Patent application number | Description | Published |
20080205445 | Optimizing TCP traffic via an SCTP association - In one embodiment, a method can include: (i) pre-configuring a stream control transmission protocol (SCTP) association; (ii) receiving a transmission control protocol (TCP) packet in a network device, where the TCP packet is intended for a destination node; (iii) encapsulating the TCP packet into an SCTP payload; and (iv) transmitting the SCTP payload across a wide area network (WAN). | 08-28-2008 |
20080313347 | Optimizations for TCP connection setup and teardown - In one embodiment, a first network device receives a control message in a first protocol from a client, the control message in the first protocol being addressed to a second network device. The first network device identifies an existing connection in a second protocol that is associated with the second network device. The first network device establishes a connection in the first protocol with the client according to a status of the existing connection in the second protocol that is associated with the second network device. | 12-18-2008 |
20090037713 | OPERATION, ADMINISTRATION AND MAINTENANCE (OAM) FOR CHAINS OF SERVICES - In one embodiment, a method can include: selecting an operation, administration, and maintenance (OAM) type for a destination, where the destination is enabled for a service insertion architecture (SIA); encapsulating an OAM packet with the OAM type indicated in a service header therein; and sending the OAM packet to the destination. | 02-05-2009 |
20090052372 | DYNAMIC POWER USAGE MANAGEMENT BASED ON HISTORICAL TRAFFIC PATTERN DATA FOR NETWORK DEVICES - Particular embodiments provide power usage management for network devices according to historical traffic pattern data. Network traffic statistics for traffic flowing through a network device may be determined. A traffic pattern for a time period based on the traffic flowing through the network device is then determined. The network device may then manage power based on the pattern. For example, when a pattern indicates that traffic flowing through the network device is light during a time period, then the network device may operate in a lower power mode, such as a standby mode and when it indicates that there is higher usage, the network device may operate in a normal power mode. In one embodiment, a power usage policy may be determined based on the historical traffic patterns and is automatically enforced by the network device. The power usage policy may also be dynamically adjusted over time based on network traffic statistics. | 02-26-2009 |
20090109849 | SELECTIVE PERFORMANCE ENHANCEMENT OF TRAFFIC FLOWS - In an example embodiment, a method for selective performance enhancement of traffic flows, such as a Transmission Control Protocol (TCP) flow, on devices where enhancement of a limited number of concurrent flows is supported, or where a limited number of TCP accelerated or IP (Internet Protocol) compressed flows are supported. Flows are selected to be enhanced, accelerated or compressed based on configured priorities, including but not limited to type of the flow, importance of the flow, and availability of resources to enhance, accelerate or compress the flow. For example, a high-priority TCP session is accelerated for the lifetime of the session, while a low-priority TCP session is accelerated while there are available resources for the low-priority flow. | 04-30-2009 |
20100046511 | Automated Discovery of Network Devices Supporting Particular Transport Layer Protocols - Disclosed are, inter alia, methods, apparatus, computer-storage media, mechanisms, and means associated with automated discovery of network devices supporting particular transport layer protocols, such as, but not limited to Stream Control Transmission Protocol (SCTP). Packet switching devices automatically discover peer packet switching devices supporting a particular transport layer protocol, and then establish a session using the particular transport layer protocol between them for subsequent use in transporting packets. | 02-25-2010 |
20100058329 | Method and apparatus for dynamically instantiating services using a service insertion architecture - A generic service node that operates in a first state while waiting for instructions to adopt a specific service. Upon receiving the instructions, the generic service node operates in a second state where the node installs software received from a network to enable the generic service node to provide the specific service to the network. The generic service node is in communication with a control node or nodes such that the generic service node can be adapted to provide a particular service as requested by the control node(s). | 03-04-2010 |
20100080226 | SERVICE PATH SELECTION IN A SERVICE NETWORK - A service chain system is provided. The system includes a packet of data that is operable to pass through a network of service nodes as defined by a service chain; and a service classification device that is operable to change the service chain based on a system performance. | 04-01-2010 |
20100165985 | Service Selection Mechanism In Service Insertion Architecture Data Plane - As described herein, explicit service ordering information may be associated with each of a plurality of logical services in a service path. A unique sequence number, for example, may be assigned, and associated with each service in the path. The sequence number may be assigned by a service broker in the control plane of a service insertion architecture that provides a platform-independent framework to insert services into a network. The sequence number may represent the relative ordering of the service with respect to the other services in the path. The sequence number, along with a traffic classification identifier, constitutes the shared context that is tagged to the packet injected into the chain which is used in the SIA data plane to virtualize and uniquely select series of services defined in the policy. | 07-01-2010 |
20110213865 | Dynamic Power Usage Management Based on Historical Traffic Pattern Data for Network Devices - Particular embodiments provide power usage management for network devices according to historical traffic pattern data. Network traffic statistics for traffic flowing through a network device may be determined. A traffic pattern for a time period based on the traffic flowing through the network device is then determined. The network device may then manage power based on the pattern. For example, when a pattern indicates that traffic flowing through the network device is light during a time period, then the network device may operate in a lower power mode, such as a standby mode and when it indicates that there is higher usage, the network device may operate in a normal power mode. In one embodiment, a power usage policy may be determined based on the historical traffic patterns and is automatically enforced by the network device. The power usage policy may also be dynamically adjusted over time based on network traffic statistics. | 09-01-2011 |
20120311141 | Dynamic Power Usage Management Based on Historical Traffic Pattern Data for Network Devices - Particular embodiments provide power usage management for network devices according to historical traffic pattern data. Network traffic statistics for traffic flowing through a network device may be determined. Traffic pattern for a time period based on the traffic flowing through the network device is then determined. The network device may then manage power based on the pattern. For example, when a pattern indicates that traffic flowing through the network device is light during a time period, then the network device may operate in a lower power mode, such as a standby mode and when it indicates that there is higher usage, the network device may operate in a normal power mode. A power usage policy may be determined based on the historical traffic patterns and is automatically enforced by the network device. The power usage policy also may be dynamically adjusted over time based on network traffic statistics. | 12-06-2012 |
20140053280 | Control Pool Based Enterprise Policy Enabler for Controlled Cloud Access - A method for controlling access to a Cloud, comprising receiving traffic from an Enterprise user at a gateway, wherein the traffic carries a first key specific to the Enterprise user for use internal to the gateway, replacing the first key with a second key, wherein the second key is a Cloud-negotiated key generic to a plurality of Enterprise users which permits access to the Cloud, and sending traffic to the Cloud | 02-20-2014 |
20140089810 | Real Time Visualization of Network Information - A user equipment (UE) comprising a display, a visual input configured to capture motion or stop photography as visual data, a receiver configured to receive network data associated with a network element (NE) from a server, and a processor coupled to the display, visual input, and receiver and configured to receive visual data from the visual input, receive the network data from the server via the receiver, overlay the network data on the visual data to create composite image, and transmit the composite image to the display. Also disclosed is a network comprising a server configured to store network data in memory, wherein the network data comprises the physical location of a plurality of NEs in the network, receive field of view data from a UE, wherein the field of view data defines the field of view of a visual input of the UE, and transmit to the UE a network data response message comprising the network data for each NE physically located in the UE visual input's field of view. | 03-27-2014 |
20140136153 | Compact Scalable Three Dimensional Model Generation - A user equipment (UE) comprising a processor configured to generate a three dimensional (3D) model by obtaining a 3D mesh comprising a plurality of reference markers, positioning at least one first order virtual object onto a surface of the mesh by associating the first order virtual object to at least one of the mesh reference markers, wherein the first order virtual object comprises a plurality of reference markers, and positioning at least one second order virtual object onto a surface of the mesh by associating the second order virtual object to at least one of the first order virtual object reference markers. | 05-15-2014 |
20140160979 | Determination and Visualization of Hierarchical Network Topology - A method includes interrogating devices in a network to obtain device information. Based on the device information, the method includes automatically determining which devices are at a top layer of a multi-layer hierarchical topology, wherein the devices at the top layer are core devices. The method further includes receiving input from a user to manually modify the determination as to which devices are the core devices. The method further includes determining which of the other devices in the network are at another layer in the hierarchical topology based on the core devices. | 06-12-2014 |