38th week of 2008 patent applcation highlights part 30 |
Patent application number | Title | Published |
20080225668 | INFORMATION RECORDING MEDIUM, RECORDING APPARATUS, REPRODUCTION APPARATUS, RECORDING METHOD, AND REPRODUCTION METHOD - An information recording medium is provided, which comprises a plurality of recording layers and a first disc information area for storing parameters relating to access to the plurality of recording layers and formats relating to the plurality of recording layers. The first disc information area is provided in a first recording layer which is one of the plurality of recording layers. | 2008-09-18 |
20080225669 | Method of Checking the Cleanness Status of a Refractive Element and Optical Scanning Apparatus of Th Enear Field Type - A method of checking the cleanness status of an optical exit face of a refractive element of an optical scanning apparatus of the near field type, the method comprising step of generating a near field control signal proportional to ratio between the intensity of an optical radiation beam that is internally reflected from the optical exit face of the refractive element and the intensity of a corresponding incident optical radiation beam; measuring the near field control signal when the optical exit face of the refractive element is further away from an optical disc than a near field distance; comparing the measured near field control signal with a predetermined threshold value; deciding the refractive element is clean if the measured near field control signal is above the predetermined threshold value. | 2008-09-18 |
20080225670 | OPTICAL PICKUP, OPTICAL INFORMATION RECORDING APPARATUS AND OPTICAL INFORMATION RECORDING AND REPRODUCING APPARATUS USING THE OPTICAL PICKUP - In holographic recording, it is important to form stably an interference fringe between a reference beam and a signal beam in a holographic storage medium. To suppress factors degrading stability of the interference fringe, such as fluctuation of atmospheric air, position displacement of optical components and the like during propagation of the reference and signal beams, an optical pickup and an optical information recording/reproducing apparatus adopt an optical system structure providing a higher proportion of optical components shared by the reference and signal beams optical path than conventional optical system structure. To increase the proportion of shared optical components, the signal beam and the reference beam pass through the PBS prism as parallel beams and a concave lens is placed on a reference beam path just before the objective lens. | 2008-09-18 |
20080225671 | Method and storage medium for calibrating a holographic storage system - Method for calibrating a holographic storage system The present invention relates to a method for calibrating a holographic storage system, and to an apparatus for reading from and/or writing to holographic storage media and a holographic storage medium suitable for such method. According to the invention, the method has the steps of:
| 2008-09-18 |
20080225672 | Methods For Manufacturing Volume Bragg Grating Elements - Methods for recording volume Bragg grating structures having a target wavelength are disclosed. Such a method may include providing a photosensitive recording medium, bringing a first face of the recording medium into contact with a face of a prism, the prism being made of a material that is transparent at a recording wavelength, and recording a Bragg grating onto the recording medium by exposing the prism to an incident light wave at the recording wavelength. | 2008-09-18 |
20080225673 | Information recording device and head - In a magnetic recording device, a semiconductor laser (LD) is disposed at a position with a predetermined distance from a swing arm having a slider. The laser beam output from the LD is irradiated, via a beam converter and a mirror, to a spherical aberration lens that generates spherical aberration. The laser beam transmitted through the spherical aberration lens is directed to a light incident opening of the slider at a constant angle (perpendicularly), and then to a position of a recording medium at which information is recorded, thereby performing thermal assist at the magnetic recording time. | 2008-09-18 |
20080225674 | OPTICAL DISC APPARATUS AND METHOD FOR CONTROLLING THE SAME - An optical disc apparatus capable of obtaining an effect to reduce the laser noise without shortening the laser diode service life or increasing the power consumption. The optical disc apparatus includes a laser diode for emitting a laser beam, a laser driver for driving the laser diode, a detector for monitoring a first power emitted from the laser diode, a detector for monitoring a second power applied to an optical disc, and an attenuator for attenuating the first power. The light attenuation factor of the attenuator is changed by the ratio between the first power and the second power. | 2008-09-18 |
20080225675 | Optical disk apparatus - An optical disk apparatus includes: a semiconductor laser which emits laser light; a focusing unit which focuses the laser light emitted from the semiconductor laser onto an optical disk; a detector which receives reflected light from the optical disk; a drive unit which rotates the optical disk; and a control unit which controls the semiconductor laser and the drive unit. When the optical disk is reproduced, the control unit causes the semiconductor laser to emit the laser light by a first power realizing a relative intensity noise tolerable for the reproduction of the optical disk. And the control unit causes the drive unit to rotate the optical disk at a first linear velocity which is free from reproduction light deterioration when the semiconductor laser emits the laser light by the first power. | 2008-09-18 |
20080225676 | Data storage device and control - The present invention provides data storage devices, systems and methods. An example device includes: a storage medium for storing data in the form of marks; and at least one probe. The probe(s) and storage medium are operable to move relative to each other, with each probe comprising a tip facing the storage medium and having a force creating unit associated thereto. The force creating units are operable to create a force acting between the tip and said storage medium. The data storage device is operable to erase an indentation mark in the storage medium by way of controlling the force creating unit for creating at least one erase force pulse with a force rise time being less than or equal to the order of 1 microsecond. | 2008-09-18 |
20080225677 | Storage device having flexible architecture and free scalability - A storage device according to the invention has flexible architecture and free scalability. It includes an address input and a data input. It also includes an address and data evaluation unit, which is formed in such a way that it controls a controllable switching means, wherein in operation the address and data evaluation unit depends on the signals of said address and data inputs. Finally, a read/write line for a read/write signal is provided, which can be applied to a local probe data storage unit via the controllable switching means. | 2008-09-18 |
20080225678 | FERROELECTRIC RECORDING MEDIUM AND WRITING METHOD FOR THE SAME - A ferroelectric recording medium and a writing method for the same are provided. The ferroelectric recording medium includes a ferroelectric layer which reverses its polarization when receiving a predetermined coercive voltage. A nonvolatile anisotrophic conduction layer is formed on the ferroelectric layer. A resistance of the anisotrophic conduction layer decreases when receiving a first voltage lower than the coercive voltage, and the resistance of the anisotrophic conduction layer increases when receiving a second voltage higher than the coercive voltage. Multi-bit information is stored by a combination of polarization states of the ferroelectric layer and the resistance of the anisotrophic conduction layer. Accordingly, multiple bits can be expressed on one domain of the ferroelectric recording medium. | 2008-09-18 |
20080225679 | Data Read/Write Systems Comprising A Tip - A method for writing data to and/or reading data from locations on a surface via a tip comprises moving the tip between the locations on the surface. At each location, energy is selectively applied to the surface via the tip and the tip and the surface are selectively forced together in synchronization with the application of energy. | 2008-09-18 |
20080225680 | DATA REPRODUCTION APPARATUS AND DATA REPRODUCTION METHOD - A data reproduction apparatus includes: arithmetic means for calculating difference data that indicate a difference between left-channel and right-channel data that have been compressed in a predetermined compression format; higher harmonic component generation means for generating a higher harmonic component, which was lost during compression, by performing, when the difference data's signal level exceeds a predetermined threshold, a digital limiter process that suppresses the signal level to the threshold; and adding means for adding the higher harmonic component to the left-channel and right-channel data to reproduce original data before being compressed. | 2008-09-18 |
20080225681 | OPTICAL RECORDING MEDIUM - According to an aspect of the present invention, there is provided an optical recording medium including a first substrate, a first adjusting layer, an organic recording layer, a second adjusting layer and a second substrate, sequentially stacked in the mentioned order. The first and second substrates have a refractive index of n | 2008-09-18 |
20080225682 | WOBBLE INFORMATION RECORDING METHOD, INFORMATION RECORDING MEDIUM, AND RECORDING AND REPRODUCTION METHOD AND APPARATUS THEREOF - An optical disk and a method for identifying the optical disk are provided which make it possible to identify a recording system of the optical disk easily in a short time by a recording and reproduction apparatus when a groove-recording system and a land-recording system are both employed in one kind of optical disk, for, example, a BD-R. Specifically, the polarity upon reproducing the wobble information is made to be the same in both of the optical disk of groove-recording system and the optical disk of land- recording system. The recording system of the optical disk that shows the same wobble polarity irrespective of the recording system can be easily detected by finding a tracking polarity that can recognize the wobble information by changing the tracking polarity, whereby the start-up time of the recording and reproduction apparatus can be shortened. | 2008-09-18 |
20080225683 | INFORMATION RECORDING MEDIUM, INTEGRATED CIRCUIT, RECORDING/PLAYBACK APPARATUS, COMPUTER PROGRAM, AND INFORMATION RECORDING/PLAYBACK METHOD - An optical disk | 2008-09-18 |
20080225684 | INFORMATION RECORDING MEDIUM, INTEGRATED CIRCUIT, RECORDING/PLAYBACK APPARATUS, COMPUTER PROGRAM, AND INFORMATION RECORDING/PLAYBACK METHOD - An optical disk | 2008-09-18 |
20080225685 | INFORMATION RECORDING MEDIUM, INTEGRATED CIRCUIT, RECORDING/PLAYBACK APPARATUS, COMPUTER PROGRAM, AND INFORMATION RECORDING/PLAYBACK METHOD - An optical disk | 2008-09-18 |
20080225686 | INFORMATION RECORDING MEDIUM, INTEGRATED CIRCUIT, RECORDING/PLAYBACK APPARATUS, COMPUTER PROGRAM, AND INFORMATION RECORDING/PLAYBACK METHOD - An optical disk | 2008-09-18 |
20080225687 | MULTI-DOMAIN NETWORK WITH CENTRALIZED MANAGEMENT - One embodiment relates to a method for coordinating signals within a multi-domain network. At least one node within one network domain of the multi-domain network is identified, where the one node is affected by interference due to another node of another network domain of the multi-domain network. Global signals are provided to the one network domain to coordinate domain signals within that network domain to limit the interference from the another node. Other systems and methods are also disclosed. | 2008-09-18 |
20080225688 | SYSTEMS AND METHODS FOR IMPROVING REFERENCE SIGNALS FOR SPATIALLY MULTIPLEXED CELLULAR SYSTEMS - A method for using a numerical method to design reference signals for multiple input multiple output (MIMO) systems is described. An input multiple input multiple output signal is determined. A nearest tight frame to one or more given structured vectors is obtained. One or more structured vectors from the nearest tight frame are obtained. The one or more structured vectors are projected onto the space of circulant matrices. One or more classes of matrices associated with reference signals are outputted. | 2008-09-18 |
20080225689 | Orthogonal frequency division multiplexing having tones with overlaid data and pilot symbols - In one embodiment, an OFDM transmitter generates sets of frequency-domain data symbols from a stream of digital data. For each set of frequency-domain data symbols generated, the transmitter generates a corresponding set of frequency-domain pilot symbols. Each corresponding set of data symbols and pilot symbols are then multiplexed onto a set of frequency tones, such that, at least one tone is occupied by both a data symbol and a pilot symbol. For each tone having both a pilot symbol and data symbol, the pilot symbol and data symbol are added together to form an overlaid data and pilot (ODP) tone. Each set of tones having at least one ODP tone is then transmitted to an inverse fast Fourier transform (IFFT) processor that transforms each set of tones into an ODP OFDM symbol. Each ODP OFDM symbol is then prepared for transmission using digital-to-analog conversion, cyclic prefix insertion, and RF modulation. | 2008-09-18 |
20080225690 | SYSTEMS AND METHOD FOR ORTHOGONAL FREQUENCY DIVISIONAL MULTIPLEXING - Systems and methods for orthogonal frequency division multiplexing are provided. In one embodiment, a multi-carrier modem comprises: a receiver configured to receive a waveform comprising spectrally overlapping carrier signals from at least two of a plurality of remotes, wherein the spectrally overlapping carrier signals are modulated using an inverse Fourier transform algorithm; a transmitter; a processor coupled to the transmitter, wherein the processor outputs data for transmission by the transmitter, wherein the processor applies an inverse Fourier transform algorithm to the data provided to the transmitter; a controller programmed to calculate an elapsed time for each of the two remotes, the elapsed time representing a time between transmitting a ranging signal to a remote and receiving a signal from the remote in response to the ranging signal; the controller further programmed to reducing any difference between at least two elapsed times by instructing at least one of the plurality of remotes to adjust a delay. | 2008-09-18 |
20080225691 | SYSTEMS AND METHOD FOR ORTHOGONAL FREQUENCY DIVISIONAL MULTIPLEXING - Systems and methods for orthogonal frequency division multiplexing are provided. In one embodiment, a multi-carrier modem comprises: a receiver configured to receive a waveform comprising a plurality of spectrally overlapping carrier signals from at least two of a plurality of remotes, the carrier signals are modulated using an inverse Fourier transform; a transmitter; a processor coupled to the transmitter, the processor outputs data for transmission to the transmitter, the processor applies an inverse Fourier transform to the data provided to the transmitter; a controller programmed to instruct the transmitter to transmit timing adjustments to the at least two of the plurality of remotes, the timing adjustments instruct the at least two of the plurality of remotes to adjust transmission timing so that transmitted symbols associated with frames of a predetermined multiframe structure are received in sequence from the at least two of the plurality of remotes based on the structure. | 2008-09-18 |
20080225692 | SYSTEMS AND METHOD FOR ORTHOGONAL FREQUENCY DIVISIONAL MULTIPLEXING - Systems and methods for orthogonal frequency division multiplexing are provided. In one embodiment, a multi-carrier modem comprises:a receiver configured to de-modulate symbols from at least one of a plurality of spectrally overlapping carrier signals; a transmitter configured to modulate symbols onto at least one of a plurality of the spectrally overlapping carrier signals; a processor coupled to the transmitter, wherein the processor outputs data for transmission by the transmitter, wherein the processor applies an inverse Fourier transform to the data transmitted by the transmitter; the processor programmed to encode upstream information using a forward error correction algorithm based on forward error correction parameters received by the receiver. | 2008-09-18 |
20080225693 | METHOD AND APPARATUS FOR UPLINK SCHEDULING SIGNALING IN A WIRELESS COMMUNICATION - A method and apparatus for efficient uplink scheduling grant and scheduling request signaling for evolved universal terrestrial radio access (E-UTRA) are disclosed. A wireless transmit/receive unit sends an uplink scheduling request to a Node-B, whereby the Node-B sends the uplink scheduling grant in response to the uplink scheduling request. The uplink scheduling request includes a data buffer occupancy value that indicates the amount of data that needs to be transmitted in the uplink. The amount of data is quantized to integer factors of the number of bits that may be supported by one RB, and mapped to an index value with N-bit mapping having less than full resolution. The uplink scheduling grant assigns a number of resource blocks to the WTRU for uplink transmission. The number of RBs allocated is mapped to an index value using N-bit mapping having less than full resolution. | 2008-09-18 |
20080225694 | METHOD AND APPARATUS FOR ID IDENTIFICATION USING PN FOR TDS-OFDM IN TRANSMISSION - In an OFDM system having PN sequences as guard intervals, a method is used for synchronization. The method comprises the steps of: providing a plurality of base stations; providing a plurality of mobile stations; both the base stations and the mobile stations are adapted to transmit and receive signals associated with a parameter using the PN sequences for synchronization. | 2008-09-18 |
20080225695 | FAILURE PROTECTION IN A PROVIDER BACKBONE BRIDGE NETWORK USING FORCED MAC FLUSHING - A technique for operating a network involves controlling the black-holing of traffic by forcing customer source MAC address (CMAC)-to-backbone source MAC address (BMAC) associations at provider backbone bridge (PBB) provider edge (PE) devices to be flushed from their corresponding forwarding information bases (FIBs) in response to a service failure so that new CMAC-to-BMAC associations, which are reflective of a secondary traffic path, are learned faster than they would otherwise be learned if the network had relied on native functionality to learn new CMAC-to-BMAC associations that are reflective of the secondary traffic path. | 2008-09-18 |
20080225696 | VIRTUAL PATH RESTORATION SCHEME USING FAST DYNAMIC MESH RESTORATION IN AN OPTICAL NETWORK - A method for restoring a virtual path, provisioned between a source and a target node, in a mesh zoned optical network is described. The method, in one embodiment, broadcasts or floods restore path requests in the network to expedite the identification of an alternate route and minimize the service disruption for failed virtual path. The flooding of requests is controlled to ensure efficient performance of the network yet guaranteeing minimum restoration time to allow critical telecommunication related traffic to flow through the network with virtually no interruption. The constant update of nodal topology by each node allows a fast identification of alternate physical path for failed virtual path. | 2008-09-18 |
20080225697 | Computing repair path information - An apparatus and method is described for computing repair path information around a failure component in a data communications network having a components nodes and links therebetween. Where, according to a routing protocol, a node sends to a neighbor node a metric indicative of reachability of a destination node, the protocol requiring differentiated action by the node if the route to the destination node includes the neighbor node, the apparatus is arranged to compute a repair path to the destination node via candidate nodes comprising only neighbor nodes to the apparatus not requiring differentiated action relative to the apparatus. | 2008-09-18 |
20080225698 | Controlling multicast source selection in an anycast source audio/video network - Particular embodiments of the disclosed subject matter provide methods and systems to support a multicast source selection system. In an example embodiment, the system includes a network element in data communication with a network, the network element being operable to: receive a request for withdrawal of a server as a source of a multicast data stream; and propagate information to the network indicating withdrawal of the server as a source of the multicast data stream, the propagation of information by the network element being responsive to the request for withdrawal of the server as a source of the multicast data stream. | 2008-09-18 |
20080225699 | Router and method of supporting nonstop packet forwarding on system redundant network - A router (i.e., an electrical circuit) and method of supporting nonstop packet forwarding on a system redundant network are provided. The method includes, when the router again operates, identifying whether or not the router is connected with a neighboring router; and when the router is identified connected with the neighboring router, transmitting a link-up signal to a link to connect to a host node. | 2008-09-18 |
20080225700 | Protocol Definition for Software Bridge Failover - A method, data processing system, and computer usable code are provided for protocol definition for software bridge failover. In a first aspect of the present invention, a first software bridge determines the proper working operation of a physical adapter. Limbo packets are sent to a second software bridge alerting the second software bridge that the first software bridge is no longer bridging traffic responsive to the physical adapter failure in the first software bridge. The second software bridge receives the limbo packets, and, in response to receiving the limbo packets, asserts primary control and initiates bridging of traffic. In an alternative aspect of the present invention a first software bridge sends keep-alive packets. A second software bridge monitors the keep-alive packets from the first software bridge and, in response to a failure to detect the keep-alive packets from the first software bridge, the second software bridge initiates bridging of traffic. | 2008-09-18 |
20080225701 | ELECTRONICS APPARATUS, A MANAGEMENT DEVICE FOR AN ELECTRONICS APPARATUS AND A METHOD OF MANAGING AN ELECTRONICS APPARATUS - An electronics apparatus comprises an electronic device having at least first and second ports in communication with respective first and second communication paths by each of which communications can be made with the electronic device. The electronics apparatus comprises a management device arranged to collect information concerning the performance of the first and second ports and to apply a decision threshold to said information to decide whether or not each port has failed. If said decision is that the first port has failed, the management device is arranged to disable communication over the first communication path and to adjust the decision threshold for the second port. | 2008-09-18 |
20080225702 | SYSTEM AND PROGRAM PRODUCT TO RECOVER FROM NODE FAILURE/RECOVERY INCIDENTS IN DISTRIBUTED SYSTEMS IN WHICH NOTIFICATION DOES NOT OCCUR - Epoch numbers are maintained in a pair wise fashion at a plurality of communication endpoints to provide communication consistency and recovery from a range of failure conditions including total or partial node failure and subsequent recovery. Once an epoch state inconsistency is recognized, negotiation procedures provide an effective mechanism to reestablish valid communication links without the need to employ global variables which inherently possess greater transmission and overhead requirements needed to maintain communications. Renegotiation of recognizably valid epoch numbers occurs on a pair wise basis. | 2008-09-18 |
20080225703 | CONGESTION REDUCING RELIABLE TRANSPORT PACKET RETRY ENGINE - A method, apparatus and computer readable medium for transmitting at least one packet across a network destined for reception by at least one network endpoint. A plurality of packets is processed sequentially from a queue to be sent to at least one network endpoint. At least a first packet from the plurality of packets is transmitted to the network endpoint. The at least first packet transmitted to the network endpoint is determined to not have been acknowledged. A first retry packet associated with the at least first packet is transmitted to the at least one network endpoint. Transmission of packets other than the first retry packet is suspended to the network endpoint. The first retry packet is determined to have been acknowledged by the at least one network endpoint. Transmission of remaining packets in the plurality of packets to the at least one network endpoint is resumed. | 2008-09-18 |
20080225704 | PROBES FOR PREDICTIVE DETERMINATION OF CONGESTION BASED ON REMARKING/DOWNGRADING OF PACKETS - In one embodiment, a technique for detecting the re-marking of a parameter in a network packet is provided. The technique involves sending a request packet that contains a first value of a type of service parameter effecting how the packet is to be handled relative to other packets and receiving a response packet to the request packet, the response packet containing an indication of a second value of the type of service parameter in the request packet as received by a network device that sent the response packet. The first and second values of the type of service parameter are compared. A determination that the request packet was re-marked is made if the first and second values of the type of service parameter do not match. | 2008-09-18 |
20080225705 | Monitoring, Controlling, And Preventing Traffic Congestion Between Processors - A system for monitoring congestion at processors includes queues and a congestion monitor. The queues receive packets, and each queue is associated with a processor. For each queue, the congestion monitor establishes whether a time-averaged occupancy of a queue exceeds a time-averaged occupancy threshold. The congestion monitor provides a notification if the time-averaged occupancy exceeds the time-averaged occupancy threshold. | 2008-09-18 |
20080225706 | Under-assigning resources to video in triple-play virtual topologies to protect data-class traffic - A method for video-on-demand (VoD) admission control at a network edge assigns to a triple-play network virtual topology lesser resources than there exists in a corresponding underlying physical link bandwidth. This prevents video-on-demand (VoD) starvation of data-class traffic. At least one policy enforcement point (PEP) is attached to an edge of the network, providing for autonomous short-term, application-aware controls to be applied to corresponding network ingress traffic, and also providing for long-term controls on corresponding network ingress traffic. The network ingress traffic to the network comes under management when the traffic nears or exceeds network capacity. It is enabled to do so by computations of current network routing topology and bandwidth reservations. Path tables are used to calculate if a PEP may admit more, or must shed, sessions/calls to maintain service for other existing application traffic. The PEP and a session/call admission controller (S/CAC) may be independently located within the topology of the network, and together implement admission controls that differentiate between triple-play video, voice, and data traffic classes. | 2008-09-18 |
20080225707 | Advanced bandwidth management audit functions - An auditing function detects and corrects reservation and routing topology map errors by monitoring the operation of an advanced bandwidth manager (ABM). A session/call admission controller (S/CAC) attached to a network manages loading with policy enforcement points (PEP's) when the network nears or exceeds its capacity. Ever-changing network topology information is monitored, modeled, and analyzed from remote listeners. A correct model of how traffic is being routed through various parts of the network is critical to admission control. The PEP's at the network edges provide short-term, application-aware controls on their own that are applied to the corresponding network ingress traffic. The S/CAC uses the path tables to calculate whether particular PEP's can admit more traffic, or should they shed sessions/calls to keep service up for the existing application traffic. Long-term controls are periodically downloaded as admission tables from the S/CAC to the PEP's. | 2008-09-18 |
20080225708 | Application-aware policy enforcement - An application-aware policy enforcement point (PEP) attaches to the edge of a packet-switched network to manage loading when the network nears or exceeds its capacity due to changes in the network, e.g., component failures or incremental growth. An advanced bandwidth manager (ABM) comprises a session/call admission controller (S/CAC) that monitors and maps ever-changing network topology information gathered from remote listeners about how traffic is being routed through various parts of the network. These reports are harmonized to build a single view of the network topology, and the point-to-point connections are abstracted into path tables. Autonomous PEP's at the network's edges provide short-term, application-aware controls on their own that are applied to the corresponding network ingress traffic. The S/CAC uses the path tables to calculate whether particular PEP's can admit more traffic, or should they shed sessions/calls to keep service up for the existing application traffic. Long-term controls are periodically downloaded as admission tables from the S/CAC to the PEP's. | 2008-09-18 |
20080225709 | Advanced bandwidth management - An advanced bandwidth manager (ABM) comprises a session/call admission controller (S/CAC) to manage network ingress traffic when a packet-switched network nears or exceeds its capacity due to changes in the network, e.g., component failures or incremental growth. Ever-changing network topology information is gathered from remote listeners about how traffic is being routed through various parts of the network. These reports are harmonized to build a single view of the network topology, and the point-to-point connections are abstracted into path tables. Autonomous policy enforcement points (PEP's) provide short-term, application-aware controls on their own that are applied to the corresponding network ingress traffic. The S/CAC uses the path tables constructed to calculate whether the PEP's can admit more or should shed sessions/calls to keep service up for all existing application traffic. Long-term controls are periodically downloaded as admission tables from the S/CAC to the PEP's. | 2008-09-18 |
20080225710 | Systems and Methods for Load Balancing Based on User Selected Metrics - The present invention provides improvements to load balancing by providing a load balancing solution that allows a user to select metrics, weights and thresholds from metrics collected or determined by a load balancing appliance as well as metrics obtained from another device, such as a server running the service. The systems and methods described providing a load balancing technique in which load balancing decisions can be made based on metrics known by another device monitoring such metrics. The load balancing appliance uses a network management protocol and communication model, such as a Simple Network Management Protocol (SNMP), to identify and collect metrics from a server, service or other device. These metrics are available on the load balancing appliance with appliance determined metrics. Via a configuration interface of the appliance, a user can select one or more appliance determined metrics and/or the metrics obtained via the network management protocol to determine the load of a service. | 2008-09-18 |
20080225711 | DYNAMIC RESPONSE TO TRAFFIC BURSTS IN A COMPUTER NETWORK - In one embodiment, a node receives traffic sent from one or more sources toward one or more destinations (e.g., Multipoint-to-Point, MP2P traffic). The node may detect a burst of received traffic based on one or more characteristics of the burst traffic, and, in response, may dynamically apply traffic shaping to the burst traffic. The traffic shaping is adapted to forward burst traffic received below a configurable threshold at a configurable pace and to drop burst traffic received above the configurable threshold. In addition, the node may also store the burst traffic dropped by traffic shaping, and forwards the stored burst traffic toward its destination after a configurable delay. | 2008-09-18 |
20080225712 | Policy enforcement points - A policy enforcement point (PEP) attaches to the edge of a network to manage loading when the network nears or exceeds its capacity due to changes in the network, e.g., component failures or incremental growth. Autonomous PEP's at the network's edges provide short-term, application-aware controls on their own that are applied to the corresponding network ingress traffic. Path tables are used to calculate whether particular PEP's can admit more traffic, or should they shed sessions/calls to keep service up for the existing application traffic. Long-term controls are periodically downloaded as admission tables from a session/call admission controller to the PEP's. | 2008-09-18 |
20080225713 | SOURCE ROUTING APPROACH FOR NETWORK PERFORMANCE AND AVAILABILITY MEASUREMENT OF SPECIFIC PATHS - In one embodiment, a method includes obtaining a first packet that has a first payload. The first payload identifies a first path between endpoints traversed by the first packet, and identifying information associated with a first node associated with the first path traversed by the first packet. The identifying information includes an arrival time that identifies approximately when the first packet arrived at the first node and a leaving time that identifies approximately when the first packet left the first node. A first service level agreement (SLA) parameter of the first path is determined by analyzing the arrival time and the leaving time, comparing the first SLA parameter with a second SLA parameter associated with a second path traversed by a second probe packet, and selecting the first path for sending packets if the first SLA parameter indicates a higher SLA level than indicated by the second SLA parameter. | 2008-09-18 |
20080225714 | DYNAMIC LOAD BALANCING - A system, method and associated resource balancer function for calculating a resource attribution proposal to be used in a load balancing mechanism supported by a plurality of monitored Service Nodes (SN). At the resource balancer function, receiving an updated remaining capacity value from a first SN of the plurality of SN, storing a remaining capacity value for the first SN from the updated remaining capacity value and calculating the resource attribution proposal between the plurality of SN based on the stored remaining capacity values. | 2008-09-18 |
20080225715 | SYSTEMS AND METHODS OF PROVIDING PROXY-BASED QUALITY OF SERVICE - Systems and methods for dynamically controlling bandwidth of connections are described. In some embodiments, a proxy for one or more connections may allocate, distribute, or generate indications of network congestion via one or more connections in order to induce the senders of the connections to reduce their rates of transmission. The proxy may allocate, distribute, or generate these indications in such a way as to provide quality of service to one or more connections, or to ensure that a number of connections transmit within an accepted bandwidth limit. In other embodiments, a sender of a transport layer connection may have a method for determining a response to congestion indications which accounts for a priority of the connection. In these embodiments, a sender may reduce or increase parameters related to transmission rate at different rates according to a priority of the connection. | 2008-09-18 |
20080225716 | Quality of service admission control network - A network includes an advanced bandwidth manager (ABM) to manage loading when a network nears or exceeds its capacity due to changes in the network, e.g., component failures or incremental growth. The ABM gathers strategic information from remote listeners about how traffic is being routed over the whole network, and is abstracted into point-to-point tables. The information gathered also helps to provide long term service planning. Autonomous policy enforcement points (PEP's) provide short term controls on their own. Intelligent action can be taken by the ABM through the PEP's by downloading admission tables based in the point-to-point abstractions. The goal is to keep the highest level of service up for the most users and prevent total failures. Requested network connections are either admitted or denied to these ends. | 2008-09-18 |
20080225717 | TRAFFIC ENGINEERING ON WIRELESS MESH NETWORKS - Techniques are described for intelligently allocating bandwidth in a wireless mesh network. The wireless mesh network includes a nodes and links interconnecting the nodes. In order to increase capacity and avoid congestion in the network, a network administrator may regulate network traffic by adjusting various parameters that control the operation of network nodes. The network administrator may identify topology information, which indicates a configuration of the nodes and links, and a traffic matrix, which indicates a relative traffic demand weighting for each source node-destination node pair. From this information, the network administrator may calculate a bandwidth assignment for each link. Network administrator may use the bandwidth assignments to calculate a parameter for each node. That parameter may affect the amount of bandwidth used by a node. These parameters may be transmitted to their respective nodes. | 2008-09-18 |
20080225718 | Systems and Methods for Providing Global Server Load Balancing of Heterogeneous Devices - The present invention provides improvements to load balancing by providing a load balancing solution that distributes a load among a plurality of heterogenous devices, such as different types of local load balancers, using metrics collected from the different devices. The load balancing appliance collects metrics from heterogenous devices using a network management protocol and communication model, such as a Simple Network Management Protocol (SNMP). These heterogenous device metrics are available on the load balancing appliance with appliance determined metrics and metrics obtained by the appliance from homogenous devices using a metric exchange protocol. Via a configuration interface of the appliance, a user can select one or more of these different metrics for global load balancing. As such, the load balancing appliance described herein obtains a multitude of metrics from the different devices under management. Additionally, the load balancing appliance described herein provides great flexibility in allowing the user to configure the global load balancer based on the user's understanding of these multitudes of metrics and to take into account the different characteristics and behaviors of the heterogenous devices. | 2008-09-18 |
20080225719 | SYSTEMS AND METHODS FOR USING OBJECT ORIENTED EXPRESSIONS TO CONFIGURE APPLICATION SECURITY POLICIES - Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is described for allowing users to specify object oriented policies. These object oriented policies may allow any data structures to be applied with respect to a payload of a received packet stream, including any portions of HTTP traffic. A configuration interface may also allow the user to control the order in which policies and policy groups are executed, in addition to specifying actions to be taken if one or more policies are undefined. Systems and methods for processing the policies may allow efficient processing of object-oriented policies by applying potentially complex data structures to unstructured data streams. A device may also interpret and process a number of flow control commands and policy group invocation statements to determine an order of execution among a number of policies and policy groups. These policy configurations and processing may allow configuration and processing of complex network behaviors relating to load balancing, VPNs, SSL offloading, content switching, application security, acceleration, and caching. | 2008-09-18 |
20080225720 | SYSTEMS AND METHODS FOR CONFIGURING FLOW CONTROL OF POLICY EXPRESSIONS - Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is described for allowing users to specify object oriented policies. These object oriented policies may allow any data structures to be applied with respect to a payload of a received packet stream, including any portions of HTTP traffic. A configuration interface may also allow the user to control the order in which policies and policy groups are executed, in addition to specifying actions to be taken if one or more policies are undefined. Systems and methods for processing the policies may allow efficient processing of object-oriented policies by applying potentially complex data structures to unstructured data streams. A device may also interpret and process a number of flow control commands and policy group invocation statements to determine an order of execution among a number of policies and policy groups. These policy configurations and processing may allow configuration and processing of complex network behaviors relating to load balancing, VPNs, SSL offloading, content switching, application security, acceleration, and caching. | 2008-09-18 |
20080225721 | SYSTEMS AND METHODS FOR PROVIDING QUALITY OF SERVICE PRECEDENCE IN TCP CONGESTION CONTROL - Systems and methods for dynamically controlling bandwidth of connections are described. In some embodiments, a proxy for one or more connections may allocate, distribute, or generate indications of network congestion via one or more connections in order to induce the senders of the connections to reduce their rates of transmission. The proxy may allocate, distribute, or generate these indications in such a way as to provide quality of service to one or more connections, or to ensure that a number of connections transmit within an accepted bandwidth limit. In other embodiments, a sender of a transport layer connection may have a method for determining a response to congestion indications which accounts for a priority of the connection. In these embodiments, a sender may reduce or increase parameters related to transmission rate at different rates according to a priority of the connection. | 2008-09-18 |
20080225722 | SYSTEMS AND METHODS FOR CONFIGURING POLICY BANK INVOCATIONS - Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is described for allowing users to specify object oriented policies. These object oriented policies may allow any data structures to be applied with respect to a payload of a received packet stream, including any portions of HTTP traffic. A configuration interface may also allow the user to control the order in which policies and policy groups are executed, in addition to specifying actions to be taken if one or more policies are undefined. Systems and methods for processing the policies may allow efficient processing of object-oriented policies by applying potentially complex data structures to unstructured data streams. A device may also interpret and process a number of flow control commands and policy group invocation statements to determine an order of execution among a number of policies and policy groups. These policy configurations and processing may allow configuration and processing of complex network behaviors relating to load balancing, VPNs, SSL offloading, content switching, application security, acceleration, and caching. | 2008-09-18 |
20080225723 | Optical Impairment Aware Path Computation Architecture in PCE Based Network - An apparatus comprising at least one processor configured to implement a method comprising receiving a path computation request comprising at least one path computation constraint, and determining whether there is a path through an optical network that satisfies the path computation constraints. Also disclosed is an apparatus configured to process a data structure comprising a flags field comprising at least one flag having one of an active state or an inactive state, wherein each flag is representative of an optical quality constraint. | 2008-09-18 |
20080225724 | Method and Apparatus for Improved Data Transmission Through a Data Connection - A computer implemented method, apparatus, and computer usable code for receiving data from a sender across a network connection for the data transfer. An expected size for a congestion window for the sender is identified. An amount of the data received from the sender is tracked. An acknowledgment is sent in response to the amount of data received from the sender meet in the expected size of the congestion window for the sender. | 2008-09-18 |
20080225725 | METHOD AND APPARATUS FOR SUPPORTING UPLINK STARVATION AVOIDANCE IN A LONG TERM EVOLUTION SYSTEM - A method and apparatus for uplink (UL) starvation avoidance includes determining a current buffer status information. The current buffer status information is reported to an evolved Node B (eNB). A grant that includes a determination of a number of tokens a wireless transmit/receive unit (WTRU) may accumulate is received from the eNB. | 2008-09-18 |
20080225726 | System and Method for Selfish Child Clustering - A system and method for selfish child clustering are disclosed. In one embodiment, the system comprises a selfish node; and a plurality of servicing nodes each connected to the selfish node, wherein the selfish node selects a first one of the servicing nodes to service requests therefrom; and wherein the selfish node evaluates a responsiveness of the first one of the servicing nodes and, responsive to a determination that the responsiveness of the first one of the servicing nodes is unacceptable, the selfish node selects a second one of the servicing nodes to service requests therefrom. | 2008-09-18 |
20080225727 | COMMUNICATION SYSTEM AND ROUTER - A router checks traffic with respect to the SIP server at reception of a request message addressed to an SIP server from an SIP terminal. If the traffic exceeds a band allocated to the SIP server, the router transfers the request message to a congestion server. | 2008-09-18 |
20080225728 | SYSTEMS AND METHODS FOR PROVIDING VIRTUAL FAIR QUEUEING OF NETWORK TRAFFIC - Systems and methods for dynamically controlling bandwidth of connections are described. In some embodiments, a proxy for one or more connections may allocate, distribute, or generate indications of network congestion via one or more connections in order to induce the senders of the connections to reduce their rates of transmission. The proxy may allocate, distribute, or generate these indications in such a way as to provide quality of service to one or more connections, or to ensure that a number of connections transmit within an accepted bandwidth limit. In other embodiments, a sender of a transport layer connection may have a method for determining a response to congestion indications which accounts for a priority of the connection. In these embodiments, a sender may reduce or increase parameters related to transmission rate at different rates according to a priority of the connection. | 2008-09-18 |
20080225729 | Apparatus, methods and computer program products implementing fast bearer prioritization in a MAC-HS packet scheduler based on required activity detection - Apparatus, methods and computer program products provide fast instantaneous overload control during scheduling operations involving users in a wireless communications network who are candidates to be scheduled in a next transmission time interval. Apparatus detect congestion conditions in a wireless communications network by determining an instantaneous operating region of a scheduler (e.g., a medium access control-high speed scheduler) based on required activity detection and prioritize users in a scheduling candidate set based on the cost of a user. In a variant, this may be implemented by combining part of the required activity detection algorithm with a per-bearer cost function. In one implementation, this will limit the number of users that suffer during momentary congestion in the wireless communications network. | 2008-09-18 |
20080225730 | Method and apparatus for monitoring and displaying routing metrics of a network - The invention includes an apparatus and method for displaying path metrics associate with nodes and links within a network. The method includes determining path metric values associated with the network. The method further includes displaying only the path metric values that fall within a predetermined set. The predetermined set can be adjustable by a network manager. The predetermined set can include an initial default value and be additionally adjusted by a network manager. The predetermined set associated with a particular node can be based upon a redundancy of paths available to the particular node. | 2008-09-18 |
20080225731 | NETWORK SYSTEM, NODE DEVICE AND MANAGEMENT SERVER - Erroneous detection of a failure in spite of the absence of failure on the route on account of a communication delay is to be prevented. A node device detects a failure on the route to a remote node device is detected by a failure to receive a packet from the remote node device after the elapse of a determined detection time. The node device sets “remote system transmission interval x detection multiplier” to be a first detecting time on the basis of a packet transmission interval determined by negotiation with the remote node device. It also sets the sum of “remote system actual transmission interval x detection multiplier” and “tolerable delay time” to be a second detecting time. The first detecting time and the second detecting time are compared, and what is longer is determined as the detecting time to be applied to actual operation. | 2008-09-18 |
20080225732 | ELECTRONIC DEVICE CENTRALIZED MANAGEMENT APPARATUS AND ELECTRONIC DEVICE CENTRALIZED MANAGEMENT METHOD - An electronic device centralized management apparatus manages a device connected through a network remotely. The apparatus stores information received from the device; extracts information based on a designated attribute of the device from the stored information; and compares a tendency held by the extracted information to a tendency held by the stored information to extract a difference therebetween. | 2008-09-18 |
20080225733 | Methods and Arrangements to Detect A Failure In A Communication Network - Methods and arrangements to monitor communication components such as a network adapters for activity, and identify components that have lower than normal levels of activity are provided. An identified communication component can become suspect component and a candidate for further testing, including different forms of interrogation. Process for interrogating candidates can include generating and sending test packets having the media access control (MAC) address of the candidate to the candidate and if activity is not detected subsequent to the interrogation, the candidate can be flagged as a failed component. Correspondingly, the component can be deactivated and removed from service. In a further embodiment, a backup component can be activated and assume the role previously held by the failed component. | 2008-09-18 |
20080225734 | METHOD AND APPARATUS FOR DATA RATE DETECTION USING A DATA EYE MONITOR - Methods and apparatus are provided for data rate detection using a data eye monitor. The data rate is one of a plurality of data rates comprising a base rate and one or more divide-by-N multiples of the base rate, where N is an integer. The data rate of a received signal is detected by sampling the received signal; comparing the samples for a plurality of full rate data eyes associated with the received signal to determine if there is a mismatch between at least two predefined samples; and detecting the data rate by evaluating the comparison based on predefined criteria. The comparison can be performed by an exclusive or (XOR) logic gate for samples of at least two adjacent data eyes of a given rate. | 2008-09-18 |
20080225735 | REDUCING EFFECTS OF PACKET LOSS IN VIDEO TRANSMISSIONS - An error correction system determines a level of error correction protection to apply to a frame of video data to be transmitted by a sending endpoint to a receiving endpoint based on the predicted impact of packet loss as well as the importance of the frame based on inter-frame dependencies, frame size, packet loss probability, historical packet loss pattern, central processing unit (CPU) load, and available network bandwidth. At the receiving endpoint, when packet loss is detected for a particular frame, the receiving endpoint will attempt to recover the frame using protection packets received along with the video data. | 2008-09-18 |
20080225736 | TRANSMISSION OF SEGMENTS OF DATA PACKAGES IN ACCORDANCE WITH TRANSMISSION SPEED AND PACKAGE SIZE - Adaptive data transmission is accomplished by allotting transmission to data of a data package via a communications connection. In one embodiment, the steps comprise determining the transmission speed available using an open connection; estimating time of transmission of the data package in accordance with the determined transmission speed and size of the data package; comparing the time of transmission to a predetermined maximum time limit, and if the time of transmission is within the predetermined maximum time limit, allotting transmission via the open connection to the data package; else, if the time of transmission exceeds the predetermined maximum time limit, breaking the data package into segments, each of which fits within the predetermined maximum time limit, assigning priorities to each the segment in accordance with information within each the segment, and allotting transmission via the open connection to the one of the segments having the highest priority. | 2008-09-18 |
20080225737 | Dynamic Rate Limiting in Wireless Mesh Networks - A dynamic rate limiting mechanism for wireless mesh networks. In particular implementations, a method comprising monitoring one or more clients associated with a wireless mesh network and the respective hop counts of the clients to a root mesh node of the wireless mesh network; determining, responsive ton one or more events, a client data rate for one or more clients of the wireless mesh network based on the number of current clients and the respective hop counts of the current clients; and applying the client data rate to the wireless mesh network. | 2008-09-18 |
20080225738 | METHOD AND SYSTEM FOR RETRIEVING TIME SERIES DATA - Systems and methods for analyzing time series data are disclosed. A query including a machine variable identifier may be received. The machine variable identifier may include an identifier pertaining to one or more of a state, a condition and a performance measure for a printer. A first time series data entry may be determined based on the query. The first time series data entry may include a data value and a time entry for the machine variable identifier. One or more second time series data entries may be selected based on the data value associated with the first time series data entry. One or more maintenance operations may be performed based on the one or more second time series data entries. | 2008-09-18 |
20080225739 | Method and Apparatus for Monitoring Events in Network Traffic - A method of monitoring events in network traffic is described herein, in accordance with various embodiments. The method may provide for the reduction in the number of network traffic samples that need to be analysed in order to determine performance criteria for the traffic in the network. By selecting specific samples as representative of the requirements of all the traffic, it may be possible to more efficiently and quickly provide an analysis of the activity of the network. | 2008-09-18 |
20080225740 | Detection of heavy users of network resources - A device includes a multistage filter and an elephant trap. The multistage filter has hash functions and an array. The multistage filter is operable to receive a packet associated with a candidate heavy network user and send the packet to the hash functions. The hash functions generate hash function output values corresponding to indices in the array. The elephant trap is connected to the multistage filter. The elephant trap includes a buffer and probabilistic sampling logic. The probabilistic sampling logic is operable to attempt to add information associated with the packet to the buffer a particular percentage of the time based in part on the result of the multistage filter lookup. The buffer is operable to hold information associated with the packet, counter information, and timestamp information. | 2008-09-18 |
20080225741 | Monitor for Multi-Protocol Label Switching (MPLS) Networks - In one embodiment, a method includes receiving label data that indicates all interface labels that belong to each path ID of multiple path IDs associated with corresponding multiple paths between provider edge nodes in a Multi-Protocol Label Switching (MPLS) network. Each interface label is associated with a network interface on a node in the MPLS network. Based on the label data, an untested list that holds data that indicates all unique interface labels is generated. A tested interface selected from the untested list is scheduled for testing. After scheduling, the interface label of the tested interface is removed from the untested list. It is determined whether the untested list still includes data for at least one interface label. If not, then a test of the MPLS network is completed without testing every path end to end, thus conserving network resources. | 2008-09-18 |
20080225742 | Scheduling method and system for guaranteeing real-time service quality of WiBro CPE - Provided are a scheduling method and apparatus for guaranteeing real-time service quality of Wireless Broadband (WiBro) customer premises equipment (CPE). The scheduling apparatus includes: a real-time protocol (RTP) packet monitoring unit for monitoring an RTP packet passing through a local area network (LAN) section and detecting a bandwidth of real-time service; and a queue managing unit for determining a window size corresponding to the bandwidth of real-time service checked by the RTP packet monitoring unit and generating/changing a real-time service queue. The scheduling method and apparatus monitor an RTP packet and adjust a real-time service queue, thereby ensuring real-time service quality of terminals. | 2008-09-18 |
20080225743 | REVERSE-LINK QUALITY-OF-SERVICE INFORMATION IN DATA PACKET HEADER - Quality-of-service information provides details related to data packets, including delay information. A data packet header may be analyzed to determine a portion capable of retaining quality-of-service information. Quality-of-service information may be compressed and placed into the identified portion. The header may be transmitted to a base station, where the quality-of-service information is decompressed, read, and modification of operations occurs as a function of the quality-of-service information. | 2008-09-18 |
20080225744 | METHOD AND APPARATUS FOR HIGH SPEED DOWNLINK PACKET ACCESS LINK ADAPTATION - A method of high speed downlink packet access (HSDPA) link adaptation, comprises receiving a channel quality measurement metric over a Measured Results on random access channel (RACH) information element (IE). The link is adapted based upon the received channel quality metric. | 2008-09-18 |
20080225745 | PACKET NETWORK MONITORING DEVICE - A network analysis device for a digital communication network includes a digitizer to digitize a waveform representing a signal to produce a plurality of digital samples indicative of the waveform. The signal is communicated on the network. The network analysis device also includes a processor operable to analyze the digital samples to identify signal events, determine analog characteristics of the signal events, and decode the signal events, which are digital communications between network devices, based on the data, to selectively predict a failure mode. | 2008-09-18 |
20080225746 | Method and system for generating packet delay variation with a uniform distribution - A method and system for generating packet delay variation (PDV) with a uniformly distributed probability density function (PDF) for packet timing recovery stress testing. A delay-step method determines a delay for each packet in a stream of packets generated at a regular interval. In the delay-step method, delay-steps are determined for each packet based on delay target values. In order to generate PDV with a uniform PDF, the delay target values are randomly selected based on a pre-biased PDF which is a uniform distribution that is pre-biased by a pre-bias function. The pre-bias function increase the values of small delay target values so that an increased number of delay target values are at the extremes of the uniform distribution. This causes the delay-step method to result in PDV with a uniform distribution. | 2008-09-18 |
20080225747 | Simulating packet delay variation using step-target delay method - A method and system for simulating packet delay variation (PDV) is disclosed. The delay-step method for simulating PDV determines a delay for each packet is a stream of packets generated at a regular interval. Delay target values are randomly selected based on a statistical distribution, such as a Gamma distribution, which models a desired PDV. Delay-steps are determined for each packet based on the delay target values. The delay-steps can be fixed or variable sized steps which are used to adjust the delay of sequential packets. Each of the packets is then transmitted with the delay determined for that packet. | 2008-09-18 |
20080225748 | SYSTEMS AND METHODS FOR PROVIDING STUCTURED POLICY EXPRESSIONS TO REPRESENT UNSTRUCTURED DATA IN A NETWORK APPLIANCE - Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is described for allowing users to specify object oriented policies. These object oriented policies may allow any data structures to be applied with respect to a payload of a received packet stream, including any portions of HTTP traffic. A configuration interface may also allow the user to control the order in which policies and policy groups are executed, in addition to specifying actions to be taken if one or more policies are undefined. Systems and methods for processing the policies may allow efficient processing of object-oriented policies by applying potentially complex data structures to unstructured data streams. A device may also interpret and process a number of flow control commands and policy group invocation statements to determine an order of execution among a number of policies and policy groups. These policy configurations and processing may allow configuration and processing of complex network behaviors relating to load balancing, VPNs, SSL offloading, content switching, application security, acceleration, and caching. | 2008-09-18 |
20080225749 | Auto-configuration of a network device - Exemplary systems and methods for auto-configuring a network device are provided. In exemplary embodiments, the network device receives network data, which is used to determine identification data for a client. A version of the client identification data is then sent to an ISP by the network device. In response, a public IP address is returned from the ISP. The network device then translates the public IP address into an internal IP address for use with the client. In some embodiments, the network device is verified by a central data center. In some embodiments, the network device may be provisioned for PSTN and/or VoIP calls. | 2008-09-18 |
20080225750 | Method of transmitting data in a communication system - A method of establishing parameters to facilitate a communication event in a communication network comprising: establishing a first communication event; monitoring at least one parameter used to process data associated with the first communication event; storing said at least one monitored parameter; establishing a second communication event; selecting at least one stored monitored parameter in response to establishing the second communication event; and applying said at least one selected parameter to process data associated with said second communication event. | 2008-09-18 |
20080225751 | METHOD AND APPARATUS FOR PRIORITIZED INFORMATION DELIVERY WITH NETWORK CODING OVER TIME-VARYING NETWORK TOPOLOGIES - A method and apparatus is disclosed herein for information delivery with network coding over time-varying network topologies. In one embodiment, the method comprises decomposing a sequence of topology graphs that model a time-varying network topology into a plurality of virtual graphs, where each virtual graph of the plurality of virtual graphs corresponds to a distinct traffic class, and the virtual topology graph representing a partial topology of a time-varying network. The method also includes selecting a network code for each virtual graph in the plurality of the virtual graphs to meet requirements of the distinct traffic class corresponding to said each topology graph, where the network code is used to encode packets of the associated traffic class, and processing packets of each traffic class using the network code determined by its corresponding virtual topology and the requirements of said each traffic class, including using a virtual buffer system to implement the network code corresponding to each traffic class over the physical network topology. The method also includes using a scheduler to determine the transmission schedules for each output packet from the virtual buffer system of each traffic class where the scheduling decisions are based, at least in part, on the QoS requirements of each class. | 2008-09-18 |
20080225752 | Communication Resource Allocation Method of Base Station - A communication resource allocation method for solving resource request imbalance content in a cell is provided. Considering a propagation environment, the base station allocates a whispering resource to a whispering area, the whispering resource being one part of the communication resource and the whispering area being a peripheral area of the first base station, and allocates a speaking resource to a speaking area, the speaking resource being other parts of the communication resource and the speaking area being a border area of a cell. When the resource request of the whispering area is increased, the base station further allocates a part of the speaking resource to the whispering area or increases a ratio of the whispering resource. When the resource request of the speaking area is increased, the base station controls a threshold value for identifying the whispering and speaking areas or increases a ratio of the speaking resource. | 2008-09-18 |
20080225753 | SYSTEMS AND METHODS FOR CONFIGURING HANDLING OF UNDEFINED POLICY EVENTS - Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is described for allowing users to specify object oriented policies. These object oriented policies may allow any data structures to be applied with respect to a payload of a received packet stream, including any portions of HTTP traffic. A configuration interface may also allow the user to control the order in which policies and policy groups are executed, in addition to specifying actions to be taken if one or more policies are undefined. Systems and methods for processing the policies may allow efficient processing of object-oriented policies by applying potentially complex data structures to unstructured data streams. A device may also interpret and process a number of flow control commands and policy group invocation statements to determine an order of execution among a number of policies and policy groups. These policy configurations and processing may allow configuration and processing of complex network behaviors relating to load balancing, VPNs, SSL offloading, content switching, application security, acceleration, and caching. | 2008-09-18 |
20080225754 | Automatically discovering architectural roles of packet switching devices - Network architectural roles of packet switching devices are automatically determined by retrieving and analyzing configuration information of the packet switching devices. The retrieved configuration information typically includes operational details of the packet switching operations performed by the packet switching device, with these retrieved operational details being analyzed in order to identify one or more network architectural roles being performed by a particular packet switching device. Examples of such identified network architectural role include, but are not limited to, a customer edge device, a provider edge device, and a user-facing provider edge device. Knowing the architectural role performed by a packet switching device is useful for operations, administration, maintenance and provisioning of networks of these packet switching devices. | 2008-09-18 |
20080225755 | SYSTEM AND METHOD FOR PROVIDING AND USING A VLAN-AWARE STORAGE DEVICE - The present invention provides secure IP protocol capable storage devices using Virtual Local Area Network (VLAN) techniques. Specific embodiments of the present invention provide techniques for securing VLAN aware storage devices, and the like. In specific embodiments, techniques according to the present invention can provide Internet data centers that are responsible for keeping their customer's computers and storages safe and secure with the capability to strictly separate LAN access for different customers using VLAN (virtual LAN) technology. | 2008-09-18 |
20080225756 | Method for synchronizing U-APSD trigger frames - A wireless LAN is comprised of a number of wired infrastructure devices, including at least one access point able to support a number of wireless communication devices configured to operate in the U-APSD mode. The wireless communications devices periodically contending for the wireless medium to transmit trigger messages to the access point and the access point responding by transmitting at least one frame of information. The wireless communications devices operate to synchronize the transmission of their trigger messages such that the possibility that the messages collide with one another is minimized. | 2008-09-18 |
20080225757 | WEB-BASED INTERACTIVE LEARNING SYSTEM AND METHOD - A system and method for interactive web based learning may include providing at least one teaching node accessible by at least one teacher, and providing at least one student node accessible by at least one student. A bidirectional live interface may be provided between the at least one teaching node and the at least one student node. The bidirectional live interface may enable the student node to receive at least one of an audio, a video or a text based communication from the at least one teaching node. The bidirectional live interface may also enable the at least one teaching node to receive at least one of an audio, a video or a text based communication from the at least one student node. | 2008-09-18 |
20080225758 | Automatic Gain Control and Filtering Techniques for Use in On-Channel Repeater - A repeater environment is provided operative to deploy a feedback cancellation loop that is adaptively coupled with an antenna array such that a selected metric can be derived by deploying a selected filter bank having an automatic gain control operative to process the signal on a bin by bin basis and the derived metric can be applied to the antenna array and feedback cancellation loop combination to improve signal integrity and amplification. In an illustrative implementation, an exemplary repeater environment comprises, a transmitter, a receiver, an equalized feedback cancellation loop circuitry comprising a filter bank, the cancellation loop being operatively coupled to an antenna array. In the illustrative implementation, the feedback cancellation loop can receive signals as input from a cooperating antenna array and provide output signals such as a feedback leakage signal to a cooperating antenna array. | 2008-09-18 |
20080225759 | Radio communication apparatus - A radio communication apparatus that transmits and receives a signal via an antenna duplexer, the apparatus that includes a dividing unit that divides part of a transmitting signal to be transmitted via the antenna duplexer. Also included is a conversion unit that converts a receiving signal of a first frequency band received via the antenna duplexer into a second frequency band lower than the first frequency band. In addition, the apparatus includes an extraction unit converting a noise component of the first frequency band included in the transmitting signal divided by the dividing unit into the second frequency band and extracting the noise component. Moreover, the apparatus includes an inversion unit that inverts the phase of the noise component extracted by the extraction unit. Also included is a combining unit that combines the receiving signal converted by the conversion unit and the noise component inverted by the inversion unit. | 2008-09-18 |
20080225760 | System and Method for Intelligent Paging of an Idle Mobile Device - An access gateway comprises a processor. The processor is operable to determine a message type of a received packet. The processor is further operable to apply a paging rule. The paging rule is related at least in part to the message type of the received packet. The processor is further operable to determine whether to send a request to transition the mobile device to an active state based on the paging rule. The processor is further operable to send a request, when appropriate, to transition the mobile device to an active state. | 2008-09-18 |
20080225761 | Estimating Timing And Frequency Information For Multiple Channel Wireless Communication Systems - One method of estimating timing and frequency information of a payload transmitted through two or more frequency separated channels combines training fields from preambles from the two or more frequency separated channels to construct combined values that may be used to estimate the frequency and timing information. In one embodiment, the combined values may be determined by combining self-correlated training fields from the frequency separated channels. Another method of estimating the timing and frequency information selects the training fields from the preamble of one of the frequency separated channels based upon a signal quality metric. In another embodiment, the selection of the training fields based upon a signal quality metric may be biased to favor a particular channel. | 2008-09-18 |
20080225762 | MUNICIPAL SAFETY INTEGRATED INFRASTRUCTURE NETWORK FOR PROVIDING CONNECTIVITY TO PUBLIC AGENCIES, OFFICES AND FIXED/MOBILE INFRASTRUCTURE ELEMENTS - A communications network for making information available to a one or more government agencies. The network comprises antennas on publicly operated facilities, transceivers for sending messages to and receiving messages from one or more of the antennas, routers responsive to messages received at the antennas for routing the messages on a network path to a desired destination, the routers also responsive to messages from a source on the communications network for routing the messages to antennas and wherein the routers are controlled to route the messages to a desired destination, the desired destination determined by the existence of a situation involving users who can benefit from the information in the message. | 2008-09-18 |
20080225763 | Group MMSE-DFD with Rate (SINR) Feedback and Without Pre-Determined Decoding Order for Reception on a Cellular Downlink - In accordance with the invention, a method includes the steps of: i) initializing with channel matrix estimates and inner codes of all co-channel transmitter sources in a wireless network, modulation and coding schemes of all sources not of interest; ii) converting each channel matrix estimate into an effective channel matrix responsive to the inner code of the corresponding transmitter source; iii) selecting iteratively from a first set of transmitter sources transmitting at fixed rates, a transmitter source which maximizes a first metric; iv) computing iteratively a filter for the transmitter source which maximizes the first metric; v) selecting iteratively from a second set of transmitter sources of interest, a transmitter source which maximizes a second metric; vi) computing iteratively a rate and a filter for the transmitter source which maximizes the second metric; and vii) obtaining an ordered set of indices of all transmitter sources that will be decoded along with their corresponding filters, and feedback rates for all transmitter sources of interest. | 2008-09-18 |
20080225764 | Method and Apparatus for Improving Configurations of Serving Grants for a User Equipment in a Wireless Communications System - A method of improving configurations of serving grants for a user equipment in a wireless communications system includes providing a scheduling grant table for configuring a serving grant value according to a reference value when a relative grant message is received. The reference value is determined according to a previously received absolute grant message. The method then includes setting a maximum scheduled grant value of the scheduling grant table to be equal to or greater than a maximum absolute grant value capable of being indicated by the absolute grant message. | 2008-09-18 |
20080225765 | METHODS AND APPARATUS FOR REORDERING DATA IN AN EVOLVED HIGH SPEED PACKET ACCESS SYSTEM - Method and apparatus for receiving high speed downlink shared channel (HS-DSCH) transmissions are disclosed. An HS-DSCH medium access control (MAC-ehs) entity receives MAC-ehs protocol data units (PDUs) via a high speed downlink shared channel (HS-DSCH) while in one of Cell_FACH, Cell_PCH, and URA_PCH states. The reordering PDUs included in the MAC-ehs PDUs may be sent to a next processing entity without performing reordering of the PDUs. A certain reordering queue may enter a suspend state upon occurrence of a triggering event and MAC-ehs PDUs distributed to the reordering queue in the suspend state may be forwarded to the next processing entity without performing reordering. MAC-ehs reset procedure may be extended for a certain transmission such that the MAC-ehs reset is performed after receiving a MAC-ehs PDU in a target cell. | 2008-09-18 |
20080225766 | METHOD AND APPARATUS FOR RECONFIGURING MEDIUM ACCESS CONTROL COMPONENTS IN WIRELESS COMMUNICATIONS - Methods and apparatus are disclosed to facilitate wireless communications between a wireless transmit receive unit (WTRU), legacy base stations and base stations using different operating parameters, such as evolved high speed packet access (HSPA) systems Third Generation Partnership Project ((3GPP) Release 7, Release 8 and beyond). Preferred WTRUs are configured with a medium access control (MAC) sub-layer component having a subcomponent with HARQ buffers, such as a subcomponent configured to provide MAC-es and MAC-e functionality and/or MAC-is and MACi functionality that include hybrid automatic repeat request (HARQ) processes, some of which are preferably operable with enhanced dedicated transport channels (E-DCH). The WTRUs are preferably configured such that they reconfigure their MAC subcomponents during soft handover while minimizing induced latency and data losses associated with HARQ processes. In some embodiments, the WTRUs are configured to prevent flushing of HARQ process buffers in soft handover scenarios with a Node B that does not support UL enhancements, e.g. higher order modulation (HOM). In other embodiments, flushing of HARQ processes is used but amelioration of adverse effects is addressed. | 2008-09-18 |
20080225767 | Device for Implementing a RNC Using LVDS - A device for implementing a RNC is provided with an interface interfacing between sub-systems of a system for the RNC. The interface uses cross duplication dualizing interfacing method. In the device of the present invention, the data transmission between the sub-systems is performed in the form of LVDS signals converted from ATM UTOPIA data. Further, the active pass link of two interfaces is switched, while outputs are transmitted from the active pass link to two interfaces. | 2008-09-18 |