Patent application number | Description | Published |
20090164782 | METHOD AND APPARATUS FOR AUTHENTICATION OF SERVICE APPLICATION PROCESSES IN HIGH AVAILABILITY CLUSTERS - A method and communication node that for generate a unique service application process biometric identifier for a service application service application process requesting resources and services to another service application service application process in a High Availability (HA) cluster. The method and communication node further authenticate the requesting service application service application process using the unique service application process biometric identifier and thus allowing communication between the first service application process and the second service application process. | 06-25-2009 |
20100183316 | Methods and Systems for Dynamic Equalization Delay Passive Optical Networks - Systems and methods according to these exemplary embodiments provide for methods and systems improving the protocol efficiency in passive optical networks. Additionally, methods and systems for calculating and transmitting an equalization delay change message are described. | 07-22-2010 |
20100189440 | Methods and Systems for Transmitting Data in Scalable Passive Optical Networks - Systems and methods according to these exemplary embodiments provide for methods and systems that enable decoupling of medium access control (MAC) functions from other optical transceiver functions to, for example, promote scalability of passive optical networks (PONs). A MAC frame processing unit can communicate MAC frames to optical transceiver modules via an interconnect using an encapsulating frame according to another communications protocol, e.g., XAUI. | 07-29-2010 |
20100208747 | OUTPUT DEMULTIPLEXING FOR DYNAMIC BANDWIDTH ALLOCATION IN PASSIVE OPTICAL NETWORKS - Systems and methods according to these exemplary embodiments provide for mechanisms and methods that allow for improving the efficiency of a passive optical network (PON). Upstream data transmission can occur by allowing an optical network unit (ONU) cycle to overlap more than one GPON transmission convergence (GTC) frame. Additionally, or alternatively, multiple different bandwidth maps can be transmitted per dynamic bandwidth allocation (DBA) cycle to inform ONUs of their respective, upstream bandwidth allocations. | 08-19-2010 |
20100208752 | Methods and Systems for Frame Generation in Communication Networks - Exemplary embodiments provide for methods and systems that enable frame generation by fields taken from various queues. Protocol control can also or alternatively be distributed so that one or more header fields can be generated separately from other portions of a frame, e.g., the payload. The one or more header fields can be entered into queues from which they are taken to generate frames. | 08-19-2010 |
20100278533 | BIT MASK TO OBTAIN UNIQUE IDENTIFIER - Methods and communication nodes for assigning unique identifiers to a plurality of nodes. A plurality of data values are maintained in memory, each being associated to one of the nodes. A bit mask value is obtained that, when applied to the plurality of data values, produces a plurality of unique identifiers. The bit mask value is made available to the nodes thereby assigning a unique identifier to each of the nodes. | 11-04-2010 |
20100302079 | METHOD FOR ALIGNING A SERIAL BIT STREAM WITH A PARALLEL OUTPUT - The invention relates to a method and circuit for aligning a serial bit stream with a parallel output. The method comprises latching Q bits from the serial bit stream into a register, locating a position P of a first bit of a start of frame delimiter (SFD) in the register and discarding P-1 bits from the serial bit stream, before the position of the first bit of the SFD, thereby aligning the serial bit stream with the parallel output. The circuit comprises a latch, a fault tolerant analysis logic (FTAL) for locating a position P of a first bit of a start of frame delimiter (SFD) in the register and a shift register for discarding P-1 bits from the serial bit stream, before the position of the first bit of the SFD, thereby aligning the serial bit stream with the parallel output. | 12-02-2010 |
20110138475 | SYSTEMS AND METHOD FOR PROVIDING TRUSTED SYSTEM FUNCTIONALITIES IN A CLUSTER BASED SYSTEM - A framework for providing cluster-wide cryptographic operations, including: signing, sealing, binding, unsealing, and unbinding. The framework includes an interface module (a.k.a., HAT agent) on each of a plurality of nodes in the cluster. Each HAT agent is configured to respond to an application's request for a cluster crypto operation by communication with other HAT agents in the cluster and utilizing a trusted platform module local to the node where the HAT agent resides. | 06-09-2011 |
20120163178 | Multiple-Algorithm Congestion Management - Methods and devices performing management of traffic on a single network device using plural congestion avoidance algorithms are provided. A traffic management method includes (i) separating an incoming traffic in sub-streams of traffic based on at least one characteristic, (ii) managing virtual queues corresponding to the sub-streams of traffic, using congestion avoidance algorithms configured to each operate on one sub-stream of traffic to avoid congestion within a capacity allocated to the one of the at least two sub-streams of traffic, and (iii) dynamically reallocating a total capacity of traffic through the single network device to the virtual queues, a capacity reallocated to a virtual queue depending on a proportion of the incoming traffic, historical or current, in a sub-streams of traffic to which the virtual queue corresponds. | 06-28-2012 |
20120324572 | SYSTEMS AND METHODS THAT PERFORM APPLICATION REQUEST THROTTLING IN A DISTRIBUTED COMPUTING ENVIRONMENT - Methods of managing network traffic in a distributed computing environment include segmenting a plurality of virtual hosts into sub-groups. A first security agent monitors first communications of virtual hosts within a first sub-group of virtual hosts, and a second security agent monitors second communications of virtual hosts within a second sub-group of virtual hosts. Information regarding the first communications and the second communications is collected from the security agents and analyzed to detect a denial of service attack. A defense mechanism is initiated in response to detecting the denial of service attack. | 12-20-2012 |