Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Connection identifier assignment

Subclass of:

370 - Multiplex communications

370351000 - PATHFINDING OR ROUTING

370389000 - Switching a message which includes an address header

370395100 - Message transmitted using fixed length packets (e.g., ATM cells)

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
370395310 Including routing table 87
Entries
DocumentTitleDate
20080291919Traffic Distribution and Bandwidth Management for Link Aggregation - An apparatus comprising a plurality of ingress ports, a routing logic coupled to the ingress ports, and a plurality of egress ports coupled to the routing logic, wherein the routing logic is configured to transport a plurality of data frames associated with a plurality of data flows from the ingress ports to the egress ports, and wherein the apparatus associates at least some of the data flows with a bandwidth. Included is a network component configured to implement a method comprising distributing a plurality of data flows to a plurality of links in a link aggregation group (LAG) using bandwidth information associated with the data flows.11-27-2008
20100074261PROVIDING ACCESS TO MULTIPLE DIFFERENT SERVICES BY WAY OF A SINGLE NETWORK IDENTIFIER - The claimed subject matter relates to an architecture that can facilitate access to a plurality of services or a plurality of Virtual Local Area Networks (VLANs) by way of a single Service Set Identifier (SSID). In particular, the architecture can receive a client credential that can be utilized to identify and/or authenticate a client. Based upon the identity, the service provisioned to that client can be selected. Accordingly, one client can access a first service (or VLAN) while another client can access a second service, even though both clients interact with the host network by way of a single SSID.03-25-2010
20100135304Method for applying macro-controls onto IP networks using intelligent route indexing - Systems and methods are described that manage routing information in an IP network using extensible indexing and use the indexing to control the network. The indexing and associated controls apply to any router within the routing domain.06-03-2010
20090304002SYSTEM FOR SHARING A NETWORK PORT OF A NETWORK INTERFACE INCLUDING A LINK FOR CONNECTION TO ANOTHER SHARED NETWORK INTERFACE - A system for sharing a network port of a network interface includes a plurality of processing units, a first network interface unit coupled to a first portion of the plurality of processing units, a second network interface unit coupled to a different portion of the plurality of processing units, and a link coupled between the first and second network interface units. The first and second network interface units each includes an independently controllable network port for connection to a network, and a virtual interface. The network port includes a shared MAC unit, a link interface, and control logic, which may selectably route packets between processing units of the first portion of the plurality of processing units and the network via the link and the network port of the second network interface unit. The virtual interface may include a plurality of independent programmable virtual MAC units.12-10-2009
20090232143METHODS AND APPARATUS FOR USING MULTIPLE CONNECTION IDENTIFIERS BASED ON TRAFFIC REQUIREMENTS - Methods and apparatus related to scheduling and/or utilization of air link traffic resources are described. A peer to peer connection holds a set of multiple connection identifiers for a plurality of successive traffic slots. Corresponding to a particular traffic slot, each of the connection identifiers in the set of connection identifiers has a different priority. Short term traffic needs are considered in the use of the multiple connection identifiers being held. For example, a communications device, corresponding to a peer to peer connection which is associated with a plurality of connection identifiers having different priorities, considers the amount and/or latency requirements of data to be transmitted at any given time when selecting which connection identifier to use when transmitting a traffic transmission request for a traffic segment which is in contention.09-17-2009
20090232142METHODS AND APPARATUS FOR USING CONNECTION IDENTIFIERS HAVING DIFFERENT PRIORITIES AT DIFFERENT TIMES - Methods and apparatus related to scheduling and/or utilization of air link traffic resources are described. A connection identifier is associated with priority with regard to use of an air link resource, e.g., a peer to peer traffic segment which is in contention. A particular connection may acquire and hold one or multiple connection identifiers. In some embodiments, the priority associated with a particular connection identifier is intentionally varied in a set of traffic slots. In some such embodiments, there is priority randomization from slot to slot. In one such implementation there is a statistically uniform average priority between the different connection identifiers over the recurring structure. Such an implementation facilitates access to traffic segments to a wide range of users, yet allows for differentiation with regard to the amount of access as a function of the number of connection identifiers being held by a particular connection.09-17-2009
20100085973METHODS AND APPARATUS FOR IDENTIFYING AND/OR SELECTING A CONNECTION IDENTIFIER - Wireless terminals in a peer to peer system, which desire to communicate traffic signals, acquire a connection identifier associated with traffic transmission request air link resources. The air link resources in the system, in some embodiments, are structured so that each connection identifier has a one to one mapping to a request transmission unit, the request transmission units are arranged into a plurality of groups, and each group occurs in a different symbol time interval for the same traffic slot. A wireless terminal identifies locally available connection identifiers from a set of connection identifiers based on power received on individual connection identification transmission units in a set of connection identification transmission units; determines, for each group having an identified locally available connection identifier, an interference estimate; and selects a connection identifier from the identified locally available connection identifiers belonging to a group having an acceptable determined interference estimate.04-08-2010
20090016353CODING METHODS OF COMMUNICATING IDENTIFIERS IN PEER DISCOVERY IN A PEER-TO-PEER NETWORK - Systems and methodologies are described that facilitate identifying peers based upon encoded signals during peer discovery in a peer to peer network. For example, direct signaling that partitions a time-frequency resource into a number of segments can be utilized to communicate an identifier within a peer discovery interval; thus, a particular segment selected for transmission can signal a portion of the identifier, while a remainder can be signaled based upon tones communicated within the selected segment. Moreover, a subset of symbols within the resource can be reserved (e.g., unused) to enable identifying and/or correcting timing offset. Further, signaling can be effectuated over a plurality of peer discovery intervals such that partial identifiers communicated during each of the peer discovery intervals can be linked (e.g., based upon overlapping bits and/or bloom filter information).01-15-2009
20080291918System for strategic management and communication of data in machine environments - A system for strategic management and communication of data in machine environments includes at least one communication module for communicating data with an off-board system, the communication module being disposed in a machine environment and adapted for use with one or more communication methods. The system also includes a data interpreter communicatively coupled to the at least one communication module. The data interpreter is configured to communicate operation data associated with a machine, the operation data including a plurality of operational aspects associated with at least a portion the machine. The data interpreter prioritizes each of the plurality of operational aspects in a communication queue associated with the data interpreter. The data interpreter is also configured to select a communication method for each of the plurality of operational aspects based on a priority associated with a respective operational aspect and transmit each of the operational aspects to the off-board system via the selected communication method.11-27-2008
20090316703MODEM SYSTEM AND METHOD - A modem and communication method between a wide area network (WAN) and a client device receives a communication data packet from the WAN or the client device, and removes a virtual local area network identification (VLAN ID) of the communication data packet in response to a determination that a VLAN ID of the communication data packet does not identify a local area network port of the modem. The modem and communication method further translates an IP address of the communication data packet having no VLAN ID, and transmits the translated communication data packet to the client device or the WAN using a network access translation port of the modem. Furthermore, the modem and communication method transmits the communication data packet containing the VLAN ID to the client device or the WAN using the LAN port.12-24-2009
20080240109SYSTEM AND METHOD FOR IMPLEMENTING QUALITY OF SERVICE FALLBACK USING RESOURCE RESERVATION PROTOCOL - A system and method for implementing a Quality of Service (QoS) fallback using Resource Reservation Protocol (RSVP) includes initiating a communication session with a QoS precondition between a first domain and a second domain. It is determined whether the second domain supports the QoS precondition. Intra-domain RSVP is established in the first domain if the second domain does not support the QoS precondition.10-02-2008
20100142535Building Control System - A method of operating a building control system includes installing a plurality of network devices to a communications network. Each of the plurality of network devices performs a device operation. The method also includes assigning an identifier to each of the plurality of network devices. The identifier is based on the device operation and a device location. The method further includes communicating information and coordinating operations automatically among the plurality of network devices based on the identifier.06-10-2010
20090185566NETWORK NODE, FRAME TRANSFER PROGRAM AND FRAME TRANSFER METHOD - A network node including an FDB for registering a relationship between a destination MAC address and a port label, an input port table for registering a relationship between an input port and a port label, and a port label table for registering a relationship between a port label and an output port, at the reception of a frame, registers a relationship between a transmission source MAC address of a frame and a port label registered for an input port in the input port table at the FDB, at the time of transmission of a frame, transmits the frame to an output port registered at the port label table which port corresponds to a port label registered for the destination MAC address in the FDB and at the time of processing of flushing or updating the FDB unit, changes the contents of the input port table and the port label table.07-23-2009
20090185567Apparatus and method for managing connection identifier in a communication system - An apparatus and method for managing a Connection IDentifier (CID) in a communication system are provided. The method includes mapping a different index to at least one CID allocated by a base station (BS) and, if simultaneously transmitting packets for at least two CIDs, indexing a CID for packet transport by an index mapped to each CID and simultaneously transmitting packets for at least two CIDs.07-23-2009
20100002705RELAY APPARATUS, CONDUCTION CONFIRMATION METHOD THEREOF AND CONDUCTION CONFIRMATION CIRCUIT - The relay apparatus relays frames in which a plurality of network identifiers are set and comprises a frame determining unit, a converting unit, and a sending unit. The frame determining unit determines whether a frame received at a communication port is a specific frame or not. The converting unit converts, when it is determined that the received frame is a specific frame and when the communication port is a blocking port, a network identifier set in the specific frame to another network identifier among the plurality of network identifiers. The sending unit sends the specific frame, the network identifier of which has been converted by the conversion unit, from a port opposing the communication port.01-07-2010
20090219938Systems and Methods For Multi-Layer Interworking - Systems, modules, computer-readable mediums and methods for multi-layer interworking are provided. An identified traffic path is selected from one or more traffic paths. The identified traffic path is selected based on information indicative of traffic path parameter information associated with the identified traffic path relative to traffic path parameter information associated with the other traffic paths. A transport trail is identified from one or more transport trails. Whether the identified transport trail from one or more transport trails is suitable for assignment is determined. The determination is made based on information indicative of the transport trail parameter information associated with the identified transport trail relative to transport trail parameter information associated with the other transport trails. The selected identified traffic path is assigned to the identified transport trail if the identified transport trail is determined to be suitable for assignment.09-03-2009
20080259931METHOD AND APPARATUS FOR RESERVING NETWORK RESOURCES FOR PSEUDO POINT-TO-POINT CONNECTIONS - The present invention relates to a method and apparatus for reserving network resources for pseudo point-to-point connections by means of an idempotent resource reservation protocol.10-23-2008
20090116493METHOD AND APPARATUS FOR ETHERNET TO BEAR ATM CELLS - A method for an Ethernet to bear ATM cells includes: mapping the ATM virtual connection information in the first ATM cell received from the ATM network to an Interworking Identifier (IW ID); combining the IW ID and the cell payload of the first ATM cell into an Ethernet frame; and transmitting the Ethernet frame in an Ethernet network. An apparatus for an Ethernet to bear ATM cells is also disclosed. The embodiments of the present invention implement network interworking on the data link layer (layer 2) and enable an ATM network to perform ATM emulation in a metropolitan area Ethernet (MEN) independently of the upper-layer protocol, thus facilitating the user.05-07-2009
20090316702Method and system for managing a network having multiple domains - Exemplary embodiments are directed to a system and method for managing a network having multiple domains. An exemplary method includes identifying a router interface connected with a switch; assigning a Layer 2 identifier to the interface, wherein the identifier uniquely identifies a Layer 2 domain within the network; and assigning the Layer 2 identifier to the switch.12-24-2009
20090041024Supporting a Transmission and a Reception of Data Packets - In order to enable a more efficient use of an available transmission capacity, a transmitting device (02-12-2009
20090041023Method and Apparatus for Interworking VPLS and Ethernet Networks - To allow seamless interworking between an 802.1ah service instance (ISID) and a VPLS service instance, the AGI value used to signal the setup of the pseudowire portion of the VPLS may carry the ISID value of an associated 802.1ah service instance. This allows the service instance to be identified end-to-end across the Ethernet and VPLS networks using the same value without modifying how the MPLS network operates. The VPLS network will use AGI/AII signaling to set up pseudowires on the MPLS network, but instead of using an AGI value assigned by the MPLS network, the AGI value that is assigned will be taken from the ISID value of the Ethernet frame or from ISIDs registered by the Ethernet network. The AGI message may be given a new type value indicating that the AGI message carries a value that corresponds to the ISID value on an attached Ethernet network. Alternatively, an existing AGI message type may be used to carry the ISID value, and a second type field may be used to indicate that the AGI contains an ISID value.02-12-2009
20100014523Providing Point To Point Communications Among Compute Nodes In A Global Combining Network Of A Parallel Computer - Methods, apparatus, and products are disclosed for providing point to point data communications among compute nodes in a global combining network of a parallel computer that include: determining a class route identifier available for all of the nodes along a communications path from an origin node to a target node; configuring network hardware of each node along the communications path with routing instructions in dependence upon the available class route identifier and the network's topology; transmitting, by the origin node along the communications path, a network packet to the target node, including encoding the available class route identifier in the network packet; and routing, by the network hardware of each node along the communications path, the network packet to the target node in dependence upon the routing instructions for each node and the available class route identifier.01-21-2010
20110069710Switching Method - A method for providing identifiers for virtual devices in a network. The method comprises receiving a discovery data packet directed to a physical network node associated with a physical endpoint device. A response to the discovery data packet directed to a physical network node is provided, the response comprising an identifier of a virtual device. At least one further discovery data packet directed at least to said virtual device is received. A response to a first one of the further discovery data packets is provided, the response comprising an identifier of a virtual endpoint device. At least some functionality of the virtual endpoint device is provided by the physical endpoint device.03-24-2011
20080253377System and method for controlling process end-point utilizing legacy end-point system - Embodiments in accordance with the present invention allow a second end-point determination (EPD) system to actively control the end-pointing of a semiconductor process chamber, by leveraging a legacy EPD system that is already integrated with the chamber. In one embodiment, the second EPD system controls a shutter that regulates the amount of light transmitted between a plasma light source and an optical emission spectroscopy (OES) sensor of the legacy OES EPD system. In this embodiment, the legacy OES EPD system is pre-configured to call end-point when an artificial end-point condition occurs, i.e. the intensity of light falls below a pre-set threshold. When the second EPD system determines an actual end-point condition has been reached, it closes the shutter which, causes the light intensity being read by the OES sensor to fall below the pre-set threshold. This in turn triggers an end-point command to the chamber from the legacy OES EPD system.10-16-2008
20100183014METHODS AND DEVICES FOR PACKET TAGGING USING IP INDEXING VIA DYNAMIC-LENGTH PREFIX CODE - Methods including the steps of: upon sending an IP packet, obtaining, by a sender, a sender identity for a sender of the packet; securely tagging, by a sender, the packet with the sender identity, the packet having a plurality of fixed-length fields concatenated into a single fixed-length virtual field shared between a cryptographic hash and an identity index for supporting multiple distinct identities residing on an IP endpoint; determining, by a receiver, the sender identity by extracting it from the packet; checking, by the receiver, the packet to ensure the packet has been appropriately tagged; and enforcing a security policy, by the receiver, according to the sender identity. Preferably, the step of obtaining includes: accessing, by the sender, a server for obtaining the sender identity; and associating, by the server, the sender identity with the endpoint. Most preferably, the associating is performed using a prefix code for encoding the identities.07-22-2010
20090135831Apparatus and Program Product for Obtaining Multiple Port Addresses by a Fibre Channel from a Network Fabric - Apparatus and program product for assigning or confirming multiple address identifications to a single channel adapter. A server contains multiple partitions connected to a single channel adapter which is used to send data and commands to a fabric. A request is sent to the fabric on behalf of each of the partitions, and the fabric assigns or confirms and returns to the adapter, an address identification associated to each partition on whose behalf the request was sent. The assigned or confirmed address is used to communicate between controllers connected to the fabric and the associated partition through the same channel adapter.05-28-2009
20080317036Secure Communications Within and Between Personal Area Networks by Using Private and Public Identifiers - A Personal Area Network Security Domain (PSD) (12-25-2008
20120287936EFFICIENT SOFTWARE-BASED PRIVATE VLAN SOLUTION FOR DISTRIBUTED VIRTUAL SWITCHES - Packet processing logic of a host system's virtualization manager detects packets on the ingress or the egress path to/from a virtual port having three bitmap arrays for processing packets within a virtual local area network (VLAN). The logic checks the VLAN identifier (VID) of the packet to determine, based on an offset position within the corresponding bitmap array, whether the port supports the VLAN. Both the ingress array offset position and egress array offset positions correspond to the value of the VID, and are set within the specific bitmap array during configuration of the VLAN on the port. When the VLAN is supported by the port, the logic enables the packet to be processed by the port. Otherwise, the logic discards the packet. A strip bitmap array indicates when a packet's VID should be removed prior to forwarding the packet on the egress of a port (or destination port).11-15-2012
20080232376CONTROL METHOD, SYSTEM AND FUNCTION ENTITY FOR REPORTING BEARER EVENT OF SIGNALING IP FLOW - A control method, system and function entity for reporting a bearer event of a signaling IP flow are provided. A 5-tuple is generated for a signaling IP flow and a media IP flow so as to unify a mechanism for reporting a signaling path status and a mechanism for reporting a bearer event of a media IP flow, so that the mechanism for reporting a signaling path status is not limited by the parameter of Flow Usage, the PDP context with a signaling tag, thereby establishing corresponding PCC rules for signaling and the association between a signaling IP flow and a bearer. A method for reporting a signaling path status is further provided in the invention. In the method, for a default PDP context or a PDP context of a signaling IP flow, the predefined PCC rules are activated or signaling PCC rules generated in accordance with an Application Function address are installed, thereby an IP signaling path status is reported in accordance with rule names of the predefine PCC rules or the signaling PCC rules.09-25-2008
20080225856NETWORK CONNECTION APPARATUS - In a network connection apparatus having a LLDP function, a comparison processing unit compares a local chassis ID/port ID of its own apparatus with a remote chassis ID/port ID of a neighboring apparatus. When the comparison processing unit detects a coincidence between the local chassis ID/port ID and the remote chassis ID/port ID, a display unit displays an overlapped state between the local chassis ID/port ID and the remote chassis ID/port ID.09-18-2008
20080198856Systems and methods for modifying network map attributes - The disclosed systems and methods provide a user interface for modifying host configuration data that has been automatically and passively determined and for adding or modifying other parameters associated with a host. A host data table can store various parameters descriptive of a host including the applicability of specific vulnerabilities. If it is determined that one or more hosts should not be identified as associated with a specific vulnerability, a graphical user interface can be used to modify the vulnerability parameter.08-21-2008

Patent applications in class Connection identifier assignment

Patent applications in all subclasses Connection identifier assignment