtual routers (VRs) distributed among the service processing switches are provisioned to support the network-based customer VPNs based on the routing configurations. A custom routing profile, identifying one or more routing protocols to be used for one or more segments of the network-based customer VPN profile, is received for the network-based customer VPN. The network-based customer VPN is automatically reconfigured by programmatically generating appropriate routing configurations for VRs partitioned to the network-based customer VPN based on the site reachability information and the custom routing profile.06-02-2011
20110110273WAVEFORM FOR USE IN MOBILE AD HOC NETWORKS - A waveform and related devices and methods are disclosed for dynamic use of an air interface in a mobile ad hoc network. The waveform includes a dual preamble sequence enclosing self-discovery data that characterizes modulation for a subsequent data signal. The preamble is designed so that the circular correlation of the preamble sequence with itself is an impulse, and the first preamble sequence is a complex conjugate of the second preamble sequence. The preamble sequence can be used to bound a data packet on both sides so that detection of the impulse yields a window in which a data packet can be located, while the self discovery data provides information to extract the data signal from the wireless waveform. In one aspect, the preamble may be implemented using a CHIRP sequence that is a perfect square for more efficient implementation in a wireless modem. In addition, CHIRP sequences for different nodes can be generated with low cross-correlation to reduce interference among nodes in the MANET. The preamble may also support channel sounding or equalization to reverse amplitude or phase distortion in a channel.05-12-2011
20110110272DEVICE AND METHOD FOR GENERATING TRAFFIC ENGINEERING TOPOLOGY - A topology generating device of a network for transmitting/receiving a routing packet to/from at least one router receives a routing packet from the at least one router, determines whether the routing packet is a traffic engineering advertisement message, and generates traffic engineering topology by using the traffic engineering advertisement message when the routing packet is the traffic engineering advertisement message.05-12-2011
20090003243NETWORK UTILITIES IN WIRELESS MESH COMMUNICATIONS NETWORKS - Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms.01-01-2009
20100329154Efficient calculation of routing tables for routing based on destination addresses - There is a method and a device allowing the distributed calculation of routing tables for routing in a communication network containing nodes and links. The calculation of routes to be used is carried out in centrally. Data relating to the routes to be used are transmitted to a node which, based on said information, generates a routing table by assigning packet addresses to the routes. The central calculation of the routes results in an increased efficiency of resources while requiring less calculation effort which is particularly advantageous in the context of networks comprising multipath routing where the calculation of routing tables is very complex. A further reduction in effort can be achieved by means of the central calculation of the distribution weightings.12-30-2010
20110019589 CONTROL METHOD OF SINGLE-FREQUENCY NETWORK AND A CONTROL ENTITY OF A SINGLE-FREQUENCY NETWORK - This invention discloses a control method of a single-frequency network and a control entity of a single-frequency network. The control method of the single-frequency network provided by this invention comprises: obtaining the service request information sent by a user terminal; changing the single-frequency network according to the service request information. The control entity of the single-frequency network provided by this invention comprises: an obtaining unit, used for obtaining the service request information sent by a user terminal; a controlling unit, used for changing the single-frequency network according to the service request information. This invention realizes the dynamic control of a single-frequency network by changing the single-frequency network according to the service request information sent by a user terminal. Consequently, the service provider can dynamically change a single-frequency network according to the requirement of users and implement the optimization configuration of wireless network resources.01-27-2011
20110019590NEIGHBOR DISCOVERY USING ADDRESS REGISTRATION PROTOCOL OVER ELMI - A system and method for mapping a network to facilitating configuration is disclosed. Address registration information is appended to an enhanced local management interface message sent between devices in a network of routers and switches. A network management system for an outside network can use that information to map out the network and configure the network as needed. The address registration information includes an Internet Protocol address and an interface index. The interface index includes both slot and port number.01-27-2011
20090034432SYSTEM AND METHOD OF RESOURCE ALLOCATION WITHIN A COMMUNICATION SYSTEM - A system and method of resource allocation within a communication system is provided. A communication system comprises a plurality of nodes operating in a first architecture network mode, wherein at least a portion of the plurality of nodes are reconfigured to operate in a second architecture network mode in response to a change in one or more network performance requirements. When the plurality of nodes are operating in a distributed architecture network mode, at least a portion of the plurality of nodes are reconfigured to operate in a clustered architecture network mode in response to an increase in one or more network performance requirements. When the plurality of nodes are operating in a clustered architecture network mode, at least a portion of the plurality of nodes are reconfigured to operate in a distributed architecture network mode in response to a decrease in one or more network performance requirements.02-05-2009
20100172270Distributed Storage of Routing Information In a Link State Protocol Controlled Network - A distributed hash table is implemented to store routing information on a network. Node IDs exchanged in connection with implementation of a link state routing protocol are used as keys in the distributed hash table, and routes are stored at one or more nodes on the network. When a route is learned, the route is processed against the set of keys to determine which nodes should store the route. When a route is needed, the route is processed against the set of keys to determine which nodes should have the route information. The manner in which the route is processed against the set of keys is the same in both instances, so that the DHT may be used to store and retrieve route information on the network. The DHT may be implemented to store MAC addresses, IP addresses, MPLS labels, or other information of interest to enable routes to be stored and learned by network elements on the network.07-08-2010
20110044209SYSTEMS AND METHODS FOR PROVIDING A QUIESCING PROTOCOL - The systems and methods of the present invention provide a quiescing protocol. In one embodiment, nodes of a system utilize the protocol to complete processing until they reach a consistent state. In one embodiment, a coordinator initiates the quiescing process and the nodes communicate with each other to determine whether their messages have been processed and communicate with the coordinator to determine when all of the messages have been processed.02-24-2011
20100150028DISTRIBUTING CUSTOMER LOCATION ACCESS LINKS ACROSS NETWORK PROVIDER NODES DURING NETWORK PLANNING - A computing-device implemented network planning process distributes access links associated with customer locations to selected nodes of a provider network. The network planning process distributes the access links associated with the customer locations to the selected nodes of provider network such that overall latency goals for the network are met and such that the density of the connected customer locations to the network nodes in the network satisfy density requirements. The network planning process seeks diversity in customer location assignments by creating additional capacity through the re-assignment of customer locations to alternate network nodes in order to free up space on network nodes needed to off-load customer locations from other over-loaded network nodes. The network planning process permits an expanded ring of network nodes to accommodate dense customer traffic load across a wide area while meeting both individual connection and overall system requirements.06-17-2010
20120243440METHOD FOR FEEDING BACK CHANNEL STATE INFORMATION AND DETERMINING COORDINATED MULTI-POINT MODE AND DEVICE - A method for feeding back channel state information and determining a coordinated multi-point mode and a device are disclosed. The method for feeding back channel state information includes: obtaining multiple pieces of channel state information of multiple cells in a coordinated multi-point mode; and selecting the preset quantity of pieces of irrelevant channel state information from the multiple pieces of channel state information, and feeding back the selected channel state information to a corresponding network side device.09-27-2012
20090323556SELF-CONFIGURED NETWORK SYSTEM AND SELF-CONFIGURATION METHOD OF SAME - A self-configured network system includes a server including a plurality of columns. Each column records therein correlation of a domain name to a corresponding network addressing information. An internet protocol device is built therein a preset domain name and acquires an updated network addressing information in the internet. The preset domain name is previously recorded in a specified column of the server. The internet protocol device transfers the preset domain name and the updated network addressing information to the server via the internet so as to locate the specified column and replace the corresponding network addressing information with the updated network addressing information. A user's node is capable of linking to the internet and accessible to the server to acquire the updated network addressing information of the internet protocol device via the internet in response to input of the preset domain name.12-31-2009
20100054156SYSTEMS AND METHODS FOR SOFTWARE PROVISIONING IN MULTIPLE NETWORK CONFIGURATION ENVIRONMENT - Embodiments relate to systems and methods for provisioning software to machines in a set of diverse networks. A provisioning (or “cobbler”) server can interact with a remote installation client to initiate a software provisioning process to machines installed on two or more diverse networks, such as local area, wide area, virtual private, or other networks. The remote installation clients in different networks can report the network interface types and configurations of their networks to the cobbler server. During provisioning, the administrator can specify one software distribution to the entire set of diverse networks, and the cobbler server can generate different distribution versions tailored to the network configurations of the various different networks. In embodiments, the cobbler server can maintain a set of network configuration templates to automatically set network settings such as static IP addresses, gateway information, hostname information, network mask information, and other settings for the different network types.03-04-2010
20120230225Hash-Based Load Balancing with Per-Hop Seeding - Methods and apparatus for improving hash-based load balancing with per-hop seeding are disclosed. The methods and apparatus described herein provide a set of techniques that enable nodes to perform differing mathematical transformations when selecting a destination link. The techniques include manipulation of seeds, hash configuration mode randomization at a per node basis, per node/microflow basis or per microflow basis, seed index generation, and member selection. A node can utilize any, or all, of the techniques presented in this disclosure simultaneously to improve traffic distribution and avoid path starvation with a degree of determinism.09-13-2012
20110080853DIRECTED ACYCLIC GRAPH DISCOVERY AND NETWORK PREFIX INFORMATION DISTRIBUTION RELATIVE TO A CLUSTERHEAD IN AN AD HOC MOBILE NETWORK - Each mobile router in an ad hoc mobile network is configured for concurrently attaching to multiple parents advertising respective parent depths relative to a clusterhead of the ad hoc mobile network. The mobile router selects an advertised depth relative to the clusterhead based on adding a prescribed increment to a maximum one of the parent depths, enabling the mobile routers to form a directed acyclic graph relative to the clusterhead. Each mobile router sends to each of its parents a neighbor advertisement message specifying at least one reachable prefix, a corresponding cost for reaching the reachable prefix, and a corresponding sequence identifier that enables the parents to validate the neighbor advertisement message relative to stored router entries. Hence, mobile routers automatically can form a directed acylic graph relative to the clusterhead, and can distribute routing information with minimal overhead.04-07-2011
20110075591METHOD AND APPARATUS FOR LOOKING UP CONFIGURATION INFORMATION FOR A NETWORK NODE - One embodiment of the present invention provides a system for looking up location-specific configuration information for a network node or a subnet. During system operation, a network node creates a query message containing a key that comprises an Internet Protocol (IP) prefix and a string, wherein the IP prefix identifies the network node or the subnet, and the string specifies the type of configuration information. The network node then sends the query message to a name server, which is part of a distributed system that provides a global naming service, wherein the name server additionally stores configuration information. Finally, the network node receives a response message from the name server, wherein the response message contains the requested configuration information.03-31-2011
20110249594DETERMINING NODE LOCATION IN A WIRELESS NETWORK - Transmitting nodes broadcast chirped signals on a wireless network. The transmitting nodes are time-synchronized with each other and location of the transmitting nodes is known. A receiver node detects beat frequencies created by pairs of chirped signals from different pairs of transmitting nodes. Time delay differences between chirped signals in respective beat frequency pairs are determined. The receiver node's location is determined in view of the time delay differences.10-13-2011
20120120850TECHNOLOGY FOR MANAGING TRAFFIC VIA DUAL HOMED CONNECTIONS IN COMMUNICATION NETWORKS - Technique for handling traffic between a specific common source node and a network element NE being part of a dual homing configuration, via a main path and an auxiliary path in the configuration, the technique comprises redirection of the traffic from one of said paths to another while the path from which the traffic has been redirected remains active, while relearn of MAC addresses which is required due to the redirection is performed without executing a MAC addresses flush operation.05-17-2012
20120120849MULTI-STANDARD RADIO NETWORK NODE CONFIGURATION DATA HANDLING FOR NETWORK OPERATION - This disclosure pertains to a method in a Multi-Standard Radio (MSR) network node, a MSR network node (05-17-2012
20120120848CONFIGURABLE NETWORK SOCKET RETRANSMISSION TIMEOUT PARAMETERS - A network communication device can implement configurable network socket retransmission timeout parameters on a per socket basis. In one embodiment, it is determined, at a first network device, whether to define a network socket with a custom or a default retransmission timeout value to transmit data to a second network device. In response to determining to define the network socket with the custom retransmission timeout value, the network socket is defined with the custom retransmission timeout value, the data is transmitted to the second network device, and it is determined whether response data is received from the second network device prior to expiration of a time period associated with the custom retransmission timeout value. In response to determining that the response data is not received from the second network device prior to the expiration of the corresponding time period, the data is retransmitted to the second network device.05-17-2012
20110080851METHOD AND APPARATUS FOR TOPOLOGY AGGREGATION AND ROUTING CONTROLLER - The present invention provides a method and an apparatus for topology aggregation and a routing controller. The method comprises: obtaining a link-diversity path number c(i,j,λ04-07-2011
20110069641Estimating User Device Location in a Wireless Network - A method of estimating user location involving collecting data from the access points in the network. The data can then be used to define a relationship, for example the loss of power experienced by a transmitted signal, between the access points. The relationship can be stored within a matrix, database or any other suitable storage method that can be referenced to determine the position of a user device within the network and correlated with corresponding measurements from a user device to determine the location of the user device within the network.03-24-2011
20120201169METHOD & APPARATUS FOR PROVISIONING A NETWORK SWITCH PORT - A network switch is comprised of a control processor and one or more line cards. The control processor includes functionality to register interest with a hypervisor, operating in conjunction with a network host connected to the switch, in data object attributes maintained on the network host by the hypervisor. The hypervisor associated with the network host sends changes in the host attributes to the switch which the switch maintains in a listing of attributes. The switch traps and copies particular packets to the switch control processor where a provisioning function operates on the attribute information in the list with source information included in the packet header in order to configure a forwarding table on the line card.08-09-2012
20110058502METHOD AND SYSTEM FOR MANAGING LINE TOPOLOGY - A method and system for managing a line topology is provided by the embodiments of the disclosure. The method for managing a line topology includes obtaining an actual transfer function of the line according to the actual transfer function of the line and a transfer function of the bridge tap model, estimating a diameter and length of the bridge tap of the line and a diameter and length of the trunk line of the line according to the estimated diameter and length of the bridge tap and the diameter and length of the trunk line, obtaining a transfer function of the line model that includes the location parameter of the bridge tap by comparing the error between the actual transfer function and the transfer function of the line model which includes the location parameter of the bridge tap, estimating the position of the bridge tap according to the estimated diameter and length of the trunk line and the diameter and length of the bridge tap and the location of the bridge tap, and generating a topology of the line. By applying the embodiment of the disclosure to maintain and manage the line topology, the location of the bridge tap can be estimated effectively, and the line topology can be obtained.03-10-2011
20110255445Self-forming ad-hoc network system - Disclosed are a self-forming ad-hoc network architecture and triplet-based radio waveform for communicating via the network architecture. The self-forming ad-hoc network preferably has a plurality of network nodes including a point-of-presence node, one or more relay nodes that aggregate data (triplet) traffic, one or more sensor nodes that send and receive data from relay nodes, and one or more handheld nodes that send and receive data to and from relay nodes and communicate data between themselves. The communication waveform is defined by orthogonal triplets having multiple time slots, multiple frequency channels, and multiple hop sequences in a channel, that is used to communicate between the network nodes.10-20-2011
20100260070Localized construction of fault resilient high capacitywireless networks with bounded node degree - Embodiments described include methods of determining neighboring nodes with which to link a subject node in a wireless communication network. Depending on the network preferences, the links between neighbor nodes and the subject node may include high capacity links or fault resilient high capacity links. The number of neighboring nodes may be as high as ten in a fault resilient high capacity network and five or less for a high capacity network.10-14-2010
20090290513Filtering of map topology based on network discovery characteristics - Embodiments of the present application enable a user to map a network topology and to then dynamically filter the map display by hiding or showing nodes based on discovery characteristics, such as Simple Network Management Protocol (SNMP) status, Active Directory (AD) Domain Controllers (DC) status, group membership status, etc. to allow customization of maps views. In particular, a topology mapping is formed by collecting topology data of a network and storing this topology data. Filtering criteria are received from a user, and the stored topology data is filtered using this received filtering criteria. The filtered topology data is then displayed to the user.11-26-2009
20090154376INFORMATION ANALYSIS APPARATUS AND COMPUTER READABLE MEDIUM - An information analysis apparatus includes: a storage that stores data values while respectively correlating the data values with plural nodes; a first setting unit that, for the nodes, sets a first virtual link that is directed oppositely to a predetermined directed link; a second setting unit that adds a virtual nodes to the nodes, and that sets a second virtual link which is bidirectional between the added virtual node and each of the nodes; and a updating unit that updates data values respectively correlated with the nodes, on the basis of respective weights of predetermined links between the nodes, the first virtual link, and the second virtual link.06-18-2009
20110176458METHODS AND DEVICES FOR COMPUTING PATHS TO ASSURE THE INTER-DOMAIN TRANSPORT OF QoS SENSITIVE INFORMATION - Information can be transported over domains operated by different service providers at required Quality-of-Service (QoS) levels without disclosing inter- and/or intra-domain information to ensure that the topology of a given service provider's domain (e.g., network) is not disclosed.07-21-2011
20110255444POWER SAVINGS THROUGH COOPERATIVE OPERATION OF MULTIRADIO DEVICES - Proxy discovery for mobile networks having cooperative multiradio devices is provided through short range discovery and assistance from the network. In some aspects, a dedicated message is sent in response to a request from the client. The dedicated message includes a proxy list. The client uses the proxy list to discover those proxies on the list. Other aspects provide for the proxy list to be included in broadcast messages from the network. Thus, clients receive the broadcast messages and extract the proxy list for discovery purposes. Other aspects provide for the client to detect all of the wireless devices in the area and send a list to the network. The network responds with a sub-list of those proxies that are available to the client. In each such aspect, when the client discovers the available proxies, it transmits a list of the proxy ID of the discovered proxies to the network.10-20-2011
20080253305Undirected Cross Connects Based on Wavelength-Selective Switches - Undirected cross connects are provided based on wavelength-selective switches A demand d={i, j} is routed over a path p10-16-2008
20080205302Preventing data traffic connectivity between endpoints of a network segment - Various systems and method of preventing data traffic connectivity between endpoints of a network segment are disclosed. One method involves receiving a segment protocol message from a first segment port within a network segment, which includes a plurality of network devices. In response to receipt of the segment protocol message, which can indicate whether connectivity is present between the segment endpoints via the network segment, a second segment port can be operated in a blocked state. Operating the second segment port in the blocked state prevents data plane connectivity via the network segment.08-28-2008
20110164533Methods and systems using PLD-based network communication protocols - Methods and systems for a PLD-based network update transport (PNUT) protocol that utilizes UDP and other protocols for transmitting update or other commands or information over a packet-based or IP network. PNUT is a hardware-based network communication protocol that does not require the full TCP/IP stack and may be utilized for exchanging commands and information with such PLD-based and other devices. Protocols may include a set of core commands and a set of custom commands. Logic components within the PLD-based devices may consist of a command dispatcher, a transmitter/controller, a MAC receiver, a MAC transmitter, a packet parser, a packet generator, and core receiving and transmitting commands. The present invention may be implemented without requiring CPU cores, special controllers, stringent timings, or operating systems as compared with conventional network protocols. Various methods for exchanging and updating PNUT commands are disclosed. The methods and systems of the present invention may be utilized to provide other functions, such as filtering, logging, polling, testing, debugging, and monitoring, and may be implemented between a server and a PLD-based device or solely between PLD-based devices.07-07-2011
20090285127SYSTEM AND METHOD FOR NETWORK TOPOLOGY DISCOVERY - A system and method for discovering network topology by various switch training and probing methods. Segments are discovered by having computers enter a promiscuous mode and determining from packets sent to a selected computer which computers see which other computers in the network. From the segments, various switch interconnections are determined, by having different computers train switches as to a training address and seeing which computers receive probe packets sent to that training address from another computer. Various training and probing methods are described that locate intermediate segments, deep switches, switch interconnections, and edge and singleton cases. In one implementation, a master computer coordinates the other computers (and devices) in the network to send the training and probing packets, and report on received packets, in order to determine the network topology.11-19-2009
20110080852COMMUNICATION APPARATUS HAVING NETWORK INTERFACES, COMMUNICATION METHOD, AND STORAGE MEDIUM - A communication apparatus that enables a device on a searching side to obtain a single search result, thereby reducing user confusion, even when the same search packet is received by network interfaces of the apparatus. The communication apparatus of a device on a searched side receives a search packet via one of a first and second NIC of the apparatus from a device on the searching side, and determines whether information that is same as information indicating the received search packet is stored. If the information is stored, one of the NICs to be used to respond to the search packet is selected, a response message is created, and the created response message is transmitted via the selected NIC to the device on the searching side. And if the information is not stored, the information indicating the search packet is stored.04-07-2011
20100214958System and Method for Scanning When Operating in Different Regulatory Domains - A user agent including a bus, a network connectivity device connected to the bus, and a memory connected to the bus. The memory stores contents of an elementary file containing a list of wireless local area network (WLAN) based frequencies, which may be public land mobile network (PLMN) frequencies. The contents of the elementary file further contain at least one entry relating to at least one of regulatory domain information and channel allocation information. The UA also includes a processor connected to the bus. The processor is configured to update the list based on the at least one entry and to promote initial access point scanning of the WLAN based frequencies according to an order specified in the updated list.08-26-2010
20100214956Controlling the use of access points in a telecommunications networks - A mobile telecommunications network includes a radio access network comprising base stations and one or more additional access points. An access point is connected to a network core by an IP transport broadband connection. The access point is configured to appear to the mobile terminal as a conventional base station—that is, for example, it communicates with the mobile terminal using GSM or UMTS transport protocols and does not require any modification to a standard GSM or UMTS mobile terminal. Access Points may not be under the direct control of the network provider, and so are more susceptible to security threats. The described system allows the network provider to verify that the access point through which a mobile terminal is about to communicate is a legitimate and trusted base station and/or is at a particular location. Differential charging may be performed in dependence upon a subscriber's location.08-26-2010
20090190502COMMUNICATION APPARATUS, COMMUNICATION METHOD, COMMUNICATION CIRCUIT, MOBILE PHONE, PROGRAM, AND COMPUTER READABLE RECORDING MEDIUM WITH PROGRAM RECORDED THEREIN - A communication apparatus (07-30-2009
20100195538METHOD AND APPARATUS FOR NETWORK PACKET CAPTURE DISTRIBUTED STORAGE SYSTEM - This is invention comprises a method and apparatus for Infinite Network Packet Capture System (INPCS). The INPCS is a high performance data capture recorder capable of capturing and archiving all network traffic present on a single network or multiple networks. This device can be attached to Ethernet networks via copper or SX fiber via either a SPAN port (08-05-2010
20100195539SYSTEM AND METHOD FOR SUPPORTING AUTOMATIC ESTABLISHING AND DISCONNECTING SEVERAL WIRELESS CONNECTIONS - A method for automatically establishing wireless connections between a plurality of grouped wireless devices and a third party wireless device, comprising the steps of: forming a connection group having a first wireless device and at least one additional grouped wireless device; configuring a connection table to record connection group attribute parameters for the connection group, the connection group attribute parameters including connection parameters of said first wireless device and other grouped wireless devices; configuring the first wireless device in the connection group such that it is capable of establishing a wireless connection with a third party wireless device; and establishing an additional wireless connection between the third party wireless device and the wireless devices of the group if the additional wireless connection satisfies a connection parameter specified by the connection table in the connection group.08-05-2010
20100195537Service configuration assurance - Systems, methods, and other embodiments associated with service configuration assurance are described. One example method includes generating an expected device configuration model based at least in part on service information for a network device. The example method may also include comparing this expected device configuration model with an actual device configuration model for the network device. The example method may also include generating a service-impact event notification when a likely service-impacting configuration change is detected.08-05-2010
20110149805NETWORK GROUP DETERMINATION DEVICE AND METHOD, AND STORAGE MEDIUM OF STORING NETWORK GROUP DETERMINATION PROGRAM - A network group determination device includes an acquisition section, a comparison section and a determination section. The acquisition section acquires first communication information representing a state of communication between a first repeater on a network and a specific network group on the network, and second communication information representing a state of communication between a second repeater on the network and the network group. The comparison section makes a comparison of a difference between the first communication information and the second communication information to third communication information between the first repeater and the second repeater. The determination section makes, according to a result of the comparison by the comparison section, a determination of a position of the network group with respect to the first repeater and the second repeater.06-23-2011
20110051627NEURAL NETWORK-BASED MOBILITY MANAGEMENT FOR HEALING MOBILE AD HOC RADIO NETWORKS - A self healing ad hoc communications network and method of training for and healing the network. The network includes wireless devices or nodes that include a neural network element and the ad hoc network operates as a neural network. Some of the nodes are designated as healing nodes that are identified during network training and are strategically located in the network coverage area. Whenever one group of nodes loses connection with another a healing node may reposition itself to reconnect the two groups. Thus, the network can maintain connectivity without constraining node movement.03-03-2011
20110051626SYSTEM AND METHOD FOR WIRELESS NODE CONNECTION - Systems and methods for wireless node connection are provided. The system includes a first wireless node and a second wireless node connected to a network. The first wireless node transmits a beacon packet with at least one connection parameter corresponding to the first wireless node. The second wireless node receives the beacon packet from the first wireless node, and analyzes the beacon packet to obtain the connection parameter corresponding to the first wireless node. The second wireless node wirelessly connects to the first wireless node according to the connection parameter. At least one wireless terminal connects to the network via the first wireless node and the second wireless node. Wireless network deployment often requires a wireless node to construct wireless link to another wireless node. Such deployment type is commonly used in point-to-point or point-to-multipoint wireless infrastructure. A push-to-connect algorithm is used to support the automatic wireless connection among multiple wireless nodes. A time synchronization key exchange algorithm is used to enhance the security of any wireless link between two wireless nodes.03-03-2011
20100020725METHOD AND MOBILE TERMINAL FOR SEARCHING HOME NETWORK - A mobile terminal and a method for searching for a home network for the mobile terminal are provided. The method includes performing a full scan for searching for the home network at a certain time after roaming to a visited network, initializing a count of a number of times a timer has expired when the home network is not found, initiating the timer, updating the count when the timer expires, scanning frequencies in a frequency list when the count is less than a certain value, and scanning all frequencies around the mobile terminal when the count is equal to the certain value.01-28-2010
20110216670METHOD FOR DETERMINING NETWORK TOPOLOGY - Presented is a method of determining network topology. The method includes determining virtual local area networks (VLANs) configured to at least one switch on a computer network, selecting a VLAN from the configured VLANs, determining state of the selected VLAN, determining ports associated with the selected VLAN, based upon the state of the selected VLAN, selecting a port from the associated ports, determining operational status of the selected port, and defining status of the selected VLAN, based upon the operational status of the selected port.09-08-2011
20090274068Network Having Redundancy Properties, Ethernet Switch for Such a Network and Method for Configuring Such a Network - There is described a network having redundancy properties, an Ethernet switch, and a method for configuring the network. At least two network segments which are formed with a plurality of Ethernet switches are connected to one another by means of a redundant connection comprising at least two coupling channels. During configuration, a programming device stores a logic name for the redundant connection in the respective memory of associated coupling devices. In a network startup phase, said coupling devices determine the respective other connection partner associated with the same redundant connection by distributing special messages in which they enter the logic name of the redundant connection. They use an order criterion to determine which coupling channel is active and which coupling channel is deactivated during trouble-free operation.11-05-2009
20090040947Push and Clone Configuration Management for Mobile Devices - Embodiments of a method and system for managing configurations on mobile devices are described. A method under an embodiment utilizes one or more advanced commands defined by the OMA DM protocol. One such command is the “Get” command, which can be used recursively to traverse a management tree to access the necessary nodes. A variation of this command is the “Get[Struct Data]” command, which traverses a tree or subtree in a single execution instance. The “Get” command is used to get a snapshot from a management tree starting from a specified URI. For this embodiment, it is presumed that a “golden” copy of device exists. The golden copy can be initially configured either manually or by using a mobile device management platform. The method uses a golden device to make a configuration snapshot to be used later for a distribution to multiple targets.02-12-2009
20110116417METHOD AND APPARATUS FOR DETERMINING PING INTERVAL OF ACTIVESYNC SERVICE IN WIRELESS COMMUNICATION TERMINAL - A method and an apparatus for determining a Packet INternet Groper (PING) interval of an ActiveSync service in a wireless communication terminal are provided. The method includes determining an initial PING interval of a first account among the plurality of accounts, and determining PING intervals of the remaining accounts, with the exception of the first account, as an integer multiple of the initial PING interval.05-19-2011
20110116416System and method for geographically optimized wireless mesh networks - A geographically optimized wireless mesh network comprises: a radio communications device to intelligently route information through a tracking, sensing, or communications network; a sensing device to sense conditions affecting the device or associated items; and, a communication system configured to transmit the output of the sensing device to a system administrator located remotely from the container. The geographically optimized wireless mesh devices may be capable of two-way communication with the system administrator, whereby the administrator may interrogate the devices at selected times. The locking device contains redundant location determination technologies whereby its geographic location is used to optimize the node and network performance.05-19-2011
20110305168Communication system, and method of creating topology information - Provided is a communication system that includes a plurality of packet transfer units and a control unit which controls each packet transfer unit, in the communication system of which, a communications network used for each packet transfer unit to transfer packets, and a communications network used for the control unit to control each packet transfer unit can be integrated into one kind. The control unit transmits a reply request to each packet transfer unit. The packet transfer unit, upon receiving the reply request, transmits the reply request from a port other than that through which the packet transfer unit has received the reply request. Upon receiving the reply request, the packet transfer unit also returns a reply including information on ports of the local packet transfer unit, the reply being transmitted through a path for the control unit. On the basis of the reply transmitted from each packet transfer unit, the control unit creates topology information, the topology information including port interconnection information relative to ports provided at the control unit and each port of the packet transfer units.12-15-2011
20110305167Communication system, and method of collecting port information - The control unit specifies an undetected connection destination port and sends a reply request to a connection destination of the undetected connection destination port. The packet transfer unit determines whether the received reply request is to be transferred to any other packet transfer unit. The packet transfer unit, upon determining the reply request to be transferred to any other packet transfer unit, transfers the reply request to any other packet transfer unit. The packet transfer unit, upon determining the reply request not to be transferred to any other packet transfer unit, returns a reply that includes information on ports of the local packet transfer unit, the reply being sent along a path leading to the control unit.12-15-2011
20090180400BREAK BEFORE MAKE FORWARDING INFORMATION BASE (FIB) POPULATION FOR MULTICAST - A method of installing forwarding state in a link state protocol controlled network node having a topology database representing a known topology of the network, and at least two ports for communication with corresponding peers of the network node. A unicast path is computed from the node to a second node in the network, using the topology database, and unicast forwarding state associated with the computed unicast path installed in a filtering database (FDB) of the node. Multicast forwarding state is removed for multicast trees originating at the second node if an unsafe condition is detected. Subsequently, a “safe” indication signal is advertised to each of the peers of the network node. The “safe” indication signal comprises a digest of the topology database. A multicast path is then computed from the network node to at least one destination node of a multicast tree originating at the second node. Finally, multicast forwarding state associated with the computed multicast path is installed in the filtering database (FDB) of the network node, when predetermined safe condition is satisfied.07-16-2009
20090116410PROCEDURE OF SETTING UP PEER LINK IN WIRELESS MESH NETWORK AND WIRELESS STATION SUPPORTING THE SAME - Provided are a procedure of setting up a peer link in wireless mesh networks and a wireless station supporting the procedure. In the procedure, a mesh point (MP) transmits first peer link open frame regarding the peer link to a candidate peer MP. The first peer link open frame includes high throughput capabilities information element and high throughput operation information element. And, the mesh point receives first peer link confirmation frame regarding the peer link from the candidate peer MP in response to the first peer link open frame. And, the mesh point transmits second peer link confirmation frame regarding the peer link to the candidate peer MP after receiving second peer link open frame received from the candidate peer MP. In this case, the peer link confirmation frame may also include high throughput capabilities information element and high throughput operation element.05-07-2009
20090232029METHOD AND APPARATUS FOR PROVIDING FULL LOGICAL CONNECTIVITY IN MPLS NETWORKS - The invention includes a method and apparatus for configuring logical connectivity for a network comprising a plurality of nodes. A method includes determining a physical topology of the network, determining a set of LSP paths based on the physical topology of the network, and determining a set of LSPs using the set of LSP paths, where the set of LSPs includes a plurality of LSPs adapted for providing full logical connectivity between the nodes of the network. The physical topology is determined using information indicative of physical connectivity between nodes of the network. The set of LSP paths includes, for each pair of nodes in the network, at least two logical paths between the nodes of the node pair. The set of LSPs includes a plurality of LSPs adapted for providing full logical connectivity between the nodes of the network. The full logical connectivity between the nodes of the network may be maintained in response to physical topology change events, such as addition of nodes to the network removal of nodes from the network, and the like.09-17-2009
20090092063METHOD AND APPARATUS FOR PROVIDING LINK-LOCAL IPv4 ADDRESSING ACROSS MULTIPLE INTERFACES OF A NETWORK NODE - Embodiments of the present invention provide link-local IPv4 addressing across multiple interfaces of a network-node. During operation, the network-node broadcasts an address resolution protocol (ARP) request packet on multiple interfaces which asks for the hardware address of a network node whose link-local IPv4 address is Y. In response, the network-node receives an ARP-reply packet on an interface from a target network-node. If Y is present in the ARP cache and is associated with a different interface, the source network-node chooses a winner interface, and updates the ARP cache so that Y is associated with the winner interface. The network-node sends one or more contention-resolution packets on the loser interface to cause a loser network-node to choose another link-local IPv4 address for itself.04-09-2009
20120147786NETWORK OPERATION SYSTEM, NETWORK OPERATION METHOD AND NETWORK OPERATION PROGRAM - Data transfer with high throughput is enabled between servers. When in a set of sites each having a usable network operation unit, a new site is added or an existing site withdraws, designing is executed for determining a combination of the network operation units each one of which is to be used in each added or withdrawn site such that at least a site which transmits or receives data becomes reachable based on a connection relationship between each paired network operation units added or withdrawn, and when a combination of the network operation units is determined in the designing, the network operation unit determined is considered as a network operation unit to be newly used in each site.06-14-2012
20120099481METHOD AND SYSTEM FOR OBTAINING A DEPLOYMENT SCHEME OF WIRELESS LOCAL AREA NETWORK ACCESS POINTS - A method for obtaining a deployment scheme of Wireless Local Area Network (WLAN) Access Points (APs) is provided. The method includes obtaining coverage information of each AP according to a WLAN competition model and deployment information; and combining a constraint relationship between the coverage information of each AP and cost information of each AP, and obtaining the deployment scheme of the APs through calculation. A device and a system are further provided, so as to automatically obtain a deployment scheme of APs, and control the cost.04-26-2012
20120039217INTERFACE MODULE AND CONTROLLER NETWORK - An interface module is provided for connecting a device to a controller within a controller network. The controller is adapted to supply and/or receive data according to a network protocol, and the device is adapted to supply and/or receive data according to a device protocol. The interface module comprises: a network connector supporting a plurality of network channels for connecting the interface module to the controller via the controller network; a device connector supporting a plurality of device channels for connecting the interface module to the device; a conversion unit arranged to receive the plurality of network channels from the network connector, and adapted to convert data between the network protocol and the device protocol, the conversion unit having one or more signal terminals for supplying and/or receiving signals to or from the device; and a configuration unit between the conversion unit and the device connector, adapted to configure the interface module to the device by routing selected device channels to selected signal terminals of the conversion unit. The configuration unit is separable from and removably coupled to the conversion unit such that the interface module may be configured for use with a different device by replacement of the configuration unit. Also provided is a controller network comprising one or more devices and a controller for control of the devices, each of the devices being connected to the controller via an interface module.02-16-2012
20110064000DEVICE AND METHOD FOR MEASURING LOCATION OF TERMINAL - A terminal location measuring device includes a database for storing registration information of a plurality of access points (AP's) forming a first infrastructure system for wireless LAN-based indoor location determination. The terminal location measuring device sets a search range of a database by using location information of the terminal acquired through a second infrastructure system that is different from the first infrastructure system, an identifier of at least one of a plurality of AP's, and a signal measurement value. The terminal location measuring device extracts registration information of an AP having the same identifier as at least one AP within the search range of the database, and measures a location of the terminal by using registration information of the AP.03-17-2011
20110317590System and Method for Dynamic Maintenance of Fabric Subsets in a Network - A networking device includes a hardware port coupled to a first device and a management module. The management module identifies fabric subsets such that devices included in a fabric subset are permitted to communicate with each other, identifies configurations that include subsets that are active when the configuration is active, and detects that a device is uncoupled from the port. In response to detecting, the management module modifies the subsets by creating a new subset that does not include the uncoupled device, and modifies the configurations.12-29-2011
20110317589METHOD AND APPARATUS FOR DISTRIBUTION OF TOPOLOGY INFORMATION IN COMMUNICATION NETWORKS - A computer implemented method, computer readable medium and computing apparatus for distribution of network topology information in telecommunication networks comprising of a distribution of an information to a neighboring gateway node (ASN-GW12-29-2011
20120044836MOBILE NETWORK, RADIO ACCESS NODE, SYSTEM INCLUDING A RELAY APPARATUS, AND METHOD THEREOF - A mobile network comprising a relay, a controller in a master-slave arrangement with the relay and one or more user terminals, wherein the controller is operable to control the status of said relay between a standby mode and an active mode dependent upon requests received from said user terminals.02-23-2012
20120044834Mechanism for Automatic Network Formation and Medium Access Coordination - The invention provides a set of mechanisms by which a wireless mobile mesh node equipped with a directional antenna may self form and self adapt its steady-state communications schedule. A link establishment handshake is carried out over an ongoing subtemplate-based discovery scan. During time not reserved for steady-state communications with previously discovered neighbors, nodes continue to search for an establish links with new neighbors. Initial and subsequent bandwidth allocation protocols may be utilized to allow peer nodes to coordinate communication opportunities between the peer nodes without impacting or having knowledge about reservations for communications with other peers. The link establishment and initial bandwidth allocation protocols may be piggy-backed for readily establishing an initial steady-state schedule with a peer upon link establishment without impact on previous steady state reservations by other nodes or on ongoing link establishment attempts elsewhere.02-23-2012
20120063365Multi-Mode Mobile Networking Device - Establishing a mobile ad-hoc network between mobile network devices may include transmitting a signal from a first mobile network device using a plurality of communications formats. One or more other mobile network devices may receive the broadcast signal, select a communications format from the plurality of communications formats and respond to the signal using the selected communications format.03-15-2012
20120063362METHOD AND APPARATUS FOR COMPUTING PATHS TO DESTINATIONS IN NETWORKS HAVING LINK CONSTRAINTS - A capability is provided for computing paths to destinations in networks having link constraints. An improved Constrained Shortest Path First (CSPF) algorithm is provided for computing a path from a source node to a destination node through a network. The improved CSPF algorithm uses neighbor node lists, in addition to a tentative node list and a paths list, for computing a path. The improved CSPF algorithm, during path computation, maintains a tentative node list including nodes selected for inclusion within the path. The tentative node list specifies the computed path. The improved CSPF algorithm, for each node selected for inclusion within the tentative node list, uses a neighbor node list for the selected node, and selects a neighbor node from the neighbor node list for inclusion within the tentative node list. The neighbor node list for a selected node includes a plurality of neighbor nodes of the selected node, where the neighbor nodes of the neighbor node list are arranged within the neighbor node list based on link constraints of a plurality of links between the selected node and the respective neighbor nodes of the selected node.03-15-2012
20130170400Dynamic Hierarchical Address Resource Management Architecture, Method and Apparatus - A Dynamic Hierarchical Address Resource Management Architecture (DHARMA) coordinates a logical hierarchy of address spaces with a virtual topology of network elements using a manageable database environment. Address spaces are apportioned into hierarchical levels in accordance with a network policy. Network elements may be represented as objects, coupled via the logical address space. Both address space hierarchy definition and virtual topology modelling may occur independent from actual network deployment. As a result, multiple address space hierarchy definitions and virtual topologies can be pre-generated and stored for selective use during network deployment. With such an arrangement, a flexible addressing architecture is provided which may advantageously be used in any network that desires dynamic network configuration. The connection between the logical address hierarchy and the virtual network topology may advantageously be implemented through the use of a logical tag that links a virtual network element to a logical address hierarchy level.07-04-2013
20100302975QUALITY-DRIVEN OPTIMIZATION OF SENSOR STREAM PROCESSING - A system and method to perform data quality driven optimization of data are described. In one embodiment, a method is presented to iteratively test configurations of a data processing path until a configuration that processes data to predefined quality requirements is identified. In one embodiment, a system is presented. The system includes a data quality initialization module, a primary data stream processing module and an optimization module that is incorporated in a memory chip on a computer processor.12-02-2010
20120044835Method and Apparatus for Implementing K-Shortest Paths Algorithm in the Case of Existing Multiple Edges Between Adjacent Nodes - The present invention discloses a method and apparatus for implementing a K-shortest paths algorithm in a condition of multiple sides between adjacent nodes. The implementing method comprises: recording original topology information into a topology structure; adding one virtual node into each of the original sides other than the one with the shortest weight between the two nodes respectively to divide each of the original sides except for the original side with the shortest weight into two new sides, a weight of the new side being obtained by splitting a weight of the original edge where the new side locates; according to new topology information after adding virtual nodes, calculating K-shortest paths between designated nodes; and checking each path in the calculated K-shortest paths in sequence: reinstituting hops which belong to virtual nodes and new sides in each path into the original topology information recoded in said topology structure.02-23-2012
20120207061Distributed Storage of Routing Information in a Link State Protocol Controlled Network - A distributed hash table is implemented to store routing information on a network. Node IDs exchanged in connection with implementation of a link state routing protocol are used as keys in the distributed hash table, and routes are stored at one or more nodes on the network. When a route is learned, the route is processed against the set of keys to determine which nodes should store the route. When a route is needed, the route is processed against the set of keys to determine which nodes should have the route information. The manner in which the route is processed against the set of keys is the same in both instances, so that the DHT may be used to store and retrieve route information on the network.08-16-2012
20120207060Method and System for Implementing ID/Locator Mapping - A method and a system for implementing an ID-Locator (ID/LOC) mapping are disclosed. The method includes: after allocating a new IP address to User Equipment (UE), the network side sending an ID/LOC mapping request to an ID-LOC-split Mapping Functional Entity (ILM-FE); and the ILM-FE returning a response with mapping information to the network side according to the received ID/LOC mapping request. The method initiates the ID/LOC mapping based on a network in an ID/locator separation in NGN (IPSPLIT) network, which improves the efficiency of the ID/LOC mapping.08-16-2012
20120008529CONFIGURING A SECURE NETWORK - Techniques are presented for configuring a networking device to provide secure wireless connectivity to one or more client devices. In one embodiment, a networking device is discovered that is within a wireless connectivity range from a first client device. The networking device is configured to provide wireless connectivity to the first client device. The first client device is configured to initiate a first wireless connection, without requiring a user to specify any network settings. The networking device is configured to authenticate a user to access a user interface for configuring the networking device, where the user is not authenticated based on any password.01-12-2012
20120008528Layer Two Over Multiple Sites - An apparatus comprising a service network, and a plurality of Layer 2 sites connected by the service network via a plurality of gateways, wherein the gateways are configured to map a plurality of Internet Protocol (IP) addresses of a plurality of hosts under a plurality of virtual local area networks (VLANs) in a plurality of Layer 2 sites to a plurality of addresses (e.g. MAC or others) of the corresponding gateways inform the other gateways in the other Layer 2 sites of the mapped IP addresses under each of the VLANs in the local Layer 2 sites, and forward data frames originated from the hosts in the local Layer 2 sites to the other gateways in the other Layer 2 sites when the data frames' destinations are residing in the other Layer 2 sites.01-12-2012
20120057505METHOD, APPARATUS, AND SYSTEM FOR SETTING UP BIDIRECTIONAL POINT-TO-MULTIPOINT LABEL SWITCHED PATH - The present invention provides a method, an apparatus, and a system for setting up a bidirectional point-to-multipoint label switched path. The method includes: distributing a leaf node label of a leaf-to-source data path and a source node label of a source-to-leaf data path through a Path message and a Resource Reservation message by using a Resource Reservation Protocol-Traffic Engineering to set up a bidirectional point-to-multipoint label switched path. The bidirectional point-to-multipoint label switched path that is set up in the present invention ensures consistency of LSPs in both directions, and overcomes a defect that the source node needs to send multiple data packets to the leaf nodes through multiple bidirectional point-to-multipoint label switched paths when a source transmits data to a leaf in the prior art.03-08-2012
20120014290Computer-Implemented Method For Compensating Ancillary Use Of A Remotely Accessible Network Device - A computer-implemented method for compensating ancillary use of a wireless service device for excess transmission bandwidth is provided. Wireless service devices are discovered. Each wireless service device is interoperable on a wireless service network operated by a service provider. For each wireless service device, a primary function performable by a subscriber through the wireless service network and an ancillary function performable by a third party through the wireless service network based on availability of capacity for excess transmission bandwidth are determined. The wireless service devices include an available capacity to perform the ancillary function over the service network is identified. The ancillary function is performed over the excess transmission bandwidth using the identified wireless service devices through combination, modification and integration of data from the two or more other such identified wireless service devices. Participants of the ancillary function in exchange for the performance of the ancillary function are compensated.01-19-2012
20120014289Distributed Transforms for Efficient Data Gathering in Sensor Networks - Devices, systems, and techniques for data collecting network such as wireless sensors are disclosed. A described technique includes detecting one or more remote nodes included in the wireless sensor network using a local power level that controls a radio range of the local node. The technique includes transmitting a local outdegree. The local outdegree can be based on a quantity of the one or more remote nodes. The technique includes receiving one or more remote outdegrees from the one or more remote nodes. The technique includes determining a local node type of the local node based on detecting a node type of the one or more remote nodes, using the one or more remote outdegrees, and using the local outdegree. The technique includes adjusting characteristics, including an energy usage characteristic and a data compression characteristic, of the wireless sensor network by selectively modifying the local power level and selectively changing the local node type.01-19-2012
20120014288Method for Configuration of a Wireless Network - The invention relates to method for configuring a first wireless network that includes at least one access point. In order to optimize the configuration of the first wireless network, the method comprises a step of configuring at least one parameter of the at least one access point of the first wireless network on the basis of at least a portion of the linking balance of a second wireless network including at least two nodes, the nodes being positioned in a predetermined physical space.01-19-2012
20120057504NETWORK EXPLORATION METHOD AND NETWORK EXPLORATION APPARATUS - A network exploration apparatus is configured to calculate a communication cost of a network to which a plurality of terminals is coupled through a plurality of network devices. The network exploration apparatus includes a transmitter configured to transmit an exploration packet to the plurality of terminals, a receiver configured to receive a response packet for the exploration packet, a detector configured to detect a terminal group to which a terminal that does not receive the exploration packet among the plurality of terminals belongs based on a reception result of the response packet by the receiver, and a calculator configured to calculate a communication cost between terminals based on an inclusion relationship between a plurality of terminal groups detected by the detector when the transmitter repeatedly transmits the exploration packet.03-08-2012
20100165883RING TOPOLOGY DISCOVERY MECHANISM - A method automatically discovers a topology of a communication network ring. The ring includes a plurality of nodes. Each node includes a first port and a second port. A ring topology request or a response to the ring topology request is received from at least one node on the ring. The ring topology request or the response to the ring topology request includes an identification of the at least one node and an indication of a hop count needed to reach the at least one node. The ring topology request or the response to the ring topology request is forwarded to at least one neighboring node on the ring through the first port. The topology is determined based on the identification of the at least one node, the hop count, and an identification of the first port.07-01-2010
20120063364NETWORK DISCOVERY - The invention relates to a method for network discovery in a wireless communication network comprising communication devices sending announcement signals regularly with a period being equal to or exceeding a predefined minimum announcement interval, wherein a first communication device 03-15-2012
20120155329Dynamic Reroute Scheduling in a Directed Acyclic Graph (DAG) - In one embodiment, a particular node joins a directed acyclic graph (DAG) in a computer network at a parent node, and determines its grade based on a topology of the DAG, the grade lower than the parent node and higher than any child nodes of the particular node. In response to detecting a trigger for a routing change in the DAG, the particular node delays the routing change based on the grade such that the delay is longer than a first associated delay of any of the child nodes and shorter than a second associated delay of the parent node. Upon expiration of the delay, the particular node may determine if the trigger for the routing change is still valid, and if valid, performs the routing change.06-21-2012
20120155328METHODS AND APPARATUS FOR DYNAMIC MAPPING OF POWER OUTLETS - In some embodiments, an apparatus includes a network management module. The network management module is configured to send a request for power output data from a first network element having a first power supply configured to be coupled to a first power outlet, and a second power supply configured to be coupled to a second power outlet. The network management module is configured to receive a first confirmation from the first network element that the first power supply and the second power supply are receiving power. The network management module is configured to send a request to disable a third power outlet and to receive, after sending the request to disable the third power outlet, a second confirmation from the first network element that the first power supply and the second power supply are receiving power. The network management module is configured to define a power distribution table after receiving the second confirmation, the power distribution table designating the third power outlet as unused.06-21-2012
20120026918METHOD AND SYSTEM OF MANAGING NEIGHBOR RELATION TABLE IN WIRELESS COMMUNICATION SYSTEM HAVING SELF-ORGANIZING NETWORK FUNCTION - Provided is a method of managing a neighbor relation table by a base station in a wireless communication system having a self-organizing network function, which includes receiving a neighbor base station report from a terminal; comparing the neighbor base station report with a stored neighbor relation table; calculating a statistic value of a new base station when the new base station is present in the comparison step; and adding the new base station to the stored neighbor relation table when the statistic value is equal to or greater than a first reference value.02-02-2012
20120106398METHOD FOR ACTIVATING A COMMUNICATION TERMINAL - A method and apparatus are provided for activating a communication terminal situated in a wireless communication network including a plurality of access nodes. The method includes: receiving, by an access node of the communication network, termed an anchor access node, at least one datum to be transmitted to the communication terminal; identifying, by the anchor access node, at least one access node to which the communication terminal was previously attached, termed a last known access node, on the basis of the datum to be transmitted; and transmitting to the at least one last known access node at least one activation datum destined for at least one communication interface of the terminal, making it possible to activate the terminal.05-03-2012
20120063363Method to Pass Virtual Local Area Network Information in Virtual Station Interface Discovery and Configuration Protocol - An apparatus comprising an edge virtual bridging (EVB) bridge, and an EVB station coupled to the EVB bridge, wherein the EVB station is configured to send to the EVB bridge a virtual station interface (VSI) discovery and configuration protocol (VDP) request comprising a filter information (info) field without specifying a virtual local area network (VLAN) identifier (ID), and wherein the EVB bridge is configured to send a VLAN ID (VID) to the EVB station in a second filter info field in a VDP response to the VDP request.03-15-2012
20120155331NODE RELATED INFORMATION COLLECTING SYSTEM, NODE DEVICE AND FRAME PROCESSING METHOD - In a system including a plurality of node devices that form an ad hoc network (06-21-2012
20120155330System and Method for Topology Optimization of Directional Network - The present invention includes a system and method by which a network of directional, wireless nodes that are not fixed in space can be optimized by optimizing each node individually. The network does not have a central control node, so each node is responsible for optimizing its surrounding topology. This is accomplished by synthesizing incoming information from neighboring nodes and determining which nodes will provide the best connections based on specific utilities each node is attempting to optimize. Neighboring nodes then exchange messages to request, accept, or reject directional connections between them based on their preferred optimizations. The overall directional network topology is achieved by consensus driven by local preferences.06-21-2012
20120300674FAST CONVERGENCE ON CHILD LINK FAILURES AND WEIGHTED LOAD BALANCING OF AGGREGATE ETHERNET/SONET BUNDLES - A network device provides a selector list that includes indices of child nexthops associated with the network device, where each of the child nexthops is associated with a corresponding child link provided in an aggregated bundle of child links. The network device also receives an indication of a failure of a child link in the aggregated bundle of child links, and removes, from the selector list, an index of a child nexthop associated with the failed child link. The network device further receives probabilities associated with the child links of the aggregated bundle of child links. Each of the probabilities indicates a probability of a packet exiting the network device on a child link. The network device also creates a distribution table based on the probabilities associated with the child links, and rearranges values provided in the distribution table.11-29-2012
20120170488MODIFIED TREE-BASED MULTICAST ROUTING SCHEMA - In mesh networks having multiple nodes that communicate data to and from each other, a great number of data transmissions may be initiated and carried out to get data to a proper processing node for execution. To get data where it needs to go (e.g., the proper destination node), a routing algorithm is used to define a set of rules for efficiently passing data from node to node until the destination node is reached. For the purpose of assuring that all data is properly transferred from node to node in a reasonably efficient manner, a routing algorithm may define subsets of nodes into regions and then send data via the regions. Even greater overall efficiency may be realized by recognizing specific adjacency relationships among a group of destination nodes and taking advantage of such adjacencies by rerouting data through regions other than the region in which a destination node resides.07-05-2012
20110090821DIRECT LINK SETUP METHOD AND CHANNEL ALLOCATION METHOD IN MULTI-CHANNEL WIRELESS COMMUNICATION NETWORK - Provided are a direct link setup procedure and a channel allocation mechanism in a multi-channel wireless communication network. The method includes transmitting a direct link setup request message comprising request information for specifying one or more channels, each of which desires to set up a direct link, among multiple channels, and receiving a direct link setup response message comprising response information for setting up the direct link to one or more channels in response to the direct link setup request message.04-21-2011
20110090820SELF-OPTIMIZING WIRELESS NETWORK - Optimizing a plurality cell sites or sectors in a wireless network including receiving network data regarding a plurality of cell sites or sectors; determining a critical zone in which communication is degraded; determining best neighbor cell sites or sectors among the neighbor cell sites or sectors associated with the critical cell sites or sectors; determining if the critical cell sites or sectors in the critical zone have available resources for achieving a desired improvement in communications; determining if the best neighbor cell sites or sectors have available resources for achieving the desired improvement in communications; and altering wireless network parameters of the critical cell sites or sectors, or the best neighbor cells sites or sectors for achieving the desired improvement in communications. Altering wireless network parameters of the critical cell sites or sectors, or the best neighbor cell sites or sectors is performed continuously until the desired improvement in communications in the wireless network is achieved.04-21-2011
20110103264METHOD AND APPARATUS FOR PEER DISCOVERY IN A WIRELESS COMMUNICATION NETWORK - Apparatus and methods of peer discovery in a communications network include generating a discovery request configured to identify a Tunneled Direct Link Setup (TDLS) capable peer device, transmitting the discovery request, and determining if a discovery response is received in response to the discovery request. In an aspect, the apparatus and methods may encapsulate the discovery request in a data frame such that the discovery request is transparent to an access point. In other aspects, the apparatus and methods may form the discovery request by appending TDLS capability information to a probe request. Additionally, the apparatus and methods may include determining if a discovery response is received in response to the discovery request. Thus, the apparatus and methods provide a deterministic method of peer discovery, so that a list of potential peers that are TDLS capable can be available before attempting a TDLS direct link setup.05-05-2011
20120250582DESIGNING MINIMUM TOTAL COST NETWORKS USING ITERATIVE ROUNDING APPROXIMATION METHODS - Minimum cost networks, such as fiber optic networks used in telecommunications, are obtained by defining available network elements having cost, required pairs, connectivity and penalty cost values and selecting from these available elements using an iterative rounding approximation method that constructs an LP relaxation incorporating the element parameters, finds an optimal basic solution, applies a selection criterion to pairs and edges in the optimal basic solution, and constructs a residual LP relaxation with selected pairs and edges. By fixing selected pairs and edges values to 1 in the residual LP, successive iterations of the method provide a design which is a 3-approximation solution to the minimum cost design problem.10-04-2012
20120250583Multi-Protocol Label Switching Multi-Topology Support - A network component comprising at least one processor configured to implement a method comprising receiving a packet, determining whether the packet comprises a topology label, and adding the topology label to the packet if the packet does not comprise the topology label. Included is a method comprising routing a plurality of packets corresponding to a plurality of forwarding equivalence classes (FECs) over a plurality of network topologies using a topology label and plurality of forwarding labels for each network topology. Also included is a network comprising a plurality of nodes in communication with each other and having a plurality of network topologies, wherein at least some of the nodes are configured to route data packets for a plurality of FECs along a path in each network topology using a topology label corresponding to each network topology and an inner label corresponding to each FEC.10-04-2012
20120120851PROTOCOLS FOR OUT-OF-BAND COMMUNICATION - Methods for managing an optical network through out-of-band communication between optical transceiver modules in a heterogeneous network fabric are disclosed. The disclosed methods include methods for performing fabric discovery, communicating error messages, detecting intrusion. Methods are also disclosed for communicating between transceivers of differing protocol versions and memory capacity.05-17-2012
20120314623BLUETOOTH NETWORK CONFIGURATION - A method, apparatus, and computer program for operating a Bluetooth network is presented. The method comprises providing a Bluetooth system comprising a plurality of Bluetooth devices forming Bluetooth piconets disconnected from each other; and providing a route for a data packet between two remote Bluetooth devices through the Bluetooth system by sequentially changing structures of the Bluetooth piconets, wherein at least some of the plurality of Bluetooth devices sequentially create and terminate connections with different Bluetooth devices as a result of the sequential change of the structures of the Bluetooth piconets.12-13-2012
20100246445Method for Maintaining Links in a Mobile Ad Hoc Network - The present disclosure relates to mobile ad hoc networks, and to ad hoc networks using aircraft in particular. A method of maintaining data links to and from a source node in an ad hoc mobile network is provided. The network comprises nodes including neighbour nodes corresponding to nodes within range for direct communication with the source node. The neighbour nodes comprise active neighbour nodes and inactive neighbour nodes, the active neighbour nodes being connected to the source node via respective active data links and the inactive neighbour nodes having respective inactive data links to the source node. One or more lost neighbour nodes are identified and revised configurations of data links are considered that account for the change in neighbour nodes. A new configuration is selected based at least partly on the cost of sending messages from the source node using the revised configurations.09-30-2010
20100246443PROVIDING LOGICAL NETWORKING FUNCTIONALITY FOR MANAGED COMPUTER NETWORKS - Techniques are described for providing logical networking functionality for managed computer networks, such as for virtual computer networks provided on behalf of users or other entities. In some situations, a user may configure or otherwise specify a network topology for a virtual computer network, such as a logical network topology that separates multiple computing nodes of the virtual computer network into multiple logical sub-networks and/or that specifies one or more logical networking devices for the virtual computer network. After a network topology is specified for a virtual computer network, logical networking functionality corresponding to the network topology may be provided in various manners, such as without physically implementing the network topology for the virtual computer network. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users.09-30-2010
20120213124METHOD AND APPARATUS TO TRIGGER DAG REOPTIMIZATION IN A SENSOR NETWORK - In one embodiment, a probing technique allows a root node to determine whether to trigger reoptimization of a computer network represented by a directed acyclic graph (DAG) without injecting unnecessary traffic into the network. The root node may store and maintain information indicative of an ideal shape or topology of the DAG. During a normal DAG maintenance operation, the root node may transmit a DAG discovery request (probe request) that is configured to probe each node within the DAG for information used to determine a current topology of the DAG. In response, each node may record the information, e.g., routing and non-routing metrics, in a DAG discovery reply (probe reply) that is propagated to the root node. Upon receiving one or more replies, the root node may analyze the metrics to determine whether the current topology of the DAG deviates from the ideal DAG topology. The root node may thus determine DAG topology deviation upon probing at minimal cost. A number of algorithms may then be used to determine whether reoptimization, i.e., global repair, of the DAG is is required and, if so, the root node may dynamically trigger the global repair.08-23-2012
20120127893APPARATUS AND METHOD FOR USING AND SOLVING LINEAR PROGRAMMING PROBLEM AND APPLICATIONS THEREOF - Method and system for analyzing a linear programming problem or any other problem involving inequalities constraints set relating to multiple variables. An initial feasible region is calculated based on a sub-set of the constraints set. The feasible region is updated based on the additional constraints added one at a time. The method checks for feasibly, identifies active constraints, and provides end-points of the feasible region. The method may be applied to a control system or to a crossbar switch handling routing between multiple input and multiple outputs, such as digital data networking switch used to route TDM digital data streams being packet, frame or cell based, in a LAN, WAN, MAN or Internet application.05-24-2012
20120134298Method, Device and System for Establishing On-Demand Route - The present invention relates to the field of network communication technologies, and discloses a method, a device, and a system for establishing an on-demand route. The method includes: determining that a stable route needs to be established; establishing the stable route and recording a route entry corresponding to the stable route in a route table; determining an effective time of the stable route, in which the effective time of the stable route is longer than the effective time of another common route; and performing an aging operation on the route entry according to the effective time of the stable route.05-31-2012
20120213126METHOD AND SYSTEM FOR MOBILE NETWORK NODES IN HETEROGENEOUS NETWORKS - A method, and a system for implementing the method, for creating an optimized communications link between at least two mobile network nodes, whereby lookup tables of available network interfaces may be created and updated periodically thereof, configuration data is transmitted between the mobile network nodes via an available signaling channel, at least one signaling channel is created via one of the available network interfaces based on the configuration data in order to transmit configuration data, and at least one data channel is created via one of the available network interfaces based on the configuration data, with the data channel being changed from one available network interface to another available network interface, after determining by the use of the lookup table that quality of service of the one available network interface is insufficient.08-23-2012
20120213125Network Connecting Device and Method - A network connecting device includes: a wired LAN connection detection section that detects connecting of a LAN cable; a profile management section that manages a profile; a profile selection section that selects in sequence at least one profile that indicates wired LAN connection; a network configuration section that sets a network configuration based on the selected profile; a network identification information acquisition section that acquires network identification information; a network determination section that determines whether or not a wired LAN with which a connection is formed by the LAN cable and a network indicated by the profile match each other; and a network connection section that applies the profile when it is determined as a match.08-23-2012
20120176941WIRELESS MESH NETWORK WITH DYNAMIC BACK OFF AND METHOD OF OPERATION - A wireless mesh network with dynamic back off for reduced power consumption is generally described herein. In some embodiments, the wireless mesh network includes a network controller to configure a data frame comprising a sync period followed by at least one data period and a plurality of network nodes configured to operate in at least one of a network-running mode and a sleep/RF quiet mode. The network controller is configured to transmit synchronization messages during a first portion of the sync period and receive upstream requests from the network nodes during a second portion of the sync period. During the sleep/RF quiet mode, the network nodes are configured to wake up periodically during a listening interval for detection of a synchronization message from the network controller, and return to the sleep/RF quiet mode and increase a back-off time between listening intervals for increasingly longer periods when no synchronization message is detected.07-12-2012
20120176938METHOD AND SYSTEM FOR CREATING A VIRTUAL WIRELESS SENSOR NETWORK - A method for creating a virtual Wireless Sensor Network (WSN) is disclosed. The method includes extracting one or more niceties of a physical WSN and embedding at least one of the extracted niceties in a soft object to represent one or more sensor nodes of the physical WSN. The method includes, sending equivalent command to the one or more sensor nodes of the physical WSN, when one or more changes are performed on corresponding niceties of the soft object. Further, the method adding or deleting one or more niceties corresponding to the one or more sensor nodes from the soft object upon ingress or egress of the one or more sensor nodes in the physical WSN. The method also includes steps of building application using the soft object of the virtual WSN.07-12-2012
20120176939Reference Signal Transmission and Reception Method and Equipment - A communications system and a method for performing communications are provided. User Equipments (UEs) are provided with UE-specific configuration information, such as CSI-RS (Channel Status Indication-Reference Signal) patterns, antenna port groupings, reference signal configurations, subframe configurations, and/or scrambling codes. The UEs process the received reference signals in accordance with the received configuration information and feedback measurement information for, e.g., PMI/CQI/RI (Precoding Matrix Indicator/Channel Quality Indicator/Rank Indicator of the precoding matrix) and/or the RLM/RRM (Radio Link Monitor/Radio Resource Management).07-12-2012
20120257545METHOD FOR THE QUALITATIVE ROUTING IN A MULTI-HOP COMMUNICATION NETWORK, AND NETWORK NODE MANAGEMENT FACILITY - A method for the qualitative routing of data in an ad hoc multi-hop communication network makes it possible to determine, on the basis of a determinable communication quality criterion, at least one path for the passage of the data through links between nodes, the links being capable of mutually interfering during the passage of the data. According to the invention, in order to determine the path, the intra-flow interference is taken into account, and a step of determining overall network topology and a step of determining the interfering links are implemented, the latter step being implemented by determining a conflict graph. The path is obtained by resolving a linear system with completeness constraints.10-11-2012
20120076051WIRELESS TERMINAL AND COMMUNICATION SYSTEM SWITCHING METHOD - A wireless terminal involving small redundancy that can be reconfigured to a configuration compatible with a plurality of systems using the hardware resources compatible with one system is provided. A wireless terminal 03-29-2012
20120257543NETWORK CONFIGURATION FOR DEVICES WITH CONSTRAINED RESOURCES - A method includes receiving a wireless beacon from an ad hoc network at a wireless device, wherein the wireless beacon includes a data structure that encodes at least a portion of a wireless identifier of an access point. The method includes configuring the wireless device from the data structure received from the wireless beacon. The method also includes establishing a wireless network between the access point and the wireless device utilizing at least a portion of the wireless identifier encoded in the data structure.10-11-2012
20120257544CONFIGURATION SPACE FEEDBACK AND OPTIMIZATION IN A SELF-CONFIGURING COMMUNICATION SYSTEM - Methods, devices, and computer program products facilitate proper allocation of network resource in a self-configuring network. The initial configuration space associated with the self-configuring network is updated based on information received from the network that describes particular adequacies or inadequacies of the initial configuration space. Based on the received information, the configuration space is updated to accommodate proper and efficient operations of the network.10-11-2012
20100271979Methods To Facilitate Automatic System Configuration - An Evolved Packet Core/Mobility Management Entity (EPC/MME) and evolved Node B (eNB) automatically provide a list of key capabilities or features they each support as soon as possible via their shared interface. Therefore, the MME and eNB are each aware of the supported features of the other and what corresponding procedures each can trigger during normal operation. By extension, the approach involves a similar mechanism between peer eNBs over their shared interface. Thus, key capabilities or features supported by the MMEs and/or eNBs are shared to enhance interoperation.10-28-2010
20120082064CONFIGURATION CONTROL OF INTER-CELL SIGNALING BASED ON POWER STATE - An access point may control reporting configurations based on current power state of a cell in wireless communications network. The first cell may provide reporting configuration instructions to a second cell, instructing selection between at least two defined configurations for reporting system information or load information from the second cell, based on whether the first cell is in a powered up state or a powered down state. The first cell may transmit notifications to the second cell indicating when the first cell is transitioning to a current power state, which may be one of the powered up state or the powered down state. The first cell may select one of the at least two configurations for interpreting reporting data received from the second cell, based its current power state, to obtain the system information or the load information from the second cell.04-05-2012
20120230224MOBILE COMMUNICATION SYSTEM, RELAY STATION, AND BASE STATION - A mobile communication system includes a base station and a relay station. The base station transmits carrier information to the relay station during connection of a first radio link using a first carrier. The carrier information indicates at least one candidate carrier available for performing multi-carrier communication on the first radio link. The relay station transmits, to the base station, request information about a configuration of the first radio link for the at least one candidate carrier indicated by the carrier information. The base station further determines, in response to receiving the request information from the relay station, a second carrier used with the first carrier for the multi-carrier communication.09-13-2012
20120320800Mac Learning in a Trill Network - A switch of a data network implements both a bridge and a virtual bridge. In response to receipt of a data frame by the switch from an external link, the switch performs a lookup in a data structure using a source media access control (SMAC) address specified by the data frame. The switch determines if the external link is configured in a link aggregation group (LAG) and if the SMAC address is newly learned. In response to a determination that the external link is configured in a LAG and the SMAC address is newly learned, the switch associates the SMAC with the virtual bridge and communicates the association to a plurality of bridges in the data network.12-20-2012
20080298276Analytical Framework for Multinode Storage Reliability Analysis - A analytical framework is described for quantitatively analyzing reliability of a multinode storage system, such as a brick storage system. The framework defines a multidimensional state space of the multinode storage system and uses a stochastic process (such as Markov process) to determine a transition time-based metric measuring the reliability of the multinode storage system. The analytical framework is highly scalable and may be used for quantitatively predicting or comparing the reliability of storage systems under various configurations without requiring experimentation and large-scale simulations.12-04-2008
20080298277NEIGHBOR DISCOVERY PROXY WITH DISTRIBUTED PACKET INSPECTION SCHEME - A network device is to receive traffic including neighbor discovery messages from requesting customer devices, and can detect the neighbor discovery messages within the traffic according to a distributed inspection scheme that includes the network device and a remote component. The network device is to then examine the neighbor discovery messages to determine if the neighbor discovery message should be forwarded to other of the customer devices, and respond to the requesting customer devices.12-04-2008
20090052350Auto-discovery and management of base station neighbors in wireless networks - Systems and methods are disclosed that include determining a local node configuration for a local network node. The local network node configuration can include a local range and a local location. In addition, these systems and methods can include receiving a remote network node configuration for a remote network node via a communications link. The remote network node configuration can include a remote range and a remote location. Also these systems and methods can further include generating a neighbor list that includes the remote network node and the local network node. The neighbor list can be determined using the local network node configuration and the remote network node configuration.02-26-2009
20120093037PATH SHORTENING IN A WIRELESS MESH NETWORK - In one embodiment, a method includes a mesh point receiving mesh advertisement messages from advertising mesh points of a wireless mesh network having a mesh portal with a wired connection to a wired network. Each mesh advertisement message specifies a corresponding metric for reaching the mesh portal and has a corresponding signal strength indicator. An ordered group of parent access points, ordered based on the respective metrics, is generated from among the advertising mesh points, starting with a first parent access point having a corresponding optimum metric for reaching the mesh portal and independent of the corresponding signal strength indicator. A registration message is sent to each of the parent access points identifying a corresponding specified priority based on a corresponding position in the ordered group, for use by the corresponding parent access point in selecting a minimum interframe spacing for forwarding a wireless packet received from the mesh point.04-19-2012
20120093035UNIFIED FABRIC PORT - A method and system for configuring communications over a physical communication link connected between a physical port of a network switch and a physical port of a physical network interface on an end station. The communication link between the physical port of the network switch and the physical port of the physical network interface is logically partitioned into a number of channels of communication. For each channel, a channel profile is generated that defines properties of that channel. The physical network interface is instructed to self-configure such that the physical network interface is able to communicate with the network switch over each channel in accordance with the channel profile defined for that channel.04-19-2012
20120093034VIRTUAL SWITCHING PORTS ON HIGH-BANDWIDTH LINKS - Method and apparatus for managing traffic of a switch include logically partitioning a physical port of the switch into a plurality of virtual ports. One or more virtual output queues are uniquely associated with each virtual port. Switching resources of the switch are assigned to each of the virtual ports. A source virtual port is derived from a frame arriving at the physical port. The frame is placed in a given one of the one or more virtual output queues uniquely associated with the source virtual port derived from the frame. A destination virtual port for the frame is determined. The frame is transferred from the virtual output queue in which the frame is placed to an egress queue associated with the destination virtual port and forwarded from the egress queue to a destination physical port of the switch.04-19-2012
20120093033Wavelength division multiplexing network path search method and system - The present invention discloses a wavelength division multiplexing (WDM) network path search method and system. The method includes: step A, searching out a network element linked list from a source network element of a service to a destination network element according to a inter-network element connection; step B, performing a port search on the network element linked list, performing a validity check on a found node, and ending the search when an invalid node is found; and step C, sorting out a path linked list of all possible paths according to path topology structure data searched out. The searching efficiency is improved by the present invention.04-19-2012
20120093032AIRLINK TECHNIQUES ENABLING DYNAMIC OPTIMIZATION AND CONFIGURATION OF WIRELESS NETWORK BASE STATIONS - An embodiment of the present invention provides a base station (BS), comprising a transceiver adapted for communication with at least one mobile station (MS) in a wireless network and further adapted to reconfigure RF operational parameters on a dynamic basis enabling self optimizing networks (SON), and wherein the BS is capable of maintaining session continuity with the at least one STA through SON restarts.04-19-2012
20120269096SELF-FORMING NETWORK - A connected computer may be operated as node by inspecting communications from other nodes that pass through that node. From the communications, two or more pointers may be determined for the given node. These pointers may include a first pointer identified by a default designation that links the given node to a first node in the network, and a second pointer to another node. The second pointer may be identified by a determination that a designated criteria has been satisfied after the given node is placed on the network.10-25-2012
20120269095METHOD AND APPARATUS FOR PROVIDING A NETWORK SEARCH FUNCTION - A method for providing an autonomous search function may include discovering, at a user terminal, a first access node providing access in accordance with a first radio access technology (RAT), causing an attempt to discover a second access node providing access in accordance with a second RAT in response to discovering the first access node where the first access node has a first coverage area and the second access node has a second coverage area that at least partially overlaps with the first coverage area, and causing storage of fingerprint information associated with the first access node together with storage of fingerprint information associated with the second access node. An apparatus and computer program product corresponding to the method are also provided.10-25-2012
20110216671Environment Configuration by a Device Bases on Auto-Discovery of Local Resources and Generating Preference Information for those Resources - Methods and systems for environment configuration by a device based on auto-discovery of local devices and generating preference information for those resources are disclosed and may include discovering available devices utilizing a wireless mobile communication device (WMCD). Wireless communication may be established with one or more of the available devices utilizing the WMCD, which may then configure the resources according to a user's preferences or a plurality of user preferences. The user preferences may be stored internal or external to the WMCD, and may be modified based on subsequent changes to the configuring of the resources. The WMCD may communicate with the resources utilizing one or more of a plurality of wireless protocols, which may include cellular, WLAN, near-field communication, Bluetooth, and radio frequency identification. The WMCD may auto-discover as well as determine and authenticate access privileges for the resources, which may include devices for adjusting a user's local environment.09-08-2011
20110235549SYSTEM AND METHOD FOR SIMPLIFYING SECURE NETWORK SETUP - A method in one example implementation includes discovering a networking device within a wireless connectivity range from a first computing device. The networking device may be configured for wireless connectivity by sending new network configuration settings to the networking device to be stored in a memory element. The method also includes configuring the first computing device to initiate a wireless connection to the networking device, such that the wireless connection is created without requiring the user to provide any configuration settings associated with the wireless connection. In more specific embodiments, if it is determined that the networking device is unconfigured, then the new network configuration settings are automatically generated. In other more specific embodiments, the new network configuration settings include a new network identifier and a new network password.09-29-2011
20110261723Network system, controller, method and program - A controller removes a node to be bypassed from topology information that prescribes the network configuration and calculates a new path not passing the bypass node. For the nodes that form the path, the controller creates flow information that prescribes operation on the flow at nodes to set the flow information at the nodes on the path.10-27-2011
20100220632Access Point and Node for Controlling Routing in a Hybrid Network - An access point (09-02-2010
20120087281ACCESS POINT PROFILE FOR A MESH ACCESS POINT IN A WIRELESS MESH NETWORK - A mesh access point that includes an access point profile storing one ore more parameters in non-volatile memory, and a method of using the mesh access point having the access point profile to select and carry out mutual authentication on a wireless mesh network to establish itself to the mesh network using information in the access point profile, and further to provide services to wireless clients according to information in the access point profile. Access point profiles can be pre-configured/configured/updated suitably in order to adapt the mesh access point in a mesh network according to its capabilities and requirements.04-12-2012
20120087280IDENTIFICATION OF DUAL PLANE TOPOLOGIES - In one embodiment, two neighboring nodes adjacent to each end-point node of a domain may be associated with a “dual” (a logical structure). A first of the two neighboring nodes may be placed into a first family (and group) of the dual, while a second of the two neighboring nodes may be placed into an opposing second family (and group). Augmentations may then be performed, recursively merging and connecting the duals and/or groups, as well as connecting unplaced nodes to particular duals, families, and groups, according to forced augmentations and/or unforced augmentations where no forced augmentations exist. In the end, it may be determined whether the domain supports dual plane topologies based on whether a solution having one resultant dual with a single group in each opposing family is reached from the recursive augmentations04-12-2012
20120327811VIRTUAL NETWORK CONNECTION METHOD, NETWORK SYSTEM, AND NETWORK DEVICE - A communication can be conducted between a hub network layer-3VPN-connected to a core network and a hub network layer-2VPN connected to the core network. A first NW that conducts a packet forwarding of a VPN, a second NW that is layer-3-connected to the first NW, and a third NW that is layer-2-connected to the first NW configure VPN. When a packet is transmitted from the second NW to a destination of the third NW, a packet forwarding processing by a layer is conducted, and information is stored in destination information of the packet and forwarded by using destination information and information on the network device PE belonging to the first NW which is connected to the third NW which is a relay point to the destination.12-27-2012
20120287820METHOD AND A DEVICE FOR OPTIMIZING DATA TRANSFER IN A WIRELESS COMMUNICATION NETWORK - A method for optimizing data transfer in a wireless communication network is presented. A routing protocol is run for enabling data transmission devices (11-15-2012
20130010647Audio Network System and Display Method - In a top row on an audio network view screen, device images corresponding to devices composing a basic network are displayed in such a manner as to be arranged in a horizontal direction according to a connection order along with connection cable images indicative of connections between the device images according to connections between devices in the network. In display rows subsequent under the top row, other device images corresponding to devices composing another network which is connected to a connection node in the basic network with a full bridge are displayed in such a manner as to be arranged in the horizontal direction in a connection order along with connection cable images indicative of connections between the device images according to connections in the other network. As for a network connected to the basic network with a partial bridge setting, a partial bridge image is displayed in a display rows.01-10-2013
20130010644AUTO-DISCOVERY AND MANAGEMENT OF BASE STATION NEIGHBORS IN WIRELESS NETWORKS - Systems and methods are disclosed that include determining a local node configuration for a local network node. The local network node configuration can include a local range and a local location. In addition, these systems and methods can include receiving a remote network node configuration for a remote network node via a communications link. The remote network node configuration can include a remote range and a remote location. Also these systems and methods can further include generating a neighbor list that includes the remote network node and the local network node. The neighbor list can be determined using the local network node configuration and the remote network node configuration.01-10-2013
20130010645METHOD FOR ACQUIRING INFORMATION, USER EQUIPMENT, AND NETWORK EQUIPMENT - A method for acquiring information includes: receiving an Internet Protocol (IP) address acquisition request or Packet Data Network (PDN) address allocation information sent by User Equipment (UE); determining a PDN address capability according to the IP address acquisition request or the PDN address allocation information; and sending the determined PDN address capability to the UE. An UE and network equipment are also provided. The PDN address capability is determined by the network and is sent to the UE, so as to indicate to the UE the IP address information that may be acquired in a current PDN connection, such that when the network cannot provide an IP address for the UE any more, the UE is prevented from acquiring other IP addresses in other manners, avoiding service abnormality.01-10-2013
20130010646Method and device for managing network topology structure of machine to machine network - The disclosure discloses a method for managing network topology structure of a Machine to Machine (M2M) network. The method mainly includes: a control station of the M2M network obtains wireless link information of the M2M network; the control station completes establishment and/or adjustment of the network topology structure of the M2M network according to the obtained wireless link information. The disclosure also provides a device for managing network topology structure of an M2M network. By the disclosure, performing self-adaptive management on numerous terminals can be realized by the M2M network; by applying the disclosure to the wireless network management of the M2M network, manpower cost is saved and working efficiency is improved, and also it is of important significance to the smooth development of the telecom operation.01-10-2013
20130010643Method and apparatus for loop path search in mesh network - The present invention discloses a method and apparatus for loop path search in a mesh network, comprising: a network side searching for all nodes adjacent to node v01-10-2013
20130016628METHOD AND SYSTEM FOR MANAGING NETWORK DEVICES OF GENERIC VENDORS AND MANUFACTURESAANM Bertani; SebastianoAACI MilanAACO ITAAGP Bertani; Sebastiano Milan ITAANM Piacente; CristianAACI CatanzaroAACO ITAAGP Piacente; Cristian Catanzaro ITAANM Rincon Ray; AndreaAACI San Fermo della Battaglia COAACO ITAAGP Rincon Ray; Andrea San Fermo della Battaglia CO IT - A method of remote management in a network having a plurality of nodes to be managed by a remote controller has an agent device that makes initial contact with the remote controller in order to establish a connection with the remote controller. After the connection is established, the remote controller executes a discovery procedure through intermediation of the agent device for discovering the plurality of nodes. After executing the discovery procedure, the remote controller executes an identification procedure through intermediation of the agent device for identifying the discovered nodes, including identification of at least one characterizing parameter such as model, vendor, manufacturer, software version, hardware version, firmware version, serial number and MAC address.01-17-2013
20130016629NETWORK-ASSISTED PEER DISCOVERY WITH NETWORK CODING - Techniques for performing network-assisted peer discovery with network coding are disclosed. For peer discovery with network coding, a device may generate a network-coded message based on a message assigned to the device and one or more messages received by the device from other devices. The device may transmit a proximity detection signal including the network-coded message. For network-assisted peer discovery with network coding, the device may register with a network for peer discovery and may be provided with at least one parameter to use for peer discovery with network coding. The devices may perform peer discovery with network coding in accordance with the peer discovery parameter(s) received from the network. The device may generate a network-coded message based on the at least one peer discovery parameter and may transmit the network-coded message to enable other devices to detect the device.01-17-2013
20130016630BEACONS FOR USER EQUIPMENT RELAYS - Certain aspects of the present disclosure provide methods and apparatus for detecting user equipment (UE) relays using beacons (whether in-band or out-of-band) or other mechanisms. One method generally includes determining an identifier indicative of a UE functioning as a relay and transmitting a broadcast signal including the identifier. Another method generally includes receiving, at a UE functioning as a relay, first broadcast signals at a first interval from an apparatus serving the UE; and transmitting second broadcast signals at a second interval, wherein the second broadcast signals are the same type as the first broadcast signals and wherein the second interval is greater than the first interval.01-17-2013
20130021949Distributing Information - Information related to a set of networks from a first node to a second node of a communication system can be distributed. A set of identifiers which belong to the set of networks can be stored at the first node. Hash values are generated at the first node for the identifiers in the set of identifiers using a hash function. The generated hash values are transmitted from the first node to the second node. The second node determines an identifier of a particular network available for communicating with the second node. The second node generates a hash value for the identifier using the hash function. The second node compares the hash value of the identifier with the hash values received at the second node from the first node to determine whether the particular network belongs to said set of networks.01-24-2013
20120243441Method and Apparatus for Multipath Communication - In accordance with an example embodiment of the present invention, there is provided a method, comprising exchanging connectivity information, setting up a connection, determining that a correspondent node has at least one access in an inactive state, and transmitting a request to the correspondent node to activate at least one of the at least one access in an inactive state. The setting up may be done based on the exchanged connectivity information.09-27-2012
20130170399CONTROLLER IN BIDIRECTIONAL ADHOC NETWORK RADIO COMMUNICATION - The invention describes a controller for data processing in bidirectional adhoc-network radio communication with a computation unit for data processing and ports for data input and data output. The computation unit is set up to process the data according to the ITS standard, wherein the data processing is limited to processing steps of the ITS Facility layer, which performs content-oriented evaluation and/or conditioning of the data which are received or need to be sent by means of the bidirectional adhoc-network radio communication, and a first wideband communication port is provided at least for receiving the data from an ITS communication unit for the purpose of bidirectional adhoc-network radio communication.07-04-2013
20130170398System and Method for Device Discovery for Device-to-Device Communication in a Cellular Network - An embodiment of a system enables a user equipment to employ a buddy list to initiate a D2D discovery process. The user equipment constructs a buddy list including other user equipments with which the user equipment would desire to communicate employing a D2D communication link. The user equipment transmits the buddy list to a serving base station. The user equipment transmits a request to the serving base station that it desires to communicate over a D2D communication link with a second user equipment that is on the buddy list. The user equipment receives D2D link setup information from the serving base station for the communication link with the second user equipment. The user equipment transmits a beacon signal employing the D2D link setup information.07-04-2013
20080247334FREQUENCY SCANNING TO FORM A COMMUNICATION NETWORK - A node forms a network by scanning for an existing network. If an existing network is not found, the node operates as a network controller node of the first network and admits at least one client node to the first network. As a network controller node, the node designates one of the client nodes as a scout node. The scout node removes itself from the first network and scans for a second network. If the scout node does not return to the first network after a predetermined time, it is assumed that the scout node has found a second network. The network controller node of the first network then designates the remaining client nodes as scout nodes, and then joins the second network as a client node. Therefore, multiple networks are avoided.10-09-2008
20080232274DISTRIBUTED SYNCHRONOUS BATCH RECONFIGURATION OF A NETWORK - A novel alternative concept for handling dynamic provisioning changes and ongoing network reconfiguration and incremental reoptimization in general. A prime motivation is concern about the dependency of existing concepts for dynamic provisioning on the real-time coherence of databases of network state at diverse geographic locations. Not only is the continual updating of such global state everywhere in the network an intensive real-time load, but inevitable incoherencies pose hazards in network operation. The alternative proposal is a framework that makes use precise time synchronization and the computational power of network nodes to solve identical local instances of incremental reoptimization problems in situ. The new scheme removes the database coherency hazard, reduces signaling volumes, and increases resource efficiencies in service provisioning. It also provides a framework in general for continually ongoing incremental or (if desired) total reoptimization of network configuration. The proposal also points directions towards some new research questions such as implementation of optimization models for identical solution on disparate platforms and definition of a variety of incremental batch reoptimization problems. It is thought that this may be one of the first practical application concepts for transport network management that would involve on-line embedded use of operations research methods in communication networks.09-25-2008
20130201874DAD-NS TRIGGERED ADDRESS RESOLUTION FOR DOS ATTACK PROTECTION - A first network element that receives an appropriation message from a second network element that indicates a target address which the second network element intends to appropriate for its use. In response to the appropriation message, the first network element broadcasts a discovery message to a plurality of network elements on the network to request a link-layer address in association with the first target address. The first network element receives a discovery response from the second network element with the first target address and the link-layer address of the second network element. Then the first network element updates a neighbor cache to include a pre-cached neighbor cache entry associating the link-layer address to the first target address. This prevents one or more future neighbor cache misses associated with the first target address.08-08-2013
20130201877METHODS AND SYSTEMS FOR OPERATING A LOGICAL SENSOR NETWORK - Methods and systems for operating a sensor network comprising a plurality of nodes and at least one resource, where a resource can be a sensing device (e.g., a camera or microphone) or other peripheral devices (e.g., a storage or recording system). In at least one embodiment of the present invention, at least one node in a network determines at least one resource available to it and the type of the resource or its capabilities. Based on the type or capabilities of the resource, the node associates with one or more logical node names and acquires instructions for performing at least one function.08-08-2013
20080225755SYSTEM AND METHOD FOR PROVIDING AND USING A VLAN-AWARE STORAGE DEVICE - The present invention provides secure IP protocol capable storage devices using Virtual Local Area Network (VLAN) techniques. Specific embodiments of the present invention provide techniques for securing VLAN aware storage devices, and the like. In specific embodiments, techniques according to the present invention can provide Internet data centers that are responsible for keeping their customer's computers and storages safe and secure with the capability to strictly separate LAN access for different customers using VLAN (virtual LAN) technology.09-18-2008
20080225754Automatically discovering architectural roles of packet switching devices - Network architectural roles of packet switching devices are automatically determined by retrieving and analyzing configuration information of the packet switching devices. The retrieved configuration information typically includes operational details of the packet switching operations performed by the packet switching device, with these retrieved operational details being analyzed in order to identify one or more network architectural roles being performed by a particular packet switching device. Examples of such identified network architectural role include, but are not limited to, a customer edge device, a provider edge device, and a user-facing provider edge device. Knowing the architectural role performed by a packet switching device is useful for operations, administration, maintenance and provisioning of networks of these packet switching devices.09-18-2008
20080225753SYSTEMS AND METHODS FOR CONFIGURING HANDLING OF UNDEFINED POLICY EVENTS - Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is described for allowing users to specify object oriented policies. These object oriented policies may allow any data structures to be applied with respect to a payload of a received packet stream, including any portions of HTTP traffic. A configuration interface may also allow the user to control the order in which policies and policy groups are executed, in addition to specifying actions to be taken if one or more policies are undefined. Systems and methods for processing the policies may allow efficient processing of object-oriented policies by applying potentially complex data structures to unstructured data streams. A device may also interpret and process a number of flow control commands and policy group invocation statements to determine an order of execution among a number of policies and policy groups. These policy configurations and processing may allow configuration and processing of complex network behaviors relating to load balancing, VPNs, SSL offloading, content switching, application security, acceleration, and caching.09-18-2008
20130176900Discovery in MoCA Networks - Methods, apparatuses, systems, and computer program products that may be based on MoCA protocols for discovering MoCA devices in a MoCA network include causing a first MoCA device to periodically send the device specific information to a second MoCA device in the MoCA network. The information may be sent, for example in a link-layer discovery protocol (LLDP) message in which the information is encoded in a type-length value (TLV) message. The information may include a MAC address of the first MoCA device, an IP address of the first MoCA device, vendor identification information, hardware identification information, hardware version information, software identification information, a software version, a name of the first MoCA device, a location of the first MoCA device, a MoCA node assigned to the first MoCA device, or the like.07-11-2013
20130176901DEVICE AND METHOD FOR COMMUNICATION OF MANAGEMENT INFORMATION IN AD-HOC WIRELESS NETWORKS - A method includes detecting, by a first device, a beacon sent from a second device. The beacon is associated with an ad-hoc wireless network. In response to detecting the beacon, the first device sends to the second device a request for management information associated with the ad-hoc wireless network. The request identifies at least a first information element associated with at least a first portion of the management information and a second information element associated with at least a second portion of the management information. The method further includes receiving from the second device a first wrapper information element that includes at least the first information element.07-11-2013
20130176902SYSTEM AND METHOD OF COMMUNICATION USING DISTRIBUTED CHANNEL ACCESS PARAMETERS - A device includes a processor and a memory accessible by the processor. The memory includes access category data specifying one or more access categories. The one or more access categories include a sensor access category specifying distributed channel access parameters to be used by one or more station devices to wirelessly communicate sensor data via a network. The memory further includes instructions executable by the processor to send at least a portion of the access category data to a station device to enable the station device to communicate sensor data.07-11-2013
20130176903Methods and Apparatus for Establishing a Tunneled Direct Link Setup (TDLS) Session Between Devices in a Wireless Network - The present disclosure describes techniques for establishing and reestablishing tunneled direct link setup (TDLS) sessions. In some aspects a TDLS persistent capable bit is stored at a computing device to indicate whether the computing device is capable of storing persistent group[ information associated with TDLS sessions. Persistent group information is also stored at the computing device to assist the computing device in reestablishing TDLS sessions and directing reestablishment of TDLS sessions.07-11-2013
20130176904Providing Full Point-To-Point Communications Among Compute Nodes Of An Operational Group In A Global Combining Network Of A Parallel Computer - Methods, apparatus, and products are disclosed for providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: receiving a network packet in a compute node, the network packet specifying a destination compute node; selecting, in dependence upon the destination compute node, at least one of the links for the compute node along which to forward the network packet toward the destination compute node; and forwarding the network packet along the selected link to the adjacent compute node connected to the compute node through the selected link.07-11-2013
20130176905NODE ARBITRATED MEDIA ACCESS CONTROL PROTOCOL FOR AD HOC BROADCAST NETWORKS CARRYING EPHEMERAL INFORMATION - Techniques for organizing nodes of an ad hoc broadcast network into sets and employing the sets to arbitrate access by the nodes to a shared communications medium. Each node has a copy of a signal library and the node indicates its membership in the set by associating itself with a signal in the library. In one application, the signals are ranked, the set is a queue, and the node's position in the queue is indicated by the rank of the signal associated with the node. Each node has rules for selecting the next signal. The hidden terminal problem is solved by having each node broadcast its tone and all of the other tones it has heard. The techniques are particularly useful for the broadcast of ephemeral information by the nodes.07-11-2013
20110274009MANAGEMENT OF TELECOMMUNICATIONS CONNECTIONS - A network distribution, point (11-10-2011
20130142081System and Method for Multicast Transmission - A system and method for multicast transmission are disclosed. In one embodiment, a virtual exchange network including interconnected nodes is embedded within a network. A sender is disposed in communication with a root node and receivers are disposed in communication with a set of edge nodes. The sender publishes a packetized data stream to which the receivers subscribe. The packetized data stream is promulgated by implicit signaling through optimum virtual exchange network connections from the sender through the virtual exchange network to the receivers. The interconnected nodes, responsive to receiving the published packetized data stream, are adapted to multicast N instances of the published packetized data stream to N recipients selected from the group consisting of receivers and other of the interconnected nodes.06-06-2013
20130094403METHOD AND APPARATUS FOR PROVIDING SENSOR NETWORK INFORMATION - An apparatus for providing sensor network information receives sensing information containing sensing values obtained by sensor resources from sensor network middleware, converts the sensing information into an RDF (resource description framework) form, and stores and manages it in an RDF storage. The apparatus searches for information corresponding to a query from an application service, from among the information stored in the RDF storage, and provides it to the application service.04-18-2013
20130094402Centralized Access Control System and Methods for Distributed Broadband Access Points - A method includes automatically sending a request from a wireless access point to a configuration server during a power-up procedure for the wireless access point. The method includes receiving virtual private network tunnel parameters at the wireless access point from the configuration server in response to the request. The virtual private network tunnel parameters identify an access gateway. The method also includes establishing a virtual private network tunnel between the wireless access point and the centralized access gateway during the power-up procedure based on the virtual private network tunnel parameters. The virtual private network tunnel enables the wireless access point to provide one or more wireless devices access to a wide area network.04-18-2013
20130100858DISTRIBUTED SWITCH SYSTEMS IN A TRILL NETWORK - Featured are a system and method for providing a distributed switch system (DSS) in a TRILL-compliant network. An ingress network device in the TRILL-compliant network provides data to a received packet. The data includes instructions related to a feature of the DSS. The instructions are inserted into a TRILL header generated at the ingress network device. The TRILL header is output to an egress network device in the TRILL-compliant network. A determination is made whether the ingress network device and the egress network device are members of the DSS. The instructions are processed by the egress network device in response to determining that ingress and egress devices are members of the DSS.04-25-2013
20130114466NETWORK VIRTUALIZATION APPARATUS AND METHOD WITH SCHEDULING CAPABILITIES - Some embodiments provide a controller for managing several managed switching elements that forward data in a network. The controller includes an interface for receiving input logical control plane data in terms of input events data. The controller includes an input scheduler for (1) categorizing the input events data into different groups based on certain criteria and (2) scheduling supplying of the input event data into a converter based on the groups so that the converter processes a group of input events data together. The controller includes the converter for converting the input logical control plane data to output logical forwarding plane data. The controller includes a network information base (NIB) data structure module for storing the output logical forwarding plane data. The logical forwarding plane data is for subsequent translation into physical control plane data.05-09-2013
20130142078SYSTEMS AND METHOD FOR GRAPH-BASED DISTRIBUTED PARAMETER COORDINATION IN A COMMUNICATION NETWORK - Systems and method are disclosed for graph-based distributed parameter coordination in a communication network. In general, discrete local parameters to be coordinated among communication nodes in the network and their respective performance metrics, or costs, are modeled using a factor graph. Based on the factor graph, a variant of the sum-product algorithm, namely the min-sum algorithm, is applied in order for the communication nodes, through iterative message passing with their neighboring communication nodes, to decide upon optimal values for the local parameters for the communication nodes that collectively optimize a global performance metric across the communication network. In one embodiment, the communication network is a wireless communication network. In one specific embodiment, the wireless communication network is a cellular communication network.06-06-2013
20130142083TECHNIQUE FOR CHANGING THE OPERATING STATE OF A NODE WITHIN A NETWORK - A node residing within a wireless mesh network is configured to transmit a state transition message to a downstream node also residing within the wireless mesh network. The state transition message indicates a new operating state for the downstream node. Upon receipt of the state transition message, the downstream node may transition to the new operating state and then transmit an acknowledgement message back to the node that sent the state transition message. Alternatively, the downstream node may transmit the acknowledgement message back to the node that sent the state transition message first, and then transition to the new operating state.06-06-2013
20130142082GRAPH-BASED DISTRIBUTED COORDINATION METHODS FOR WIRELESS COMMUNICATION NETWORKS - Systems and methods are disclosed for graph-based distributed parameter coordination in a communication network. In general, discrete local parameters to be coordinated among communication nodes in the communication network and their respective performance metrics, or costs, are modeled using a factor graph. Based on the factor graph, a variant of the sum-product algorithm, namely the min-sum algorithm, is applied in order for the communication nodes, through iterative message passing with their neighboring communication nodes, to decide upon optimal values for the local parameters for the communication nodes that collectively optimize a global performance metric across the communication network. In one embodiment, the communication network is a wireless communication network. In one specific embodiment, the wireless communication network is a cellular communication network.06-06-2013
20130142080METHOD AND SYSTEM FOR ESTABLISHING DISPARATE CONNECTION PATHS FROM A MOBILE USER DEVICE TO A BASE STATION THROUGH A MOBILE PEER-TO-PEER (PTP) NETWORK - A system and method for establishing and/or maintaining disparate connection paths from an originating mobile user device to a base station via a mobile peer-to-peer (PTP) network including an originating mobile user device configured to broadcast at least one of a path establishment request signal and a confirmation request signal to an intermediate mobile user device; a mobile peer-to-peer network including the intermediate mobile user device configured to forwarding at least one of the path establishment request signal, the path establishment response signal, the path confirmation request signal, and a path confirmation response signal, via a disparate connection path; and a base station configured to broadcasting at least one of the path establishment response signal and the path confirmation response signal to the originating mobile user device via one or more disparate connection paths within the mobile peer-to-peer network.06-06-2013
20090279454METHOD FOR CONFIGURING A DHCP SERVER USING DHCP OPTION 82 - The invention relates to a method for creating a DHCP network device configuration, wherein the parameter allocation by a DHCP server is performed using Option 82, and the assignment for the IP address to be allocated to a network device is determined on the basis of the topological information. The topological information is provided to the DHCP server by the requesting device and a DHCP relay agent, and the relay agent acts on each DHCP message sent by a device in the network by means of an additional DHCP Option 82 and sends the messages via unicast to the DHCP server, whereas the standard DHCP message is forwarded. According to the invention, a network device sends, in addition to the regular DHCP discovers via MAC broadcast, DHCP messages via MAC multicast to a MAC multicast address, and from this MAC multicast sends unique information via unicast to the DHCP server by means of a DHCP relay agent, since the associated network device filters the multicast. The creation of a DHCP server configuration is automated by use of a software component for the network management.11-12-2009
20110222439METHOD, APPARATUS, AND SYSTEM FOR ESTABLISHING A VIRTUAL LOCAL AREA NETWORK CONNECTION - A method for establishing a Virtual Local Area Network (VLAN) connection is provided, which includes: receiving a first signaling message, in which the first signaling message includes an unused VLAN ID and explicit routing information; registering the VLAN ID by using the at least one unused VLAN ID; and sending the first signaling message according to the explicit routing information. Several node apparatuses and several systems are also provided in the present invention. Therefore, automatic VLAN configuration is performed in an environment without a spanning tree protocol, and traffic engineering is supported simultaneously.09-15-2011
20080198768Management Interface and Tool for Benchmarking Optical Network Topologies - A management tool facilitating benchmarking of optical network topologies. In one embodiment, a method includes receiving an identification of an optical network element, including network address information of the optical network element; receiving an identification of one or more optical network traffic generators, including access information of the optical network generators; and automatically accessing the identified optical network element, and one or more traffic generators in connection with execution of one or more tests on the optical network element.08-21-2008
20130148545METHOD AND APPARATUS FOR MANAGING DEVICE DISCOVERY IN WIRELESS SYSTEM - A method and apparatus for managing device discovery in a wireless system are provided. The method includes performing a periodic search operation to discover a peer device, stopping the periodic search operation upon discovering a suitable peer device, and switching to a periodic listening operation for allowing the Wireless Fidelity (WiFi) Peer-To-Peer (P2P) device to be discovered by the discovered peer device and for permitting a connection with the discovered peer device.06-13-2013
20130148546SUPPORT FOR CONVERGED TRAFFIC OVER ETHERNET LINK AGGREGATION (LAG) - In one embodiment, a system includes a switching processor configured to execute logic, a plurality of ports, at least some of the ports being grouped together in one or more link aggregations (LAGs), logic adapted to create at least a first virtual local area network (VLAN) interface for Ethernet traffic using transmission control protocol/internet protocol (TCP/IP) that is received on at least one of the plurality of ports, and logic adapted to create at least a second VLAN for storage area network (SAN) traffic using Fiber Channel over Ethernet (FCoE) and/or remote direct access memory (RDMA) over Converged Enhanced Ethernet (RoCEE) that is received on at least one of the plurality of ports, wherein no SAN traffic using FCoE and/or RoCEE is assigned to the first VLAN, and wherein no Ethernet traffic using TCP/IP is assigned to the second VLAN.06-13-2013
20130148547METHOD AND SYSTEM FOR COLLECTING TOPOLOGY INFORMATION - A method of providing topology information about a network to a topology manager is disclosed. The network includes a plurality of sensors each having a sensor ID, and the method includes performing the following steps at each of the plurality of sensors: receiving a stream of packets and identifying a topology trace packet in the stream of packets, wherein the topology trace packet has a destination address and an ID of a previous sensor, including the sensor ID in the topology trace packet, sending the topology trace packet to the destination address, forming a report message so as to include the sensor ID, the previous sensor ID, sending the report to the topology manager; and, providing network addresses of adjacent nodes to the topology manager.06-13-2013
20120275345METHOD FOR GENERATING AND REGISTERING IDENTIFICATION IN WIRELESS SENSOR NETWORK - A method for generating and registering an identification in a wireless sensor network. The method includes generating an identification of a first layer node; transmitting the identification of the first layer node to a second layer node; detecting whether the identification of the first layer node is duplicated, using the second layer node; if the identification of the first layer node is not duplicated, transmitting a determination message from the second layer node to the first layer node; and determining the identification of the first layer node as a determined identification. The method further includes: if the second layer node does not have a determined identification, re-transmitting the identification of the first layer node after a predetermined period of time has lapsed. Therefore, an automatically identification allocating method using a hierarchical structure can be adopted to enable a distributed management.11-01-2012
20120275344METHODS AND APPARATUS TO IMPLEMENT SCALABLE ROUTING IN NETWORK COMMUNICATION SYSTEMS - An example method involves for a first virtual private network (VPN) installed on a candidate hub router, selecting a first spoke-to-hub assignment solution having a first least memory utilization cost to assign the candidate hub router a quantity of first virtual private edge (VPE) routers serving the first VPN; for a second VPN installed on the candidate hub router, selecting a second spoke-to-hub assignment solution having a second least memory utilization cost to assign the candidate hub router a quantity of second VPE routers serving the second VPN; determining third least memory utilization costs to assign the candidate hub router to a quantity of the first VPE routers, and fourth least memory utilization costs to assign the candidate hub router to a quantity of the second VPE routers; and selecting the first or second spoke-to-hub assignment solution for the candidate hub router based on the least memory utilization costs.11-01-2012
20120275343USING BATTERY-POWERED NODES IN A MESH NETWORK - In embodiments of the present invention improved capabilities are described for configuring a constant powered mesh network node to control a configuration of an intermittently powered mesh network node, where the intermittently powered mesh network node may include a repeater node that periodically powers down for a time period to conserve energy. The embodiments include transmitting a message beam to the repeater node, where a duration of the message beam length may exceed the time period that the repeater node is powered down, and where the message beam may contain a preamble with data that may indicate that the repeater node is to remain powered up in order to receive a message, and may cause the intermittently powered mesh network node to request configuration information relating to a network topology from the constant powered mesh network node when the intermittently powered mesh network node powers up.11-01-2012
20120275342MICROWAVE BACKHAUL ARRANGEMENTS - Described herein are techniques related to wireless communication systems that may implement microwave backhaul for connectivity between network elements deployed by the wireless communication systems. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.11-01-2012
20130155902SYSTEM AND METHOD FOR NON-DISRUPTIVE MANAGEMENT OF SERVERS IN A NETWORK ENVIRONMENT - An example method includes disengaging a target node from a cluster, where the disengaging comprises: selecting an inheritor; migrating flows from the target node to the inheritor; informing a migration manager that the target node is disengaged from the cluster; and broadcasting to peer nodes of the target node that the target node is replaced by the inheritor. In particular implementations of the present disclosure, the cluster can include a first layer of a network topology including a forwarding engine that implements hash-based packet forwarding; a second layer of the network topology comprising the target node and the inheritor, where the target node and the inheritor implement flow-based packet forwarding; and a third layer including service nodes configured for packet processing in a network.06-20-2013
20130155903System and Method of Radio Bearer Management for Multiple Point Transmission - A method for operating a multiple point transmission system is disclosed. The method includes reconfiguring the multiple point transmission system according to an updated configuration of an at least one radio bearer between an at least one transmission point and a terminal device, and communicating with the terminal device using the reconfigured multiple point transmission system. The configuration of the at least one radio bearer is updated according to operating condition information of the terminal device.06-20-2013
20130155904METHODS AND APPARATUS FOR EVENT DETECTION, PROPAGATION AND LOCALIZATION USING UWB IMPULSE RADIOS - A distributed wireless sensor network includes two or more wireless nodes adapted for sensing a condition at any first node, first programming located within each node for transmitting a signal representing the sensed condition from the first node to another node, second programming located within each node for receiving the signal transmitted from any other node and for retransmitting a received signal representing the sensed condition along with additional data indicating the number of retransmissions of the signal between nodes.06-20-2013
20130155905SYSTEMS AND METHODS FOR TRANSMITTING AND RECEIVING DISCOVERY AND PAGING MESSAGES - Methods, devices, and computer program products for transmitting and receiving discovery and paging messages are described herein. In one aspect, an apparatus operable in a wireless communication system includes a receiver and transmitter. The receiver receives a registration packet from a first device. The registration packet indicates interest in a service provided by another device in a wireless communications network. The receiver further receives a discovery packet from a second device during a first discovery interval of a plurality of discovery intervals. The discovery packet advertises a service provided by the second device, and the plurality of discovery intervals include recurring time intervals when a plurality of devices are configured to transmit and receive discovery packets in the wireless communications network. The transmitter transmits a notification packet configured to enable the first device and the second device to communicate directly.06-20-2013
20130155906SCALING ADDRESS RESOLUTION FOR MASSIVE DATA CENTERS - There is provided a network device disposed at an interface between an access segment and an interconnecting layer of a data center. The network device includes an address resolution processor configured to receive an address request addressed to virtual machines in a transmission domain of the network device. The address request specifying a source layer 2 address, requesting a layer 2 address of a target virtual machine in the data center, and specifying a layer 3 address of the target virtual machine. The network device is further configured to transmit a local message over the first access segment requesting the respective layer 2 address of a virtual machine which has the specified layer 3 address. In response to receiving a reply, the network device transmits a message to the specified source layer 2 address to provide the layer 2 address of the network device and the specified layer 3 address.06-20-2013
20130155907COMBINED OMNI- AND DIRECTIONAL- COMMUNICATIONS IN HIGH-FREQUENCY WIRELESS NETWORKS - In a wireless communication network, specific portions of the communication may combine directional transmission with omnidirectional reception. In particular, sector-level directional transmission may be established through sector sweeps, followed by antenna training for more directionality. In some embodiments, collisions during the exchange may be reduced by having different network devices use different sub-channels or different time slots. In some embodiments, each network may restrict its network communications to a single sub-channel that is different than the sub-channels used by adjacent networks.06-20-2013
20130182611COORDINATION OF DISCOVERY RESPONSES - Disclosed are various methods and apparatus usable in, for example, an IEEE 802.11 type of wireless network. An exemplary method includes transmitting a probe request frame from a station; receiving a probe response frame from an access point; and examining the received probe response frame to determine whether an order in which probe response frames are received from the access point and from other access points has been coordinated and that the station is recommended to attempt to authenticate and associate to the access points according to the order in which the probe response frames are received. Related embodiments of access points and a discovery management entity are also disclosed.07-18-2013
20130182610FAIRNESS PROVISION VIA CONTROLLING A TRANSMISSION OPPORTUNITY WINDOW IN A WIRELESS MESH NETWORK - The invention allows fairness provision in wireless mesh networks with respect to the data rate that stations communicate. A fairness metric is obtained during a mesh profile negotiation performed in order for a wireless station to join a wireless mesh network. Predetermined mesh transmission parameters of the wireless station are sent to previously joined wireless stations in a predetermined neighborhood of the wireless station. From the previously joined wireless stations their respective predetermined mesh transmission parameters are received. In response to a first predetermined event, a transmission opportunity window is determined for the wireless station based on the obtained fairness metric, the predetermined mesh transmission parameters of the wireless station, and the predetermined mesh transmission parameters of the previously joined wireless stations.07-18-2013
20130182609TECHNIQUE FOR IMPROVING LDP-IGP SYNCHRONIZATION - A technique may improve LDP-IGP synchronization in a MPLS network when an interface of a router coupled to a communications link along a shortest path between a source router and a destination router becomes newly active. Specifically, an IGP adjacency may be held down over the newly active link while a LDP adjacency is established over the link. The router may inject a temporary, non-redistributable route having a large administrative weight into its routing table utilizing addresses learned during establishment of the LDP adjacency. The injected route ensures that there is a reachable route to a peer router so that LDP may converge. After LDP has converged and all needed label bindings have been distributed in the MPLS network utilizing the injected route, IGP executing on the router may advertise a normal cost metric for the link associated with the newly active interface, and IGP convergence may be completed.07-18-2013
20110280157Communicating a Network Event - An Agent Apparatus is described including a Detecting Device for detecting the execution of an automated function within a communication network. The Agent Apparatus further includes a Type Determining Device for determining the type of the automated function and a Writing Device for writing information representing the type of the automated function in a predefined storage area of a record carrier.11-17-2011
20130121209WAN OPTIMIZER FOR LOGICAL NETWORKS - Some embodiments provide a non-transitory machine readable medium of a controller of a network control system for configuring a wide area network (WAN) optimizer instance to implement a WAN optimizer for a logical network. The controller receives a configuration for the WAN optimizer to optimize network data from the logical network for transmission to another WAN optimizer. The controller identifies several other controllers in the network control system on which to implement the logical network. The controller distributes the configuration for implementation on the WAN optimizer.05-16-2013
20110310772Concurrency Method for Forecasting Impact of Speed Tiers on Consumption - A forecast model processes performance data from a site, e.g., a cable modem termination system (CMTS), to obtain a set of concurrency equations for existing speed tiers that is based on an observed subscriber bandwidth for the site. A new set of concurrency equations is obtained for new speed tiers so that a new subscriber bandwidth can be predicted for the new speed tiers. Based on the new subscriber bandwidth, expected subscriber growth, and changes in data consumption, the site is reconfigured with additional ports based on the forecast. This process can be repeated for the other sites. Sites may be grouped together based on the observed subscriber bandwidth. A new subscriber bandwidth may be predicted for the group with the new speed tiers so that additional ports can be configured for each of the sites in the group.12-22-2011
20110310771METHOD FOR REALIZING CONVERGENT WAPI NETWORK ARCHITECTURE WITH SPLIT MAC MODE - A method for realizing a convergent Wireless Local Area Networks (WLAN) Authentication and Privacy Infrastructure (WAPI) network architecture with a split Medium Access Control (MAC) mode involves the steps: a split MAC mode for realizing WLAN Privacy Infrastructure (WPI) by a wireless terminal point is constructed through separating the MAC function and the WAPI function of the wireless access point apart to the wireless terminal point and an access controller; integration of a WAPI and a convergent WLAN network system architecture is realized under the split MAC mode that the wireless terminal point realizes WPI; the association connection process is performed among a station point, a wireless terminal point and an access controller; the process for announcing the start of performing the WLAN Authentication Infrastructure (WAI) protocol between the access controller and the wireless terminal point is performed; the process for performing the WAI protocol between the station point and the access controller is performed; the process for announcing the end of performing the WAI protocol between the access controller and the wireless terminal point is performed; the secret communication process is performed between the wireless terminal point and the station by using WPI.12-22-2011
20130188521MANAGING A LARGE NETWORK USING A SINGLE POINT OF CONFIGURATION - One embodiment of the present invention provides a computing system. The switch includes a discovery module, a device management module, and a logical group management module. The discovery module constructs a multicast query message for a first multicast group to which the computing system is registered. The device management module extracts information about a remote switch from a query response message from the remote switch and constructs a client database, wherein a first entry in the client database contains the information extracted from the query response message. The logical group management module associates the remote switch with a second multicast group.07-25-2013
20130188522HIGH THROUGHPUT FEATURES IN 11S MESH NETWORKS - The addition of high throughput capability elements to beacon frames and peer link action frames in wireless mesh networks enable the utilization of desirable features without further modifications to the network. Rules can be established for high throughput mesh point protection in a mesh network, Space-time Block Code (STBC) operations and 20/40 MHz operation selections. However, features such as PSMP (power save multi-poll) and PCO (phased coexistence operations) are barred from implementation to prevent collisions.07-25-2013
20130188523COMMUNICATION APPARATUS, METHOD FOR CONTROLLING COMMUNICATION APPARATUS, AND COMPUTER-READABLE STORAGE MEDIUM - A communication apparatus includes a unit configured to operate as a providing apparatus for providing a communication parameter to another communication apparatus, a unit configured to operate as a reception apparatus for receiving a communication parameter provided from another communication apparatus, a determination unit configured to determine a role to perform based on predetermined processing for determining whether the communication apparatus operates as the providing apparatus or the reception apparatus by communication with another communication apparatus, and an execution unit configured to execute the predetermined processing again in a case where communication for sharing the communication parameter with another communication apparatus is not started after the determination unit determines that the communication apparatus operates as either the providing apparatus or the reception apparatus.07-25-2013
20130188524Mechanism for Automatic Network Formation and Medium Access Coordination - The invention provides a set of mechanisms by which a wireless mobile mesh node equipped with a directional antenna may self form and self adapt its steady-state communications schedule. A link establishment handshake is carried out over an ongoing subtemplate-based discovery scan. During time not reserved for steady-state communications with previously discovered neighbors, nodes continue to search for an establish links with new neighbors. Initial and subsequent bandwidth allocation protocols may be utilized to allow peer nodes to coordinate communication opportunities between the peer nodes without impacting or having knowledge about reservations for communications with other peers. The link establishment and initial bandwidth allocation protocols may be piggy-backed for readily establishing an initial steady-state schedule with a peer upon link establishment without impact on previous steady state reservations by other nodes or on ongoing link establishment attempts elsewhere.07-25-2013
20130188520DEVICE TOPOLOGY AND CAPABILITY DISCOVERY AND REPORTING TECHNIQUES - Techniques for the discovery of a topology of varying complexity and discovery of the capability of the devices of the topology include querying a plurality of node devices for node data. At least an initial portion of node data of one or more node devices is received in response to the query. In addition, previously determined node data is retrieved from a cache. The initial portion of node data is correlated to the previously determined node data to deduce node data for one or more node devices within a predetermined period of time. It is to be appreciated that the deduced node data may include node data beyond the initial portion of node data and/or node data for other node devices beyond the initially responding node devices. The deduced node data may then be reported to an operating system.07-25-2013
20120002572CONTROL FRAME HANDLING BY A PROVIDER BACKBONE BRIDGE - A method and Bridge in a Provider Backbone Bridge Network (PBBN) for enabling frames from a Higher Layer Entity attached alternatively to a Provider Instance Port (PIP) on an I-Component of a Backbone Edge Bridge or to a Customer Backbone Port on a B-Component of the Backbone Edge Bridge, to reach an intended entity in the PBBN. A Virtual Instance Port Service Access Point (VIP SAP) is configured for every VIP and every Higher Layer Entity configured on the I-Component. An Enhanced VIP Port Connectivity function utilizes the VIP SAP to tunnel customer-initiated Layer 2 Control Protocols (L2CPs). A Special Multiplexed SAP handles the frames of the Higher Layer Entity. A Service Instance Multiplex Entity utilizes the Special Multiplexed SAP to transfer frames between the PIP or the Customer Backbone Port and the entity inside the PBBN.01-05-2012
20130194975Switch Table Update using Demotion Command in PRIME - Embodiments of methods and systems for switch table update using demotion command in PRIME are presented. In one embodiment, the method is performed by a power line communication (PLC) device. For example, the PLC device may be a data concentrator. In such an embodiment, the method may include receiving a request for registration from a node in a PLC network. The method may also include determining whether the node was previously included in the network according to an alternate network topology configuration. Additionally, the method may include issuing a notification to a group of switch nodes in the network instructing the switch nodes to update respective switch tables in response to a determination that the node was previously included in the network according to an alternate network topology configuration.08-01-2013
20130194972Network Reconfiguration Method - A method of reconfiguring a data unit communication network that comprises bridge nodes is described. Each bridge node comprises two or more ports for receiving and sending data units, a controller for controlling said bridge node and for handling received data units, and a record for associating data unit address information with port identification information. The controller is capable of querying said record for determining which one or more ports to forward a received data unit to. The method comprises performing a topology reconfiguration procedure for said data unit communication network when detecting an occurrence of any one of one or more topology reconfiguration conditions, and performing a purge procedure of the records of the bridge nodes when detecting an occurrence of an indication of an upcoming topology reconfiguration of the data unit communication network, the indication being different from any of said topology reconfiguration conditions, and continuing to handle data units in the bridge nodes during the purge procedure.08-01-2013
20130194973In-Service Upgrade of Provider Bridge Networks - A system and method for in-service migration for a Virtual Local Area Network, VLAN, service if a Provider Bridge Metro Ethernet Network, PB MEN, is upgraded to a Provider Backbone Bridge, PBB, MEN or an Internet Protocol/Multi Protocol Label Switching, IP/MPLS, MEN. After the deployment of the new PBB or IP/MPLS technology, a sequence of management actions are performed to configure PBB or IP/MPLS edge nodes to use the new technology as well as the old PB-based technology to support the VLAN service. Both old and new connectivity structures are maintained in the edge nodes during the entire migration process. Customer traffic is then redirected per edge node to the new technology. When each edge node entirely provides the VLAN service under the new technology, the migration is complete.08-01-2013
20130194974NETCONF-ENABLED PROVISIONING IN ROLLBACK AGNOSTIC ENVIRONMENT - A method includes receiving configuration data for configuring network devices; generating remote procedure calls (RPCs) for configuring the network devices, which include provisioning and reverse provisioning RPCs, where each reverse provisioning RPC reverse provisions a particular pseudowire; providing to the network devices the provisioning RPCs; determining a success with respect to each of the provisioning RPCs, where the success indicates that all endpoints of a pseudowire have been successfully configured; providing the reverse provisioning RPCs to the network devices, when it is determined that the success has not been achieved; and storing an indication of success when it is determined that the success has been achieved with respect to the provisioning RPCs.08-01-2013
20130201873DISTRIBUTED FABRIC MANAGEMENT PROTOCOL - A distributed fabric system comprises a plurality of independent network elements interconnected by inter-switch links and assigned to a same group. Each network element includes a switching chip, a processor, and memory storing program code that is executed by the processor. The program code of each network element includes a device configuration (DC) stacking module and a switch discovery protocol (SDP) module. The SDP module of each network element, when executed, discovers each other network element in the group and elects one of the network elements as a master network element. The SDP module of the master network element, when executed, sends messages to the DC-stacking module of the master network element. Each sent message identifies one of the network elements in the group. The DC stacking module of the master network element, when executed, maintains a record of all network elements that are currently members in the group.08-08-2013
20130201875DISTRIBUTED FABRIC MANAGEMENT PROTOCOL - A distributed fabric system comprises a plurality of independent network elements interconnected by inter-switch links and assigned to a same group. Each network element includes a switching chip, a processor, and memory storing program code that is executed by the processor. The program code of each network element includes a device configuration (DC) stacking module and a switch discovery protocol (SDP) module. The SDP module of each network element, when executed, discovers each other network element in the group and elects one of the network elements as a master network element. The SDP module of the master network element, when executed, sends messages to the DC-stacking module of the master network element. Each sent message identifies one of the network elements in the group. The DC stacking module of the master network element, when executed, maintains a record of all network elements that are currently members in the group.08-08-2013
20130201876Protocol Stack for a Multi-Waveform AD Hoc Network - A protocol stack for an ad hoc type network comprises existing modules from third generation 3GPP architectures, a radio access plane, a mobility management module and a radio resource control module, said ad hoc type network being able to be organized into several groups- or clusters, a group corresponding to a grouping of radio resources for a given coverage area, and: a routing module arranged between the management module and the radio resource control module; a part of the mobility management being managed in the access plane in order to manage transfers, or handovers, between the groups, in the case of a network that is organized into groups of users or “clusterized”; the module manages handover decisions and radio resource management; said protocol stack additionally comprising, an L2RTP layer suitable for processing the radio-level regenerative relaying at the level of a data packet; a security plane for isolating security functions.08-08-2013
20120069773SELF ORGANIZING CELLULAR NETWORKS - This invention addresses a method of scanning and self organization that is programmed into the base station which then will automatically avoid mutual interference and move the use of radio channels from one base station to another to move network capacity to where it is needed through a process called “abandonment.03-22-2012
20120082063QUARANTINE DEVICE, QUARANTINE METHOD, AND COMPUTER-READABLE STORAGE MEDIUM - A quarantine device 04-05-2012
20130208624Link State Fast Flood with Computed Multi-Protocol-Label-Switching (MPLS) Broadcast Tree - A link state network comprising a plurality of interconnected nodes, and a multiprotocol label switching (MPLS) tree established amongst at least some of the interconnected nodes, wherein the MPLS tree is associated with an MPLS label, and wherein the interconnected nodes are configured to deterministically forward a plurality of link state update (LSU) packets comprising the MPLS label over the MPLS tree.08-15-2013
20130208625Persistent Principal Switch for Fibre Channel Fabric - According to one aspect, a Fibre Channel (FC) switch that is currently serving as a Principal Switch among a plurality of FC switches in a FC Fabric sends an Exchange Fabric Parameters (EFP) frame having an empty domain identifier list to neighboring FC switches during a first portion a Principal Switch Selection phase. During a second portion of the Principal Switch Selection phase that is after the first portion, the first Fibre Channel switch sends to neighboring FC switches an EFP frame having a non-empty domain identifier list to indicate to the neighboring FC switches that the first FC switch is to remain serving as the Principal Switch in the FC Fabric.08-15-2013
20130208626Method for Allowing One Device to Detect Another Device - The present invention provides, in one embodiment, a method for detecting another device performed by a first device having a converged personal network service (CPNS) enabled entity. The method for detecting another device comprises the steps of: performing a procedure for a physical connection with a second device, if the CPNS enabled entity within the first device is set to a personal network entity (PNE) mode; and receiving a search request message from the second device, in order to prevent the duplication of information between the CPNS enabled entity and the second device. Preferably, said search request message can be used to obtain one or more pieces of information, among the mode information of one or more devices detected while the procedure for the physical connection is performed and the information on a network to which one or more said detected devices belong. Said received search request message can include one or more pieces of information among the information on the mode of the second device and the information on the network to which the second device belongs.08-15-2013
20130208627FIRMWARE DOWNLOAD WITH ADAPTIVE LOST PACKET RECOVERY - Disclosed are methodologies for implementing a firmware download to endpoints in a mesh network. A firmware package is divided into a number of blocks, each block containing a number of packets and sent as a broadcast to endpoints in a wireless mesh network. A number of redundancy packets are sent to permit calculation of lost packets. A maximum number of redundancy packets to be sent is determined and a forward error correction code is developed depending on the maximum number of redundancy packets and the total number of firmware packets to be sent. A first block of redundancy packets, less than the maximum number, is sent followed by additional blocks of redundancy packets depending on reports from the receiving endpoints.08-15-2013

Patent applications in class Using a particular learning algorithm or technique

Patent applications in all subclasses Using a particular learning algorithm or technique