Patent application number | Description | Published |
20130329548 | RE-ROUTING NETWORK TRAFFIC AFTER LINK FAILURE - In one example, a network device includes a virtual network agent, and a network interface to send network packets to the virtual network controller using a default route for a physical network prior to establishing a communication session between a virtual network controller and the virtual network agent, wherein, after establishing the communication session between the virtual network controller device and the virtual network agent, the virtual network agent receives from the virtual network controller a command to install a new route at the network device, wherein the new route specifies encapsulation information to use for encapsulating network packets for sending the network packets to the virtual network controller over an overlay network, and wherein, responsive to detecting a failed link in the physical network, the virtual network agent sends packets to the virtual network controller on an alternate route in the overlay network. | 12-12-2013 |
20130329605 | MULTICAST SERVICE IN VIRTUAL NETWORKS - Techniques are described to provide multicast service within a virtual network using a virtual network controller and endpoint replication without requiring multicast support in the underlying network. The virtual network controller is configured to create a multicast tree for endpoint devices of a multicast group in the virtual network at a centralized location instead of in a distributed fashion. The virtual network controller communicates the multicast tree to one or more of the endpoint devices of the multicast group to instruct the endpoint devices to replicate and forward multicast packets to other endpoint devices according to the multicast tree. The replication and forwarding of multicast packets is performed by virtual switches executed on the endpoint devices in the virtual network. No replication is performed within the underlying network. The techniques enable multicast service within a virtual network without requiring multicast support in the underlying network. | 12-12-2013 |
20130332577 | MULTITENANT SERVER FOR VIRTUAL NETWORKS WITHIN DATACENTER - In general, techniques are described for facilitating multi-tenancy of a server accessed by virtual networks of a data center. A device included within a data center comprising one or more processors may perform the techniques. The processors may be configured to execute a virtual switch that supports a number of virtual networks executing within the data center. The virtual switch may be configured to receive a request regarding data associated with an identifier that is unique within one of the virtual networks that originated the request. The virtual switch may then translate the identifier included within the request to generate a globally unique identifier that is unique within the plurality of virtual networks, update the request to replace the identifier included within the request with the globally unique identifier, and transmit the updated request to a server of the data center. | 12-12-2013 |
20150244617 | PHYSICAL PATH DETERMINATION FOR VIRTUAL NETWORK PACKET FLOWS - In general, techniques are described for configuring and managing virtual networks. For example, a distributed virtual network controller is described that configures and manages an overlay network within a physical network formed by plurality of switches. A plurality of servers are interconnected by the switch fabric, each of the servers comprising an operating environment executing one or more virtual machines in communication via the overlay networks. The servers comprises a set of virtual switches that extends the overlay network as a virtual network to the operating environment of the virtual machines. The controller may instruct the servers and the virtual switches to perform various operations, such as determining a physical network path taken by packets of a network packet flow, determining latency through the network, re-routing traffic in the virtual network due to network events, replicating traffic for multicasting, providing multi-tenant services to support multiple virtual networks, monitoring and logging traffic characteristics within the virtual networks and other operations. | 08-27-2015 |
Patent application number | Description | Published |
20100278076 | AUTOMATIC CONFIGURATION OF VIRTUAL NETWORK SWITCHES - In general, techniques are described in which a plurality of network switches automatically configure themselves to operate as a single virtual network switch. A virtual switch is a collection of individual switch devices that operate like as single network switch. As described herein, network switches in a network that are capable of participating in a virtual switch may automatically discover one another. The participating network switches may then elect one of the participating switches as a master switch. The master switch may generate forwarding information and store the forwarding information in the participating switches, including the master switch. The forwarding information causes the participating switches to act like a single network switch. | 11-04-2010 |
20110134803 | CONFIGURING NETWORKS INCLUDING SPANNING TREES - A method may include receiving a reconfiguration to a first Virtual Local Area Network (VLAN)/spanning tree table, where the first VLAN/spanning tree table has a first identifier and is associated with a region of a network; updating the first VLAN/spanning tree table to generate a second VLAN/spanning tree table based on the reconfiguration; determining a second identifier of the second VLAN/spanning tree table; and generating a list of identifiers associated with the region of the network, the list including the first identifier and the second identifier. | 06-09-2011 |
20130145356 | AUTOMATIC SOFTWARE UPDATE ON NETWORK DEVICES - A method may include contacting, by a network device, another device to obtain at least one of a network address, authentication, or authorization, receiving, from the other device, software update information that identifies an up-to-date software that the network device should have installed and location information that identifies a location from which to retrieve the up-to-date software, comparing, by the network device, the software update information to software information that identifies software currently installed on the network device, retrieving, by the network device, the up-to-date software based on the software update information and the location information when the software update information and the software information do not match, and auto-installing, by the network device, the up-to-date software. | 06-06-2013 |
20140140245 | CONFIGURING NETWORKS INCLUDING SPANNING TREES - A method may include receiving a reconfiguration to a first Virtual Local Area Network (VLAN)/spanning tree table, where the first VLAN/spanning tree table has a first identifier and is associated with a region of a network; updating the first VLAN/spanning tree table to generate a second VLAN/spanning tree table based on the reconfiguration; determining a second identifier of the second VLAN/spanning tree table; and generating a list of identifiers associated with the region of the network, the list including the first identifier and the second identifier. | 05-22-2014 |
Patent application number | Description | Published |
20100323651 | TUNABLE ADAPTIVE FILTER WITH VARIABLE GAIN TRANS-CONDUCTANCE STAGE - In an exemplary embodiment, the communication device including an analog filter, where a digital signal processor sets the gain of the analog filter and the pole location of the filter simultaneously in order to maintain the filter pole location at a desired value or within a desired range. In further exemplary embodiments, the methodology to simultaneously set the gain and the pole location of the filters. | 12-23-2010 |
20100327844 | CURRENT MIRROR, DEVICES INCLUDING SAME, AND METHODS OF OPERATION THEREOF - Exemplary embodiments are directed to a current mirror and method of operation thereof. A method may include biasing a first transistor with a voltage at a gate of a second transistor to cause the first transistor to conduct, wherein the first transistor has a source operably coupled to a drain of a third transistor and a drain operably coupled to a gate of the third transistor. The method may also include providing an input current at the drain of the third transistor. Moreover, the method may include decreasing or increasing a voltage at the gate of the first transistor when a voltage at the gate of the second transistor and the drain of the first transistor respectively decreases or increases. Furthermore, the method may include generating an output current in a drain of a fourth transistor having a gate operably coupled to the gate of the third transistor. | 12-30-2010 |
20110001539 | MIXER-TRANSCONDUCTANCE INTERFACE - Techniques for providing an efficient interface between a mixer block and a transconductance (Gm) block. In an exemplary embodiment, the output currents of at least two unit cells of the transconductance block are conductively coupled together, and coupled to the mixer block using a single conductive path. For a differential signal, the conductive path may include two conductive leads. Within the mixer block, the single conductive path may be fanned out to at least two unit cells of the mixer block. At least one Gm unit cell may be selectively enabled or disabled to control the gain setting of the mixer-transconductance block. The techniques may further be applied to transceiver architectures supporting in-phase and quadrature mixing, as well as multi-mode and/or multi-band operation. | 01-06-2011 |
20130225107 | WIRELESS DEVICE WITH FILTERS TO SUPPORT CO-EXISTENCE IN ADJACENT FREQUENCY BANDS - Techniques for using a narrow filter located before a power amplifier to reduce interference in an adjacent frequency band are disclosed. In an exemplary design, an apparatus (e.g., a wireless device) includes the narrow filter and the power amplifier. The narrow filter is for a first frequency band (e.g., Band 40) and has a first bandwidth that is more narrow than the first frequency band. The narrow filter receives and filters an input radio frequency (RF) signal and provides a filtered RF signal. The power amplifier receives and amplifies the filtered RF signal and provides an amplified RF signal. The apparatus may further include a full filter for the first frequency band and located after the power amplifier. The full filter receives and filters the amplified RF signal and provides an output RF signal when it is selected for use. | 08-29-2013 |
20150349733 | TRANSMITTER DIGITAL-TO-ANALOG CONVERTER (DAC)- BASEBAND FILTER (BBF) COMMON MODE INTERFACE - Removing common-mode current from a pair of complementary current signals, including: generating a common-mode voltage of the pair of complementary current signals including at least a first current signal and a second current signal; measuring and outputting a difference voltage between the generated common-mode voltage and a common-mode reference voltage; and removing at least a portion of the common-mode current from the first current signal and the second current signal based on the difference voltage. | 12-03-2015 |
20150349821 | FEEDBACK RECEIVE PATH WITH RF FILTER - An apparatus includes an elliptical inductance-capacitance (LC) filter and a resistive-capacitive (RC) notch filter serially coupled to the elliptical LC filter. The elliptical LC filter and the RC notch filter are configured to filter a radio-frequency (RF) signal received by a feedback receive path. | 12-03-2015 |
Patent application number | Description | Published |
20110284950 | Method for fabricating a shallow and narrow trench FETand related structures - Disclosed is a method for fabricating a shallow and narrow trench field-effect transistor (trench FET). The method includes forming a trench within a semiconductor substrate of a first conductivity type, the trench including sidewalls and a bottom portion. The method further includes forming a substantially uniform gate dielectric in the trench, and forming a gate electrode within said trench and over said gate dielectric. The method also includes doping the semiconductor substrate to form a channel region of a second conductivity type after forming the trench. In one embodiment, the doping step is performed after forming the gate dielectric and after forming the gate electrode. In another embodiment, the doping step is performed after forming the gate dielectric, but prior to forming the gate electrode. Structures formed by the invention's method are also disclosed. | 11-24-2011 |
20130256744 | IGBT with Buried Emitter Electrode - There are disclosed herein various implementations of an insulated gate bipolar transistor (IGBT) with buried emitter electrodes. Such an IGBT may include a collector at a bottom surface of a semiconductor substrate, a drift region having a first conductivity type situated over the collector, and a base layer having a second conductivity type opposite the first conductivity type situated over the drift region. In addition, such an IGBT may include deep insulated trenches extending from a semiconductor surface above the base layer, into the drift region, each of the deep insulated trenches having a buried emitter electrode disposed therein. The IGBT may further include an active cell including an emitter, a gate trench with a gate electrode disposed therein, and an implant zone situated, between adjacent deep insulated trenches. The implant zone is formed below the base layer and has the first conductivity type. | 10-03-2013 |
20130256745 | Deep Gate Trench IGBT - There are disclosed herein various implementations of an insulated-gate bipolar transistor (IGBT) with buried depletion electrode. Such an IGBT may include a collector at a bottom surface of a semiconductor substrate, a drift region having a first conductivity type situated over the collector, and a base layer having a second conductivity type opposite the first conductivity type situated over the drift region. The IGBT also includes a plurality of deep insulated trenches with a buried depletion electrode and at least one gate electrode disposed therein. In addition, the IGBT includes an active cell including an emitter adjacent the gate electrode, and an implant zone, situated between adjacent deep insulated trenches. The implant zone is formed below the base layer and has the first conductivity type. In one implementation, the IGBT may also include a dummy cell neighboring the active cell. | 10-03-2013 |
20130264636 | Trench FET with Ruggedness Enhancement Regions - According to an exemplary implementation, a field-effect transistor (FET) includes first and second gate trenches extending to a drift region of a first conductivity type. The FET also includes a base region of a second conductivity type that is situated between the first and second gate trenches. A ruggedness enhancement region is situated between the first and second gate trenches, where the ruggedness enhancement region is configured to provide an enhanced avalanche current path from a drain region to the base region when the FET is in an avalanche condition. The enhanced avalanche current path is away from the first and second gate trenches. The ruggedness enhancement region can be of the second conductivity type that includes a higher dopant concentration than the base region. Furthermore, the ruggedness enhancement region can be extending below the first and second gate trenches. | 10-10-2013 |
20140028369 | Level Shifter Utilizing Bidirectional Signaling Through a Capacitive Isolation Barrier - According to an exemplary implementation, a level shifter includes a low voltage circuit and a high voltage circuit. The low voltage circuit is configured to provide a differential signal to the high voltage circuit through a capacitive isolation barrier. The high voltage circuit is configured to receive the differential signal from the low voltage circuit through the capacitive isolation barrier so as to level shift the differential signal from a first ground of the low voltage circuit to a second ground of the high voltage circuit. The high voltage circuit is further configured to provide a feedback signal to the low voltage circuit through the capacitive isolation barrier. The low voltage circuit can be configured to receive the feedback signal from the low voltage circuit between edges of the differential signal. | 01-30-2014 |
20140028371 | Level Shifter Having Feedback Signal From High Voltage Circuit - According to an exemplary implementation, a level shifter includes a low voltage circuit and a high voltage circuit. The low voltage circuit is configured to provide a differential signal to the high voltage circuit. The high voltage circuit is configured to receive the differential signal from the low voltage circuit so as to level shift the differential signal from a first ground of the low voltage circuit to a second ground of the high voltage circuit. The differential signal is provided by the low voltage circuit responsive to a feedback signal from the high voltage circuit. The feedback signal can indicate common mode noise in the level shifter. Furthermore, the low voltage circuit can be configured to refresh the differential signal responsive to the feedback signal. | 01-30-2014 |
20140118032 | Buck Converter Power Package - One exemplary disclosed embodiment comprises a semiconductor package including a vertical conduction control transistor and a vertical conduction sync transistor. The vertical conduction control transistor may include a control source, a control gate, and a control drain that are all accessible from a bottom surface, thereby enabling electrical and direct surface mounting to a support surface. The vertical conduction sync transistor may include a sync drain on a top surface, which may be connected to a conductive clip that is coupled to the support surface. The conductive clip may also be thermally coupled to the control transistor. Accordingly, all terminals of the transistors are readily accessible through the support surface, and a power circuit, such as a buck converter power phase, may be implemented through traces of the support surface. Optionally, a driver IC may be integrated into the package, and a heatsink may be attached to the conductive clip. | 05-01-2014 |
20140374825 | Power Semiconductor Device with Contiguous Gate Trenches and Offset Source Trenches - Disclosed is a power semiconductor device that includes a plurality of source trenches and adjacent source regions. The plurality of source trenches extend from a top surface of a semiconductor substrate into the semiconductor substrate. The power semiconductor device further includes a plurality of gate trenches that extend from the top of the semiconductor substrate into the semiconductor substrate, and are arranged in hexagonal or zigzag patterns. A contiguous formation is created by the plurality of gate trenches, and the plurality of gate trenches separate the plurality of source trenches from one another. | 12-25-2014 |
20150054564 | Level Shifter Utilizing a Capacitive Isolation Barrier - According to an exemplary implementation, a level shifter includes a low voltage circuit and a high voltage circuit. The low voltage circuit is configured to provide a differential signal to the high voltage circuit through a capacitive isolation barrier. The high voltage circuit is configured to receive the differential signal from the low voltage circuit through the capacitive isolation barrier so as to level shift the differential signal from a first ground of the low voltage circuit to a second ground of the high voltage circuit. The high voltage circuit is further configured to provide a feedback signal to the low voltage circuit through the capacitive isolation barrier. The low voltage circuit can be configured to receive the feedback signal from the low voltage circuit between edges of the differential signal. | 02-26-2015 |
Patent application number | Description | Published |
20140095430 | CREATING A SINGLE SOCIAL GRAPH FOR A USER - The present invention is directed to methods and systems for providing personal connection alerts. The user desires to have a personal connection with a target person. An indicator for a target is provided by the user. The indicator is often the name of the target, but can also be a picture of the target, or other information. A record for the target is created based on the received indicator. The target record is stored. A variety of additional information regarding the target may be obtained from external or internal sources and also stored in the target record. Then the target record is periodically compared with the user's social sphere of influence, which comprises the user's primary and secondary connections. The comparison includes at least comparing the target with the user's secondary connections. When the target record matches at least one of the user's secondary connections, an alert is provided. | 04-03-2014 |
20140095620 | SEARCHING SOCIAL CONNECTIONS OF A USER - The present invention is directed to methods and systems for providing personal connection alerts. The user desires to have a personal connection with a target person. An indicator for a target is provided by the user. The indicator is often the name of the target, but can also be a picture of the target, or other information. A record for the target is created based on the received indicator. The target record is stored. A variety of additional information regarding the target may be obtained from external or internal sources and also stored in the target record. Then the target record is periodically compared with the user's social sphere of influence, which comprises the user's primary and secondary connections. The comparison includes at least comparing the target with the user's secondary connections. When the target record matches at least one of the user's secondary connections, an alert is provided. | 04-03-2014 |
20150205836 | SYSTEM AND METHOD FOR CREATING PERSONAL CONNECTION ALERTS - The present invention is directed to methods and systems for providing personal connection alerts. The user desires to have a personal connection with a target person. An indicator for a target is provided by the user. The indicator is often the name of the target, but can also be a picture of the target, or other information. A record for the target is created based on the received indicator. The target record is stored. A variety of additional information regarding the target may be obtained from external or internal sources and also stored in the target record. Then the target record is periodically compared with the user's social sphere of influence, which comprises the user's primary and secondary connections. The comparison includes at least comparing the target with the user's secondary connections. When the target record matches at least one of the user's secondary connections, an alert is provided. | 07-23-2015 |
20150205837 | SYSTEM AND METHOD FOR CREATING PERSONAL CONNECTION ALERTS - The present invention is directed to methods and systems for providing personal connection alerts. The user desires to have a personal connection with a target person. An indicator for a target is provided by the user. The indicator is often the name of the target, but can also be a picture of the target, or other information. A record for the target is created based on the received indicator. The target record is stored. A variety of additional information regarding the target may be obtained from external or internal sources and also stored in the target record. Then the target record is periodically compared with the user's social sphere of influence, which comprises the user's primary and secondary connections. The comparison includes at least comparing the target with the user's secondary connections. When the target record matches at least one of the user's secondary connections, an alert is provided. | 07-23-2015 |
Patent application number | Description | Published |
20110173490 | HIGH AVAILABILITY FOR NETWORK SECURITY DEVICES - In one example, a backup intrusion detection and prevention (IDP) device includes one or more network interfaces to receive a state update message from a primary IDP device, wherein the state update message indicates a network session being inspected by the primary IDP device and an identified application-layer protocol for the device, to receive an indication that the primary device has switched over or failed over to the backup device, and to receive a plurality of packets of the network session after receiving the indication, each of the plurality of packets comprising a respective payload including application-layer data, a protocol decoder to detect a beginning of a new transaction from the application-layer data of one of the plurality of packets, and a control unit to statefully process only the application-layer data of the network session that include and follow the beginning of the new transaction. | 07-14-2011 |
20130042323 | HIGH AVAILABILITY FOR NETWORK SECURITY DEVICES - In one example, a backup intrusion detection and prevention (IDP) device includes one or more network interfaces to receive a state update message from a primary IDP device, wherein the state update message indicates a network session being inspected by the primary IDP device and an identified application-layer protocol for the device, to receive an indication that the primary device has switched over or failed over to the backup device, and to receive a plurality of packets of the network session after receiving the indication, each of the plurality of packets comprising a respective payload including application-layer data, a protocol decoder to detect a beginning of a new transaction from the application-layer data of one of the plurality of packets, and a control unit to statefully process only the application-layer data of the network session that include and follow the beginning of the new transaction. | 02-14-2013 |
Patent application number | Description | Published |
20140219112 | SELECTIVE PRIORITIZATION OF DATA PACKETS TO IMPROVE DATA TRAFFIC - Techniques are described herein for prioritizing higher priority data packets by reserving sequence numbers for assignment to higher priority data packets received after lower priority data packets are assigned sequence numbers. Higher priority data packets may also be prioritized by estimating an amount of data that can be sent in a single uplink allocation, limiting the amount of data packet data sent during a designated uplink allocation to the estimated amount of data, and encrypting high priority data packet(s) received previous to the designated uplink allocation. Higher priority data packets may also be prioritized by encrypting and placing high priority data packet(s) received in a queue, and subsequently re-encrypting any unsent lower priority data packets that were encrypted in the queue before the high priority data packet(s) were received. | 08-07-2014 |
20140355522 | Systems and Methods for Splitting and Recombining Communications in Multi-Network Environments - Systems and methods for providing dynamic substream definition and handover are provided. In embodiments, a user device includes a multiple radio access technology (RAT) communications modules and a communication controller. Each RAT communication module is further configured to communicate using a different RAT. The user device identifies available networks for communication. Then, the controller determines whether a need to split a communications stream exists (e.g., the user device is engaged in a bandwidth intensive application). If the communications stream is to be split, the controller defines the substreams (either equally or unequally) and assigns a first substream to a communication pathway in a first available network and assigns a second substream to a communication pathway in a second available network. The destination then recombines the substreams. In embodiments, the controller inserts synchronization in the substreams. | 12-04-2014 |
20150024743 | Cell Selection and Reselection Optimizations Responsive to Mobility State - User equipment (UE) obtains system information using a foreground or background process. The system information may include cell information that distinguishes femtocells from macrocells. Given this cell information, the UE may avoid tuning to or attempting to connect to cell types that the UE does not support. For instance, the UE may avoid connection attempts to femtocells, when the UE does not support femtocell connections. | 01-22-2015 |
Patent application number | Description | Published |
20110228747 | Methods and Systems for Uplink Network Entry and Bandwidth Requests - Methods and systems of a mobile station transmitting information to a base station are disclosed. The mobile station may transmit information with improved uplink coverage, and bandwidth requests may be more efficient. Additionally, the mobile station may transmit information over multiple uplink frames using hybrid ARQ. | 09-22-2011 |
20120071195 | Transmit Power Management for Specific Absorption Rates - Systems and methods for regulating transmit power in a mobile station to comply with SAR limits are disclosed. A mobile station may include a processor, transmitter, and proximity sensor. The transmitter is configured to operate at a transmit power controlled by a first transmit power limit. The proximity sensor identifies how close the mobile station is to a human head. A transmit power regulator, implemented on the processor, determines the cumulative energy radiated by the transmitter over a specified number of frames. If the cumulative energy exceeds an energy limit based on a SAR limit, and the proximity sensor indicates that the mobile station is close to a human head, the transmit power regulator may decrease the transmit power limit of the transmitter. | 03-22-2012 |
20120142291 | Distribution of Transmit Signal to Multiple Transmit Antennas for Reduction of Measured Specific Absorption Rate - Various embodiments of the present invention recognize at least two zones of operation for a communication device. In a first zone, which is sufficiently spaced away from a human head or body that SAR limits will be met, transmit power delivered to an antenna of a communication device may be maximized within any other constraints under which the communication device operates. In a second zone, which is not sufficiently spaced away from a human head or body, transmit power is redistributed such that SAR limitations are met without affecting the transmit power control loop of the communication device. For example, a second antenna physically disposed at a different location within the communication device may be used either instead of, or in addition to, the first transmit antenna in order that the SAR limits are met. | 06-07-2012 |
20120213149 | Method and System for Power Headroom Reporting in the Presence of Multiple Transmit Antennas - A method and system are provided in which a mobile device may be operable for long term evolution (LTE) communication or some other wireless technology via two or more transmit antennas. The device may comprise a power amplifier for each transmit antenna with substantially similar maximum power being provided by both amplifiers. A power headroom value may be determined in the device based on path loss values between the transmit antennas and a base station and the maximum transmit power for each transmit antenna. Transmission via one of the transmit antennas may occur concurrently with transmission via another of the transmit antennas. The device may generate an indication of the determined power headroom value for communication to the base station. The power headroom value may be reported periodically or in response to a change in the power received at the base station. | 08-23-2012 |
20130130694 | WIRELESS COMMUNICATION DEVICE CAPABLE OF EFFICIENT HANDOFFS - A wireless communication device is disclosed that is capable of performing efficient handoffs in order to maximize connection time with either a serving or target base station. The wireless communication device performs measurements of only intra-frequency base stations to avoid retuning its radio module. Based on this information, as well as stored information relating to nearby base stations, the serving base station is able to estimate a position of the wireless communication device and compare the estimated position to positions of the known base stations in order to make a handoff decision. In addition, by storing information during measurement or handoff preparation, the device is capable of skipping handoff steps, immediately return to the serving base station after handoff failure, and/or perform streamlined PLMN searching. | 05-23-2013 |