Patent application number | Description | Published |
20090132699 | Data Center Synthesis - A data center is designed by determining a compute description that describes computer resources to be used in the system from design requirements and models of the computer resources. A facility description that describes facilities to be used in the data center is determined from the compute description and models of the facilities. An integrated system describing the design of the data center is determined from the facility and compute descriptions. | 05-21-2009 |
20090288084 | MULTITENANT HOSTED VIRTUAL MACHINE INFRASTRUCTURE - A multi-tenant virtual machine infrastructure (MTVMI) allows multiple tenants to independently access and use a plurality of virtual computing resources via the Internet. Within the MTVMI, different tenants may define unique configurations of virtual computing resources and unique rules to govern the use of the virtual computing resources. The MTVMI may be configured to provide valuable services for tenants and users associated with the tenants. | 11-19-2009 |
20090327471 | MULTITENANT HOSTED VIRTUAL MACHINE INFRASTRUCTURE - A multi-tenant virtual machine infrastructure (MTVMI) allows multiple tenants to independently access and use a plurality of virtual computing resources via the Internet. Within the MTVMI, different tenants may define unique configurations of virtual computing resources and unique rules to govern the use of the virtual computing resources. The MTVMI may be configured to provide valuable services for tenants and users associated with the tenants. | 12-31-2009 |
20100138830 | MULTITENANT HOSTED VIRTUAL MACHINE INFRASTRUCTURE - A multi-tenant virtual machine infrastructure (MTVMI) allows multiple tenants to independently access and use a plurality of virtual computing resources via the Internet. Within the MTVMI, different tenants may define unique configurations of virtual computing resources and unique rules to govern the use of the virtual computing resources. The MTVMI may be configured to provide valuable services for tenants and users associated with the tenants. | 06-03-2010 |
20120096158 | MULTITENANT HOSTED VIRTUAL MACHINE INFRASTRUCTURE - A multi-tenant virtual machine infrastructure (MTVMI) allows multiple tenants to independently access and use a plurality of virtual computing resources via the Internet. Within the MTVMI, different tenants may define unique configurations of virtual computing resources and unique rules to govern the use of the virtual computing resources. The MTVMI may be configured to provide valuable services for tenants and users associated with the tenants. | 04-19-2012 |
20130013738 | MULTITENANT HOSTED VIRTUAL MACHINE INFRASTRUCTURE - A multi-tenant virtual machine infrastructure (MTVMI) allows multiple tenants to independently access and use a plurality of virtual computing resources via the Internet. Within the MTVMI, different tenants may define unique configurations of virtual computing resources and unique rules to govern the use of the virtual computing resources. The MTVMI may be configured to provide valuable services for tenants and users associated with the tenants. | 01-10-2013 |
20130139158 | MULTITENANT HOSTED VIRTUAL MACHINE INFRASTRUCTURE - A multi-tenant virtual machine infrastructure (MTVMI) allows multiple tenants to independently access and use a plurality of virtual computing resources via the Internet. Within the MTVMI, different tenants may define unique configurations of virtual computing resources and unique rules to govern the use of the virtual computing resources. The MTVMI may be configured to provide valuable services for tenants and users associated with the tenants. | 05-30-2013 |
20130144744 | MULTITENANT HOSTED VIRTUAL MACHINE INFRASTRUCTURE - A multi-tenant virtual machine infrastructure (MTVMI) allows multiple tenants to independently access and use a plurality of virtual computing resources via the Internet. Within the MTVMI, different tenants may define unique configurations of virtual computing resources and unique rules to govern the use of the virtual computing resources. The MTVMI may be configured to provide valuable services for tenants and users associated with the tenants. | 06-06-2013 |
20130290506 | MULTITENANT HOSTED VIRTUAL MACHINE INFRASTRUCTURE - A multi-tenant virtual machine infrastructure (MTVMI) allows multiple tenants to independently access and use a plurality of virtual computing resources via the Internet. Within the MTVMI, different tenants may define unique configurations of virtual computing resources and unique rules to govern the use of the virtual computing resources. The MTVMI may be configured to provide valuable services for tenants and users associated with the tenants. | 10-31-2013 |
20130290960 | MULTITENANT HOSTED VIRTUAL MACHINE INFRASTRUCTURE - A multi-tenant virtual machine infrastructure (MTVMI) allows multiple tenants to independently access and use a plurality of virtual computing resources via the Internet. Within the MTVMI, different tenants may define unique configurations of virtual computing resources and unique rules to govern the use of the virtual computing resources. The MTVMI may be configured to provide valuable services for tenants and users associated with the tenants. | 10-31-2013 |
Patent application number | Description | Published |
20130336164 | SYSTEM AND METHOD FOR VIRTUAL PORTCHANNEL LOAD BALANCING IN A TRILL NETWORK - An example method includes storing a portion of virtual PortChannel (vPC) information in a TRansparent Interconnect of Lots of Links network environment, deriving, from the portion of vPC information, a physical nickname of an edge switch to which a frame can be forwarded, and rewriting an egress nickname in a TRILL header of the frame with the physical nickname. In example embodiments, the vPC information can include respective vPC virtual nicknames, EtherChannel hash algorithms, hash values, and physical nicknames of edge switches associated with vPCs in the network environment. In some embodiments, the portion of vPC information can be derived from an Interested vPC Type Length Value (TLV) information of an Intermediate System to Intermediate System (IS-IS) routing protocol data unit (PDU). | 12-19-2013 |
20140050217 | Two-Stage Port-Channel Resolution in a Multistage Fabric Switch - In some embodiments, a data packet may be received at a leaf switch. A port-channel associated with a destination port for the data packet may be identified, and the data packet may be transmitted to the destination port via the identified port-channel. | 02-20-2014 |
20140198800 | MSDC SCALING THROUGH ON-DEMAND PATH UPDATE - In one embodiment, a copy of an original packet of a traffic flow is created at an ingress leaf node of a cloud switch. The ingress leaf node forwards the original packet along a less-specific path through the cloud switch, the less-specific path based on a domain index of an egress domain for the original packet. The copy of the original packet is modified to create a more specific path learn request packet. The ingress leaf node forwards the more specific path learn request packet along the less-specific path through the cloud switch. The ingress leaf node received back a more specific path learn request reply packet that includes an indication of a fabric system port. The ingress leaf node then programs a forwarding table based on the indication of the fabric system port, to have subsequent packets of the traffic flow forwarded along a more-specific path. | 07-17-2014 |
20140254374 | METHODS AND DEVICES FOR PROVIDING SERVICE CLUSTERING IN A TRILL NETWORK - The methods and devices discussed herein provide service clustering within a TRILL network without relying on an additional service insertion framework. A TRILL network can include one or more flow distribution RBridges for distributing flows to service nodes. Each flow distribution RBridge can have a virtual base identifier and one or more virtual cluster identifiers. An example method can include maintaining N service cluster load balancing structures and receiving a packet that is encapsulated with an inner header (source/destination addresses) and an outer header (ingress/egress RBridge identifiers). The method can include determining whether the egress RBridge identifier is a virtual cluster identifier, and if so, applying a hash function to a predetermined flow tuple and selecting a service node associated with the hash value from one of the N service cluster load balancing structures. The method can include forwarding the packet to the selected service node. | 09-11-2014 |
20140269329 | PATH OPTIMIZATION IN MULTI-NODE VIRTUAL SWITCH WITH ORPHAN PORTS - Embodiments provide techniques for optimizing paths in a network environment with a virtual network device that includes a first physical network device and a second physical network device, connected using a virtual network device layer link. Embodiments receive a first data packet belonging to a first data flow, at the first physical network device, from the second physical network device, over the virtual network device layer link. An adjacent network device from which the second physical network device received the first data packet is determined. Embodiments also determine one or more links connecting the first physical network device and the adjacent network device. A network message is transmitted to the adjacent network device, where the adjacent network device is configured to transmit subsequent data packets from the first data flow to the virtual network device, using only the determined one or more links, responsive to receiving the network message. | 09-18-2014 |
20140269695 | System for Conversational Link Aggregation Resolution in a Network Switch - Some implementations provide a method that includes: (i) receiving a list of logic link aggregations (LAGs) within a computer network, the list identifying a single physical egress port associated with each LAG; (ii) receiving a data unit; (iii) identifying that the data unit is addressed to a remote LAG included in the list of logic link aggregations; (iv) establishing a connection with the remote LAG; (v) downloading a detailed data describing the remote LAG from a control plane, the detailed data including a list of multiple available physical egress ports associated with the remote LAG, and; (vi) upon downloading the detailed data, incorporating the detailed data into the list of LAGs in association with an entry identifying the remote LAG. | 09-18-2014 |
20140317249 | Accelerating Network Convergence for Layer 3 Roams in a Next Generation Network Closet Campus - Accelerating network convergence may be provided. Consistent with embodiments of the disclosure, a mapping server may be configured to map an interconnection of various network elements comprising at least the following: a wireless host, at least two access switches, a plurality of distribution switches, a core switch, a mobility controller, and a mapping database. The mapping server may then receive an indication from the mobility controller that the wireless host has roamed from a first access switch to a second access switch. In response to the indication, the mapping server may remap the interconnection of network elements in the mapping database to update network routing information associated with the wireless host. | 10-23-2014 |
20150016301 | Flexible and Scalable Monitoring in a TRILL Network - A monitoring session associated with a virtual nickname may be established in a TRILL network. A monitoring station may be connected to an edge switch of the TRILL network specifying the virtual nickname for the monitoring session. The monitoring station is set as a destination for the monitoring session and the virtual nickname is flooded throughout the TRILL network. A source may then be configured to the monitoring session by specifying the virtual nickname of the monitoring session without knowing the destination tied to the monitoring session. Network traffic through the source may then be forwarded to the destination tied to the monitoring session. | 01-15-2015 |
20150074741 | METHOD AND SYSTEM FOR EXTENDING NETWORK RESOURCES CAMPUS-WIDE BASED ON USER ROLE AND LOCATION - A method, system, and computer readable medium is disclosed which utilizes the LISP control plane to increase communications and access to enterprise resources in a network with multiple subnetworks, such as a university setting. As a result, the various embodiments of the present invention provide a routing and services dimension to enterprise discovery protocol traffic, such as Apple Bonjour traffic. A LISP instance ID, which is carried in the LISP header, is used to associate one or more end user devices with specific enterprise resources in a particular subnetwork or a service domain, wherein these resources may be accessed by the end user device even if the end user device migrates to another subnetwork. Another embodiment of the invention limits routing services advertisements from enterprise services to a subset of end user devices associated with particular user EIDs by using L2-LISP multicast techniques. | 03-12-2015 |
20150085859 | Two-Stage Port-Channel Resolution in a Multistage Fabric Switch - In some embodiments, a data packet may be received at a leaf switch. A port-channel associated with a destination port for the data packet may be identified, and the data packet may be transmitted to the destination port via the identified port-channel. | 03-26-2015 |
20150200848 | Single Hop Overlay Architecture for Line Rate Performance in Campus Networks - Methods and systems are provided for detecting overlay end points which are a single physical hop away and employing a simplified overlay header instead of a regular overlay header for communications with the identified end points. The simplified overlay header may carry overlay protocol related forwarding and peer information and may be designed to carry locally significant forwarding information which avoids overlay lookup related overhead on encapsulation and decapsulation operations. The simplified overlay header may be handled in the same forwarding pipeline pass as the handling of the inner frame and may work across different forwarding engines. Upon detection of a single hop link/keepalive failure, the backup overlay (original overlay header) may be used for forwarding. | 07-16-2015 |
20150326478 | METHODS AND DEVICES FOR PROVIDING SERVICE INSERTION IN A TRILL NETWORK - The methods and devices discussed herein provide service clustering within a TRILL network without relying on an additional service insertion framework. A TRILL network can include one or more flow distribution RBridges for distributing flows to service nodes. Each flow distribution RBridge can have a virtual base identifier and one or more virtual cluster identifiers. An example method can include maintaining service cluster load balancing structures and receiving a packet that is encapsulated with an inner header and an outer header. The method can include determining whether the egress RBridge identifier is a virtual cluster identifier, and if so, selecting a service node from one of the service cluster load balancing structures. The method can include forwarding the packet to the selected service node. | 11-12-2015 |
Patent application number | Description | Published |
20090094354 | TECHNIQUE FOR IMPLEMENTING VIRTUAL FABRIC MEMBERSHIP ASSIGNMENTS FOR DEVICES IN A STORAGE AREA NETWORK - A technique is provided for facilitating fabric membership login for an N_Port of a storage area network. A communication from a network node is received. The communication may include a portion of criteria associated with the N_Port. Using at least a portion of the portion of criteria, a virtual fabric identifier corresponding to a virtual fabric which is associated with the N_Port may be automatically identified. Fabric configuration information, which includes the virtual fabric identifier, may be automatically provided to the network node. A fabric login request from the N_Port to login to the virtual fabric may then be received. According to a specific embodiment, the communication may be transmitted from a network node to an F_Port on a Fibre Channel switch. When the N_Port received the fabric configuration information from the F_Port, the generating, using at least a portion of the received fabric configuration information, a fabric login request message may be generated by the N_Port which includes a fabric login request for the N_Port to login to the virtual fabric corresponding to the virtual fabric identifier. In at least one implementation, the N_Port and/or F_Port may be configured or designed to support trunking functionality. | 04-09-2009 |
20120106325 | Adaptive Shaper for Reliable Multicast Delivery over Mixed Networks - Improved handling of multicast streams in digital networks. A switching device in a digital network such as a controller, bridge, or access point examines streams flowing through the device. The device identifies a multicast stream and assigns a stateful session to this stream. QoS marking may be applied to the stream. The device assigns a shaping policy to the stream, assigning it a default value in terms of bandwidth credits. This default value may be dependent on the stream type. The credits used by the stream are evaluated periodically. If the stream has exceeded the allocated bandwidth for the shaping policy, the number of credits are increased by a predetermined factor. If the stream has unused credits, the allocated number of credits are reduced by a predetermined factor. The increase and decrease factors may be tuned, for example, to provide a fast attack and a slow decay. The period used for stream evaluation may be adjusted. Increasing the period decreases the load on the device CPU; decreasing the period allows for better convergence at a cost of more load on the CPU. This approach allows the packets in the stream to be released at a constant rate and allows transmission of bursty traffic over networks on which congestion conditions can change rapidly such as wireless and vpn tunnels. In addition, the potential for downstream drops due to the lack of buffers in downstream switch/routers due to the burstiness is reduced. | 05-03-2012 |
20120106348 | Dynamic QOS Tagging for RTP Packets - Improved handling of RTP streams in digital networks. A switching device in a digital network such as a controller, bridge, or access point examines streams flowing through the device. The device monitors the initial UDP packets of a stream until a predetermined number of packets have been monitored. The device monitors and fingerprints the header portion of UDP packets, looking for RTP header bit patterns, ignoring certain RTP packet types, and caching others. This fingerprinting process attempts to match cached packet header information against subsequent packets in the stream to detect RTP streams. If the stream is determined to be an RTP stream, then the RTP type from the packet header is used to tag the stream. In one embodiment, such tags are QoS tags. Tagging may also be based on the control session port used. | 05-03-2012 |
20120106425 | Managing Multicast Membership in Wireless LANS - Processing of IGMP control packets in an access point (AP) connected to a digital network. According to the present invention, an AP in a network converts IGMP queries from multicast to unicast and sends these unicast packets to each client of the AP. These IGMP query packets may be filtered or restricted by per-user client rules These IGMP query packets may also be tagged as high priority packets to speed their delivery. The AP also suppresses the retransmission of IGMP Join packets to clients of the AP. | 05-03-2012 |
20120106547 | Managing Multicast Membership in Wireless LANs - Processing of MLD control packets in an access point (AP) connected to a digital network. According to the present invention, an AP in a network converts MLD queries from multicast to unicast and sends these unicast packets to each client of the AP. These MLD query packets may be filtered or restricted by per-user client rules These MLD query packets may also be tagged as high priority packets to speed their delivery. The AP also suppresses the retransmission of MLD Join packets to clients of the AP. | 05-03-2012 |
20120291098 | Multimode Authentication - Assigning clients to VLANs on a digital network. A client attaching to a digital network through a network device is initially assigned to a first VLAN. This VLAN may have restricted access and is used for authentication. The device snoops DHCP traffic on this first VLAN rewriting DHCP traffic from the client to request a short lease time for the client. A short lease time may be on the order of 30 seconds. The device optionally rewrites DHCP traffic to the client on the first VLAN to assure a short lease time is returned; this rewriting supports DHCP servers which do not issue short leases. Traffic on this first VLAN may be limited to authentication such as captive portals, 802.1x, Kerberos, and the like. If client authentication on the first VLAN does not succeed, when the short lease expires, the client will receive another short lease on the first VLAN. The network device snoops authentication traffic. When authentication succeeds, the device snoops this traffic and derives information such as roles and the target VLAN for the client, saving this information. When the short DHCP lease expires for the client, and the client restarts the DHCP process, the device assigns the client to the target VLAN and all further processing occurs on this target VLAN. | 11-15-2012 |
20140119354 | Home Virtual Local Area Network Identification for Roaming Mobile Clients - The present disclosure discloses a method and network device for home VLAN identification for roaming mobile clients. Specifically, the disclosed method and system detects that the mobile client has roamed away from a first network to a second network, maintains a mapping between a virtual local area network (VLAN) corresponding to the mobile client and a tunnel corresponding to a foreign agent in the second network, and forwards packets to or from the mobile client on the VLAN based on the mapping between the VLAN and the tunnel via which the packets are received. Therefore, the disclosed method and system allows for identification of home VLANs for roaming mobile clients without merging VLAN policy configurations at the home agent and the foreign agent. | 05-01-2014 |
20140153393 | INGRESS TRAFFIC CLASSIFICATION AND PRIORITIZATION WITH DYNAMIC LOAD BALANCING - According to one embodiment, a method comprises an operation of determining whether an ingress control message is locally terminated control traffic on a digital device prior to the ingress control message being forwarded to a hardware processor of the digital device for processing. A priority is assigned to the ingress control message based on information within the ingress control message, if the ingress control message is determined to be locally terminated control logic. | 06-05-2014 |
20140153422 | RATE LIMITING MECHANISM BASED ON DEVICE LOAD/CAPACITY OR TRAFFIC CONTENT - The present disclosure discloses a method and network device for a rate limiting mechanism based on device load/capacity or traffic content. Specifically, the system receives a request from a network node, and determines whether a ratio between a current load and a capacity exceeds a threshold. If so, the system determines a wait time period based on current load/capacity ratio, and responds to the network node with a message including the wait time period. Moreover, the system can inspect content of the request to determine a message type, and whether the message type indicates that the request is associated with dependent messages. If so, the system responds to the request with a busy message including the wait time period. Further, the system rejects new session requests if the number of concurrent sessions currently connected to the network device approaches the number of sessions associated with a regression point. | 06-05-2014 |
20140153577 | SESSION-BASED FORWARDING - The present disclosure discloses a method and network device for session based forwarding. Specifically, the disclosed system receives a first packet in a session, and performs a route lookup to determine a route for the first packet. Then, the system caches a reference to the route and a neighbor in the session, and also caches a reference to the session in a tunnel within which packets in the session are to be forwarded. Based on a comparison between the route version number cached in the session and the route version number in a route table corresponding to the route referenced by a route index in the session, the system determines whether the route is stale. If so, the system performs another route lookup to update the route. Moreover, the system uses cached reference to the session in the tunnel for forwarding subsequent packets in the session. | 06-05-2014 |
20140156604 | Method and System for Maintaining Derived Data Sets - A first data set is derived from a second data set. The first data set is stored in a database of derived data sets. The second data set is updated without updating the first data set, such that the first data set and the second data are inconsistent. The first data set is deleted or updated during batch processing of the database of the derived data sets. | 06-05-2014 |
20140156720 | CONTROL PLANE PROTECTION FOR VARIOUS TABLES USING STORM PREVENTION ENTRIES - The present disclosure discloses a method and network device for control plane protection for various tables using storm prevention entries. Specifically, the disclosed system receives a first packet, and creates an inactive entry in a table. The system then forwards the first packet from a first processor to a second processor for processing. Also, the system associates the inactive entry with a timestamp indicating when the first packet is forwarded to the second processor, and determines a configured interval (CI) associated with the table. Further, the system compares a difference between a current timestamp and the timestamp associated with the inactive entry against the CI upon receiving a second packet. If the difference is longer than the CI, the system associates the inactive entry with the current timestamp, and forwards the second packet to the second processor for processing. Otherwise, the system discards the second packet. | 06-05-2014 |
20140156765 | SYSTEM AND METHOD FOR MESSAGE HANDLING IN A NETWORK DEVICE - The present disclosure discloses a method and system for achieving enhanced performance for application message handling. The disclosed system includes a device and is configured to receive, at a first processing layer implemented by the device, a message addressed to a first port. The system is further configured to modify the message to be addressed to a second port indicated in a body of the message prior to forwarding the message to a second processing layer implemented by the device. Furthermore, the system is configured to forward, by the first processing layer to the second processing layer, the modified message addressed to the second port. | 06-05-2014 |
20140156954 | SYSTEM AND METHOD FOR ACHIEVING ENHANCED PERFORMANCE WITH MULTIPLE NETWORKING CENTRAL PROCESSING UNIT (CPU) CORES - The present disclosure discloses a method and network device for achieving enhanced performance with multiple CPU cores in a network device having a symmetric multiprocessing architecture. The disclosed method allows for storing, by each central processing unit (CPU) core, a non-atomic data structure, which is specific to each networking CPU core, in a memory shared by the plurality of CPU cores. Also, the memory is not associated with any locking mechanism. In response to a data packet is received by a particular CPU core, the disclosed system will update a value of the non-atomic data structure corresponding to the particular CPU core. The data structure may be a counter or a fragment table. Further, a dedicated CPU core is allocated to process only data packets received from other CPU cores, and is responsible for dynamically responding to queries receives from a control plane process. | 06-05-2014 |
20140157365 | ENHANCED SERIALIZATION MECHANISM - The present disclosure discloses a method and network device for an enhanced serialization mechanism. Specifically, the disclosed system receives a plurality of packets from a plurality of transport layer flows corresponding to a security association. Also, the system designates one processor of a plurality of processors to be associated with the security association. Moreover, the system assigns a sequence number to each packet, and transmits the plurality of packets from the plurality of transport layer flows such that packets within the same transport layer flow are transmitted in order of their sequence numbers. However, at least two packets from two different transport layer flows may be transmitted out of incremental order of their sequence number. | 06-05-2014 |
20140269766 | Method and Apparatus for Packet Aggregation in a Network Controller - The aggregation of packets in a network controller is described. A packet, destined to a station, is received at a network device having a plurality of processors. The packet is queued into a selected queue of a plurality of queues based at least on an identifier of the station and a category associated with the packet. The packet is aggregated with other packets in a selected queue to create an aggregated packet if the selected queue has reached a predetermined size, and the aggregated packet is transmitted to the destination station. | 09-18-2014 |
20150023361 | TECHNIQUE FOR IMPLEMENTING VIRTUAL FABRIC MEMBERSHIP ASSIGNMENTS FOR DEVICES IN A STORAGE AREA NETWORK - A technique is provided for facilitating fabric membership login for an N_Port of a storage area network. A communication from a network node is received. The communication may include a portion of criteria associated with the N_Port. Using at least a portion of the portion of criteria, a virtual fabric identifier corresponding to a virtual fabric which is associated with the N_Port may be automatically identified. Fabric configuration information, which includes the virtual fabric identifier, may be automatically provided to the network node. A fabric login request from the N_Port to login to the virtual fabric may then be received. According to a specific embodiment, the communication may be transmitted from a network node to an F_Port on a Fibre Channel switch. When the N_Port received the fabric configuration information from the F_Port, the generating, using at least a portion of the received fabric configuration information, a fabric login request message may be generated by the N_Port which includes a fabric login request for the N_Port to login to the virtual fabric corresponding to the virtual fabric identifier. In at least one implementation, the N_Port and/or F_Port may be configured or designed to support trunking functionality. | 01-22-2015 |
Patent application number | Description | Published |
20100221616 | NON-AQUEOUS CELL HAVING AMORPHOUS OR SEMI-CRYSTALLINE COPPER MANGANESE OXIDE CATHODE MATERIAL - The present disclosure relates generally to a high capacity cathode material suitable for use in a non-aqueous electrochemical cell that comprises copper manganese oxide, which may be in amorphous or semi-crystalline form, and optionally fluorinated carbon. The present disclosure additionally relates to a non-aqueous electrochemical cell comprising such a cathode material and, in particular, to such a non-aqueous electrochemical cell that can deliver a higher capacity than conventional cell. | 09-02-2010 |
20100310907 | END OF LIFE INDICATION SYSTEM AND METHOD FOR NON-AQUEOUS CELL HAVING AMORPHOUS OR SEMI-CRYSTALLINE COPPER MANGANESE OXIDE CATHOD MATERIAL - The present disclosure relates generally to indicating an end of life condition of an electrochemical device, and more particularly to systems and methods for sensing and determining an end of life condition in a cell comprising a high capacity cathode material suitable for use in a non-aqueous electrochemical cell. The high capacity cathode material has an amorphous or semi-crystalline form of copper manganese oxide, and optionally fluorinated carbon. The present disclosure additionally relates to transmitting the determined end of life condition to a user or monitoring device of the cell. | 12-09-2010 |
20100310908 | NON-AQUEOUS ELECTROCHEMICAL CELL HAVING A MIXTURE OF AT LEAST THREE CATHODE MATERIALS THEREIN - The present disclosure relates generally to a high capacity cathode material suitable for use in a non-aqueous electrochemical cell that comprises a mixture of at least three different cathode materials, and more specifically a mixture of fluorinated carbon, an oxide of copper and an oxide of manganese. The present disclosure additionally relates to a non-aqueous electrochemical cell comprising such a cathode material and, in particular, to such a non-aqueous electrochemical cell that can deliver a higher capacity than a conventional cell, and/or that possesses an improved end-of-life indication. | 12-09-2010 |
20130065137 | HIGH RATE AND ENERGY CATHODE MATERIAL FOR LITHIUM BATTERIES - A cathode material suitable for use in non-aqueous electrochemical cells that includes copper manganese vanadium oxide and, optionally, fluorinated carbon. A non-aqueous electrochemical cell comprising such a cathode material, and a non-aqueous electrochemical cell that additionally includes a lithium anode. | 03-14-2013 |
20140079989 | LITHIUM-SULFUR BATTERY WITH PERFORMANCE ENHANCED ADDITIVES - A battery includes an anode containing a lithium material, a cathode containing sulfur and a porous conducting medium, and an electrolyte, wherein the electrolyte contains an additive selected from the group consisting of an organic surfactant additive, an inorganic additive, and a mixture thereof. The organic surfactant additive may be a fluorosurfactant | 03-20-2014 |
20150084604 | LITHIUM-SULFUR BATTERY AND METHODS OF PREVENTING INSOLUBLE SOLID LITHIUM-POLYSULFIDE DEPOSITION - An improved lithium-sulfur battery containing a surface-functionalized carbonaceous material. The presence of the surface-functionalized carbonaceous material generates weak chemical bonds between the functional groups of the surface-functionalized carbonaceous material and the functional groups of the polysulfides, which prevents the polysulfide migration to the battery anode, thereby providing a battery with relatively high energy density and good partial discharge efficiency. | 03-26-2015 |
Patent application number | Description | Published |
20080240060 | SYSTEM AND METHOD FOR REAL-TIME CORRELATION OF AAL2 AND AAL5 MESSAGES FOR CALLS IN UTRAN - System and method for correlating multiple frames of data associated with a single call into a call record. One embodiment comprises correlating data in a radio access network by capturing data passing to and from a radio network controller, identifying ATM Adaptation Layer type 5 (AAL5) frames within the data, assigning a first call identifier to the AAL5 frames, identifying ATM Adaptation Layer type 2 (AAL2) frames within the data, assigning a second call identifier to the AAL2 frames, and combining AAL2 frames and AAL5 frames having a same first call identifier and a same second call identifier into a call record. The data passing to and from the first radio network controller may be data passing over an Iub interface between a Node B and the radio network controller or data passing over an Iur interface between two radio network controllers. | 10-02-2008 |
20120155324 | Topology Detection of LTE Nodes - A network monitoring system probe is coupled to network interfaces and captures data packets. A monitoring system processor identifies messages specific to S1-MME interfaces and identifies GUMMEI parameters in the S1-MME interface messages. The monitoring system creates MME node entries in a network topology list, each of the MME nodes corresponding to a unique GUMMEI value. The monitoring system links individual S1-MME interfaces, SCTP associations, and MME IP addresses to a particular MME in the network topology list. Using authentication messages carried on the S6a and S1-MME interfaces, the monitoring system links individual S6a interfaces and S6a interface IP address to a particular MME in the network topology list and creates one or more HSS node entries in the network topology list. The monitoring system also creates eNodeB, S-GW, and PDN-GW nodes in the network topology list and links them to IP addresses and X2, S11, and S5/S8 interfaces. | 06-21-2012 |
20120155428 | LTE Network Call Correlation During User Equipment Mobility - A network monitoring system captures data packet from LTE/SAE network interfaces using passive probes. The monitoring system identifies context data associated with a first user on an S1-MME interface. Next hop parameters, such as a Next Hop Key and/or a Next Hop Chaining Counter, are derived for the first user equipment. The monitoring system creates a first context entry for the first user comprising of the next hop parameters. The monitoring system also identifies second context data associated with a second user on a second S1-MME interface. Next hop parameters are also identified for the second context data. The second context next hop parameters are compared to the first context next hop parameters. If they match, it is possible to track the user even in case of mobility, binding its activity on the two legs and retrieving the security parameters to be used for deciphering. | 06-21-2012 |
20120159151 | Evolved Packet System Non Access Stratum Deciphering Using Real-Time LTE Monitoring - A monitoring system is coupled to interfaces in an LTE network and passively captures packets from the network interfaces. First data packets associated with an authentication and key agreement procedure are captured on a first interface. Second data packets associated with the authentication and key agreement procedure are captured on a second interface. Individual ones of the first data packets are correlated to individual ones of the second data packets based upon a same parameter. An authentication vector table is created comprising information from the correlated first data packets and second data packets, wherein entries in the table comprise authentication data for a plurality of security contexts. A cipher key is identified to decipher additional packets for the user. The cipher key can also be identified in case of Inter Radio Access Technology Handover by the user equipment. | 06-21-2012 |
20120300639 | Multiple Protocol Correlation And Topology Detection in eHRPD Networks - Network nodes and interfaces are identified in a combined CDMA/eHRPD and LTE network. Messages captured by a monitoring system on different interfaces are combined in session records. The session records associated with the same network nodes correlated using parameters in the session records. Session records on an A11, A10 and S2a interfaces are correlated using a home network prefix and interface identifier data or home address information. | 11-29-2012 |
20130269001 | EVOLVED PACKET SYSTEM NON ACCESS STRATUM DECIPHERING USING REAL-TIME LTE MONITORING - A monitoring system is coupled to interfaces in an LTE network and passively captures packets from the network interfaces. First data packets associated with an authentication and key agreement procedure are captured on a first interface. Second data packets associated with the authentication and key agreement procedure are captured on a second interface. Individual ones of the first data packets are correlated to individual ones of the second data packets based upon a same parameter. An authentication vector table is created comprising information from the correlated first data packets and second data packets, wherein entries in the table comprise authentication data for a plurality of security contexts. A cipher key is identified to decipher additional packets for the user. The cipher key can also be identified in case of Inter Radio Access Technology Handover by the user equipment. | 10-10-2013 |
20130272127 | Session-Aware GTPv2 Load Balancing - Systems and methods for session-aware GTPv2 load balancing are described. In some embodiments, a method may include receiving a first and a second transaction between an MME and an S-GW over an Sll interface of an LTE/SAE network using a control portion of a second version of a GTPv2-C protocol and storing an uplink UP TEId and IP address, a downlink CP TEId and IP address, and an uplink CP TEId and IP address obtained from the first transaction, and a downlink UP TEId and IP address obtained from the second transaction. The method may further include identifying messages between an eNodeB and the S-GW over a direct tunnel using a user portion of a GTPv1-U protocol as belonging to a session in response to the messages including at least one of: the first uplink UP TEId and IP address, or the first downlink UP TEId and IP address. | 10-17-2013 |
20140003333 | S1-MME and LTE-Uu Interface Correlation in Long Term Evolution Networks | 01-02-2014 |
20140080447 | Multiple Protocol Session Record Mapper - A mapper for use in processing messages captured from a telecommunications network is disclosed. In one embodiment, one or more LTE messages are received from a LTE network, and one or more CDMA messages are received from a CDMA network. An LTE/CDMA mapper entry associated with the LTE and CDMA messages is identified. The LTE/CDMA mapper is associated with UE that is capable of operating on both the LTE and CDMA networks. The LTE and CDMA messages are processed using the LTE/CDMA mapper. The processing of the LTE and CDMA messages may comprise extracting parameters from the LTE or CDMA messages and storing the parameters to the LTE/CDMA mapper. The content in the LTE or CDMA messages may be deciphered using authentication parameters stored in the LTE/CDMA mapper. A generic client library may be used, for example, to access the LTE/CDMA mapper. | 03-20-2014 |
20140122874 | Deciphering Internet Protocol (IP) Security in an IP Multimedia Subsystem (IMS) using a Monitoring System - Systems and methods for deciphering Internet Protocol (IP) security in an IP Multimedia Subsystem (IMS) using a monitoring system are described. In some embodiments, a method may include identifying a Security Association (SA) between a User Equipment (UE) and a Proxy Call Session Control Function (P-CSCF) of an Internet Protocol (IP) Multimedia Subsystem (IMS) over a Gm interface during a registration procedure, correlating the SA with a ciphering key (CK) exchanged between the P-CSCF and a Serving CSCF (S-CSCF) of the IMS over an Mw interface during the registration procedure, and storing an indication of the correlated SA and CK in a deciphering record. | 05-01-2014 |
20140140321 | Monitoring 3G/4G Handovers in Telecommunication Networks - Systems and methods for monitoring 3G/4G handovers in telecommunication networks are described. In some embodiments, a method may include receiving a plurality of packets at a telecommunications monitoring system, the plurality of packets including a first packet following a first version of a protocol and a second packet following a second version of the protocol. The method may also include determining, via the a telecommunications monitoring system, that the first packet belongs to a first communication session that is correlated with a second communication session to which the second packet belongs. The method may further include using the telecommunications monitoring system to associate the first packet with the second packet in response to the determination. | 05-22-2014 |
20140171089 | Monitoring Traffic Across Diameter Core Agents - Systems and methods for monitoring traffic across Diameter Core Agents (DCAs) such as, for example, Diameter Signaling Routers (DSRs) and/or Diameter Routing Agents (DRAs). In some embodiments, a method may include receiving a first set of one or more messages at a telecommunications monitoring system, the first set of one or more messages transmitted between a Diameter client and a Diameter device. The method may also include receiving a second set of one or more messages at the telecommunications monitoring system, the second set of one or more messages transmitted between the Diameter device and a Diameter server. The method may further include correlating the first set of one or more messages with the second set of one or more messages as part of a single Diameter call. | 06-19-2014 |
20140344441 | SYSTEM AND METHOD FOR GTP SESSION PERSISTENCE AND RECOVERY - A method for monitoring GPRS Tunneling Protocol (GTP) sessions in a mobile communication network having a monitoring module. The method includes the steps of monitoring, by the monitoring module, a plurality of subscriber GTP sessions, and storing recovery parameters related to the subscriber GTP sessions and subscribers associated therewith in records in a database in the monitoring module, wherein the recovery parameters are associated with initial session data for each subscriber GTP session. Upon an outage in monitoring, the method restarts the monitoring module to determine restart parameters associated with existing subscriber GTP sessions and subscribers associated therewith in the records in the database wherein the restart parameters are associated with subsequent session data for each subscriber GTP session. Before attempting to process any packets, the method associates the subsequent session data with the initial session data based upon comparing the recovery parameters with the restart parameters. | 11-20-2014 |
20150189616 | SYSTEMS AND METHODS FOR PROVIDING LOCATION BASED SERVICES - An subscriber location device for determining location information for User Equipment (UE) in a communication network monitors a network interface between a Mobility Management Entity node and an Evolved Serving Mobile Location Center (E-SMLC) node, receive location information from network interface between the MME node and the E-SMLC node, associates the received location information with corresponding UE to yield associated location information and stores the associated location information in a subscriber location database, indexed according to the UE. | 07-02-2015 |
20150327091 | SELECTIVE REAL-TIME GTP SESSION TRACKING USING DISTRIBUTED PROCESSING TECHNIQUES - A distributed network monitoring device monitors via a lightweight session tracking module of a network monitoring device, control plane data for connectivity sessions of User Equipment (UE) in a communication network. The lightweight session tracking module selectively identifies at least one bearer for a corresponding connectivity session according to one or more control plane attributes and associates each selectively identified bearer for the corresponding connectivity session with a bearer routing rule for user plane data. A packet routing module receives user plane data for connectivity sessions of UE and transmits the user plane data of the connectivity sessions according to the bearer routing rule of the lightweight session tracking module to a flow processing module for subsequent data flow analysis. | 11-12-2015 |