Patent application number | Description | Published |
20090016370 | Creating a Telecommunications Channel from Multiple Channels that Have Differing Signal-Quality Guarantees - A technique is disclosed that enables the adaptive pooling of M transmission paths that offer a first signal-quality guarantee, or no guarantee at all, with N transmission paths that offer a second signal-quality guarantee. Through this adaptive pooling, a telecommunications channel is created that meets the quality of service or waveform quality required for a packet stream being transmitted, while not excessively exceeding the required quality. The technique adaptively recaptures any excess signal quality from one path and uses it to boost the quality of an inferior path. A node of the illustrative embodiment selects the paths to handle a current segment of source packets, based on one or more parameters that are disclosed herein. The node adapts to changing conditions by adjusting the transmission characteristics for each successive segment of packets from the source packet stream. | 01-15-2009 |
20090122713 | Interfering Packet Streams in Packet Networks - A method for estimating the network-layer topology of a telecommunications network is described. In particular, the illustrative embodiment of the present invention estimates the existence and connectivity of nodes in the topology based on the detection of network-wide end-to-end path intersections. This is based on the assumption that pairs of streams of packets that share a common node will interfere and that the interference can be detected in the received streams. In general, this interference is manifested as jitter. By transmitting streams on each pair of end-to-end paths in the network, and detecting interference (or a lack of interference) a matrix of path intersections for the network can be created. Using logic and supposition, the topology of the network can be estimated using the matrix of path intersections. Once the estimate of the topology is complete, the maintenance and operation of the network can proceed based on the topology. | 05-14-2009 |
20090122719 | Detecting Interfering Packet Streams in Packet Networks - A method for estimating the network-layer topology of a telecommunications network is described. In particular, the illustrative embodiment of the present invention estimates the existence and connectivity of nodes in the topology based on the detection of network-wide end-to-end path intersections. This is based on the assumption that pairs of streams of packets that share a common node will interfere and that the interference can be detected in the received streams. In general, this interference is manifested as jitter. By transmitting streams on each pair of end-to-end paths in the network, and detecting interference (or a lack of interference) a matrix of path intersections for the network can be created. Using logic and supposition, the topology of the network can be estimated using the matrix of path intersections. Once the estimate of the topology is complete, the maintenance and operation of the network can proceed based on the topology. | 05-14-2009 |
20090122720 | Estimating Network-Layer Topology Using End-to-End Measurements - A method for estimating the network-layer topology of a telecommunications network is described. In particular, the illustrative embodiment of the present invention estimates the existence and connectivity of nodes in the topology based on the detection of network-wide end-to-end path intersections. This is based on the assumption that pairs of streams of packets that share a common node will interfere and that the interference can be detected in the received streams. In general, this interference is manifested as jitter. By transmitting streams on each pair of end-to-end paths in the network, and detecting interference (or a lack of interference) a matrix of path intersections for the network can be created. Using logic and supposition, the topology of the network can be estimated using the matrix of path intersections. Once the estimate of the topology is complete, the maintenance and operation of the network can proceed based on the topology. | 05-14-2009 |
20090274040 | Mid-call Redirection of Traffic Through Application-Layer Gateways - A method and apparatus are disclosed for redirecting traffic associated with an application so that the traffic advantageously traverses (or “hairpins”) through an application-layer gateway. Because the present invention advantageously redirects traffic without any participation by routers, no changes to or replacement of routers in a network is required. The illustrative embodiment is disclosed in the context of Internet telephony, but is also applicable to other kinds of applications and types of communication (e.g., Internet Protocol Television [IPTV], instant messaging [IM], videoconferencing, etc.) | 11-05-2009 |
20100124262 | Adaptive Partitioning of Traffic Without Additional Probe Traffic - A method is disclosed for adaptively and intelligently partitioning traffic among a plurality of communications channels, without injecting probe traffic into any of the channels. In accordance with the illustrative embodiment, a source node transmits traffic to a receiving node via K communications channels in accordance with partition coefficients α | 05-20-2010 |
20100169374 | Adaptive Parameterized Search Algorithm - A method is disclosed for conducting a search in which measurements of a time-varying property are made and updated during the search, and in which the measurements might be uncertain. In accordance with the illustrative embodiment, one or more search algorithm parameters (e.g., the maximum branching factor of a search tree, a depth cutoff for a search tree, a time cutoff, a threshold, etc.) are adjusted dynamically during the search based on at least one of: the degree of uncertainty of the measurements, the variability of measurements over time (e.g., standard deviation, etc.), and the fraction of members whose measurement is better than a threshold. In addition, the illustrative embodiment enables the search space to be pruned based on these criteria. | 07-01-2010 |
20100306526 | Staged Establishment of Secure Strings of Symbols - A multi-stage technique of establishing a plurality of secure strings of symbols is disclosed. In the first stage, the illustrative embodiment establishes a first-stage string of symbols with each other node. The first-stage strings are chosen from a first, small, key space, which means that they can be established more quickly than a highly secure key from a large key space. The advantage of the first-stage strings is that it enables the user to transmit secure messages more quickly than messages secured with highly secure strings. The disadvantage of the illustrative embodiment is that the first-stage strings are not as secure as strings from a larger key space. This disadvantage is mitigated, however, by the fact that the first-stage strings are only used for a short amount of time—until the second-stage strings are established in the second stage. | 12-02-2010 |