Patent application number | Description | Published |
20080279089 | Multiplexing separately modulated channels - A method of data transmission which includes providing a plurality of data streams, having different content, modulating the different data streams by respective modulators, multiplexing the modulated data streams into a single data stream alternately in time, such that the resultant stream includes at any specific time signals from fewer than all the data streams and transmitting the multiplexed single data stream onto a transmission channel. | 11-13-2008 |
20100142560 | DATA PACKET HEADER COMPRESSION - A transmitter for transmitting data packets including a Media Access Control (MAC) address extractor configured to extract one or more MAC addresses from packet headers included in data packets, a MAC compression unit configured to provide compressed MAC data including one or more pointers associated with each of the one or more extracted MAC addresses respectively, a packet modifier configured to modify the data packets by adding the compressed MAC data to the data packets, and a transmission unit configured to transmit the modified data packets. A receiver for receiving data packets including compressed MAC data, the compressed MAC data including pointers associated with MAC addresses, including a receiving unit configured to receive data packets, a compressed MAC data extractor configured to find and extract compressed MAC data from received data packets, and a packet modifier configured to modify the received data packets by removing the compressed MAC data from the received data packet. Related apparatus and methods are also described. | 06-10-2010 |
20100214910 | PROTECTED VARIABLE DATA RATE COMMUNICATION SYSTEMS - A protected point-to-point ACM communication system including at least a first component and a second component configured to provide live functionality and backup functionality for each other, at least a first receiver and a second receiver configured to receive an ACM transmission, one or more quality detectors configured to estimate quality of the received transmission of at least the first receiver and the second receiver, wherein at least one of the quality detectors is configured to estimate the quality of the received transmission using blind detection, and a controller configured to switch the live functionality of the protected point-to-point ACM communication system from one of the first component and the second component to another of the first component and the second component, based, at least partly, on the estimated qualities of the received transmissions of at least the first receiver and the second receiver. Related apparatus and methods are also described. | 08-26-2010 |
20110182344 | ESTIMATING INTERFERENCE IN MULTI CHANNEL SYSTEMS - A method for estimating interference between a plurality of carrier signals in a multi-channel system including injecting pilot symbols into a first carrier signal and transmitting the first carrier signal, transmitting a second carrier signal, receiving at least the first carrier signal and the second carrier signal, and estimating interference between the received first carrier signal and the received second carrier signal based, at least in part, on measuring the received first carrier signal when a pilot symbol of the first carrier signal is received. A multi-channel communication system including a plurality of transmitters for a plurality of carrier signals, a pilot symbol injector for injecting silent pilot symbols into at least one of the carrier signals, a plurality of receivers for the plurality of carrier signals, and an interference estimator configured to estimate interference between at least two of the plurality of carrier signals based, at least in part, on receiving silent pilot symbols in at least one of the at least two of the plurality of carrier signals. Related apparatus and methods are also described. | 07-28-2011 |
20110188561 | SNR ESTIMATION - A method for estimating a Signal to Noise Ratio (SNR) in a received signal including, for a fixed first set of a plurality of samples from the received signal, providing an initial noise estimate, starting with the initial noise estimate, iteratively improving the noise estimate, and estimating SNR based, at least partly, on the fixed first set of samples from the received signal and the noise estimate. Additional related apparatus and methods are also described. | 08-04-2011 |
Patent application number | Description | Published |
20140153439 | METHOD FOR MANAGING HETEREOGENEOUS CELLULAR NETWORKS - A method is provided for managing heterogeneous cellular networks. The method comprises obtaining measurement reports from wireless entities relating to the intensity at which signals are received by each wireless entity; based on these measurement reports, and/or on geographical information of HetNet elements, identifying a macro cell located at the vicinity of the small cells; selecting one of the small cells to be a gateway cell, and other small cells to be inner cells. The gateway cell is a small cell that receives, or mobile terminals connected thereto receive, signals transmitted by the macro cell at an intensity being at least similar to intensity at which these signals are received at the inner cells; identifying physical layer identifiers (PLIs) used at the macro cell; and determining PLIs for the gateway cell which are not currently used by the macro cell, and PLIs available for use by the inner cells. | 06-05-2014 |
20140155081 | METHOD FOR MANAGING LOAD BALANCE IN A CELLULAR HETEROGENEOUS NETWORK - A method is provided for managing load balance in cellular heterogeneous networks. The method comprises: providing a plurality of spectrum carriers for conveying communication signals to/from a macro cell. At least one of the carriers is a shared carrier for conveying communication signals to/from the macro cell and to/from at least one small cell located at the geographical vicinity of the macro cell, and wherein the shared carrier is characterized in that data is the only type of communication signals being conveyed thereat when the cellular network is under congestion. One or more other spectrum carriers are dedicated carriers adapted to essentially convey voice calls, and wherein user terminals are steered away from dedicated carriers to the shared carrier, so that when a data session is initiated for a user terminal camped on the shared carrier, that session will be conveyed one or more of the small cells. | 06-05-2014 |
20150138981 | METHOD FOR MANAGING LOAD BALANCE IN A CELLULAR HETEROGENEOUS NETWORK - A method is provided for managing load balance in cellular heterogeneous networks. The method comprises: providing a plurality of spectrum carriers for conveying communication signals to/from a macro cell. At least one of the carriers is a shared carrier for conveying communication signals to/from the macro cell and to/from at least one small cell located at the geographical vicinity of the macro cell, and wherein the shared carrier is characterized in that data is the only type of communication signals being conveyed thereat when the cellular network is under congestion. One or more other spectrum carriers are dedicated carriers adapted to essentially convey voice calls, and wherein user terminals are steered away from dedicated carriers to the shared carrier, so that when a data session is initiated for a user terminal camped on the shared carrier, that session will be conveyed one or more of the small cells. | 05-21-2015 |
20150365855 | METHOD FOR MANAGING HETEROGENEOUS CELLULAR NETWORKS - A method is provided for managing heterogeneous cellular networks. The method comprises obtaining measurement reports from wireless entities relating to the intensity at which signals are received by each wireless entity; based on these measurement reports, and/or on geographical information of HetNet elements, identifying a macro cell located at the vicinity of the small cells; selecting one of the small cells to be a gateway cell, and other small cells to be inner cells. The gateway cell is a small cell that receives, or mobile terminals connected thereto receive, signals transmitted by the macro cell at an intensity being at least similar to intensity at which these signals are received at the inner cells; identifying physical layer identifiers (PLIs) used at the macro cell; and determining PLIs for the gateway cell which are not currently used by the macro cell, and PLIs available for use by the inner cells. | 12-17-2015 |
Patent application number | Description | Published |
20100056907 | METHODS AND DEVICES OF CARDAIC TISSUE MONITORING AND ANALYSIS - A method for monitoring at least one cardiac tissue. The method comprises a) intercepting a plurality of reflections of an electromagnetic (EM) radiation reflected from at least one cardiac tissue of a patient in a plurality of EM radiation sessions, b) computing a mechanical tracing indicative of at least one mechanical property of said at least one cardiac tissue according to said plurality of reflections, c) analyzing said mechanical tracing so as to detect a presence or an absence of a physiological condition, and d) outputting said analysis. | 03-04-2010 |
20110025295 | SYSTEM AND METHOD FOR CALIBRATION OF MEASUREMENTS OF INTERACTED EM SIGNALS IN REAL TIME - A method of calibrating a measurement of electromagnetic (EM) signals. The method comprises separating at least one reference signal component from an EM signal, delaying at least one of the EM signal and the at least one reference signal component, extracting the EM signal after an interaction with a target object and the at least one reference signal component after at least one interaction with at least one reference element from different time slots in a reception, and calibrating a measurement of the interacted EM signal by a signal analysis of the extracted and interacted at least one reference signal component. | 02-03-2011 |
20110319746 | METHODS AND SYSTEMS FOR MONITORING INTRABODY TISSUES - A method for monitoring an intrabody region of a patient. The method comprises intercepting electromagnetic (EM) radiation from the intrabody region in a plurality of EM radiation sessions during a period of at least 6 hours, calculating a dielectric related change of the intrabody region by analyzing respective the intercepted EM radiation, detecting a physiological pattern according to said dielectric related change, and outputting a notification indicating the physiological pattern. | 12-29-2011 |
20130281800 | METHOD, SYSTEM AND APPARATUS FOR USING ELECTROMAGNETIC RADIATION FOR MONITORING A TISSUE OF A USER - A wearable monitoring apparatus for monitoring at least one biological parameter of an internal tissue of an ambulatory user. Said wearable monitoring apparatus comprises at least one transducer configured for delivering electromagnetic (EM) radiation to said internal tissue and intercepting a reflection of said EM radiation said reform in a plurality of transmission sessions during at least 24 hours, a processing unit configured for analyzing respective said reflection and identifying a change in said at least one biological parameter accordingly, a reporting unit configured for generating a report according to said change, and a housing for containing said at least one transducer, said reporting unit, and said processing unit, said housing being configured for being disposed on said body of said ambulatory user. | 10-24-2013 |
20140378812 | THORACIC GARMENT OF POSITIONING ELECTROMAGNETIC (EM) TRANSDUCERS AND METHODS OF USING SUCH THORACIC GARMENT - A garment for bringing an EM transducer to contact with a thoracic skin surface area of a wearer is disclosed. The garment comprises a thoracic garment having a EM transducer placement portion and a pressure applying element associated with the EM transducer placement portion for applying a pressure on an EM transducer secured in an associated the EM transducer placement portion when the thoracic garment is worn by a wearer so that the EM transducer applies a respective pressure on a thoracic skin surface area of the wearer. | 12-25-2014 |
Patent application number | Description | Published |
20160072838 | System and a Method for Identifying the Presence of Malware Using Mini-Traps Set At Network Endpoints - A system for identifying the presence of advanced persistent threats on a network including a plurality of resources, interconnected to form a network, at least one decoy resource, at least one mini-trap installed on at least one of the plurality of resources and functionally associated with at one of the at least one decoy resource, the at least one mini-trap comprising deceptive information directing malware accessing the at least one mini-trap to the decoy resource associated therewith, and a manager node forming part of the network, locally or remotely, and configured to manage placement of the at least one mini-trap on the at least one of the plurality of resources and association between the at least one mini-trap and the decoy resource associated therewith. | 03-10-2016 |
20160080414 | System and a Method for Identifying Malware Network Activity Using a Decoy Environment - A system for gathering information about malware and a method of use therefor, the system comprising a working environment including physical working environment servers, physical working environment endpoints, a working environment network, a switch, and a router directing traffic between said working environment network and an external network, a decoy environment including at least one physical machine, a decoy environment server, a decoy environment endpoint, a decoy environment network and a decoy environment router, a file directing mechanism directing at least some files to the decoy environment, and a threat tracking mechanism tracking and observing actions triggered by the files in the decoy environment. | 03-17-2016 |
20160112440 | METHODS AND DEVICES FOR IDENTIFYING THE PRESENCE OF MALWARE IN A NETWORK - A device and a method for identifying whether a network node is infected by malware, including identifying indicator events for each of a plurality of anomaly indicators, by counting the number of occurrences of an anomaly indicator in at least one of a network node and an entire network during a predetermined time duration and if the number of occurrences of the anomaly indicator during the predetermined time duration is greater than a predetermined event threshold, identifying an indicator event associated with the anomaly indicator during the predetermined time duration and assigning an expiration duration for the indicator event, determining whether the identified indicator events fulfill at least one predetermined infection rule, and if the indicator events fulfill the at least one predetermined infection rule, identifying the network node as infected by malware. | 04-21-2016 |
Patent application number | Description | Published |
20100004147 | CAPPED PARTICLES FOR USE IN LUBRICANTS - The present invention relates to additives for use in lubricant compositions to processes for producing the additives, and to the use of the additives in lubricants and in systems that are lubricated. More specifically, the additive includes a capped particle comprising: (i) one or more core particles wherein the core particle is an inorganic particle having a dimension less than about 5 μm; and (ii) one or more multi-block copolymers attached to the inorganic particles, wherein the multi-block copolymer comprises a) at least one nonpolar polymer block; b) at least one first polar polymer block; and c) at least one second polar polymer block; wherein the nonpolar polymer block is interposed between the first polar polymer block and the second polar polymer block, the first polar polymer block is attached to the core particle, and at least a portion of the second polar polymer block is not attached to the core particle. When used in a lubricant to lubricate a metallic surface of a workpiece, the capped particle preferably adhere to the metallic surface of the workpiece. | 01-07-2010 |
20100040902 | FORMABLE LIGHT WEIGHT COMPOSITES - The present invention relates to light weight composite materials which comprise a metallic layer and a polymeric layer, the polymeric layer containing a filled thermoplastic polymer which includes a thermoplastic polymer and a metallic fiber. The composite materials of the present invention may be formed using conventional stamping equipment at ambient temperatures. Composite materials of the present invention may also be capable of being welded to other metal materials using a resistance welding process such as resistance spot welding. | 02-18-2010 |
20100303901 | ORAL DELIVERY OF PROTEINS AND PEPTIDES - Enteric coated capsules or tablets for oral delivery of a protein, polypeptide or peptide drug, in particular for oral delivery of insulin, are provided, comprising microparticles of the protein, polypeptide or peptide drug, microparticles of a protease inhibitor and, optionally, microparticles of an absorption enhancer. The protease inhibitor and the absorption enhancer may be together in the same microparticles. The microparticles of each component are embedded in an enteric polymer matrix. The enteric coated tablet or capsule of the invention enables fast release of the protein, polypeptide or peptide drug at different times at desired loci in the gastrointestinal tract | 12-02-2010 |
20110162788 | FORMABLE LIGHT WEIGHT COMPOSITES - The present invention relates to light weight composite materials which comprise a metallic layer and a polymeric layer, the polymeric layer containing a filled thermoplastic polymer which includes a thermoplastic polymer and a metallic fiber. The composite materials of the present invention may be formed using conventional stamping equipment at ambient temperatures. Composite materials of the present invention may also be capable of being welded to other metal materials using a resistance welding process such as resistance spot welding. | 07-07-2011 |
20110166051 | CAPPED PARTICLES FOR USE IN LUBRICANTS - The present invention relates to capped particle additives for use in lubricant compositions, to processes for producing the additives, and to the use of the additives in lubricants and in systems that are lubricated. When used in a lubricant to lubricate a metallic surface of a workpiece, the capped particle preferably adhere to the metallic surface of the workpiece. | 07-07-2011 |
20110188927 | PROCESSES FOR WELDING COMPOSITE MATERIALS AND ARTICLES THEREFROM - The invention is directed at a method for welding a composite material and to welded structures thus prepared. The method includes a step of contacting a substrate material with a composite material, wherein the composite material includes a pair of spaced apart steel sheets and a core layer between the sheets; the volume of the core layer is about 25 volume % or more, based on the total volume of the composite material; the core layer includes a plurality of steel fibers arranged in one or more masses of fibers that extend the thickness of the core layer so that the core layer is in electrical communication with the steel sheets; and the steel fibers have a cross sectional area perpendicular to the length of the fibers from about 1×10 | 08-04-2011 |
20110200816 | FORMABLE LIGHT WEIGHT COMPOSITE MATERIAL SYSTEMS AND METHODS - The present invention relates to filled polymeric materials including a polymer and a mass of metallic fibers distributed within the polymer, and to light weight composites which comprise at least a pair of metallic layers and a polymeric layer interposed between the pair of metallic layers, the polymeric layer containing the filled polymeric material. The composite materials of the present invention may be formed using conventional stamping equipment at ambient temperatures. Composite materials of the present invention may also be capable of being welded to other metal materials using a resistance welding process such as resistance spot welding. Preferred composite materials include one or any combination of the following features: metallic fibers that are ribbon fibers; a polymer selected from a polyolefin, a polyamide, or a combination thereof; or a metallic layer (e.g., one or both of the pair of metallic layers) having a surface facing the filled polymeric material that is untreated. | 08-18-2011 |
20120101013 | CAPPED PARTICLES FOR USE IN LUBRICANTS - The present invention relates to additives for use in lubricant compositions to processes for producing the additives, and to the use of the additives in lubricants and in systems that are lubricated. More specifically, the additive includes a capped particle comprising: (i) one or more inorganic core particles; and (ii) one or more multi-block copolymers attached to the inorganic particles. The multi-block copolymer includes at least one nonpolar polymer block interposed between two polar polymer blocks. One polar polymer block is attached to the core particle, and at least a portion of the another polar polymer block is not directly attached to, the core particle. When used in a lubricant to lubricate a metallic surface of a workpiece, the capped particle preferably adheres to the metallic surface of the workpiece. | 04-26-2012 |
20120214018 | COMPOSITE MATERIALS INCLUDING REGIONS DIFFERING IN PROPERTIES AND METHODS - The invention is directed at composite materials, articles including the composite materials, and methods for producing and using them. The composite material includes regions that differ in one or more properties. The composite material generally includes a first metallic sheet, a second metallic sheet; one or more metallic inserts interposed between the first and second metallic sheets; and a polymeric layer (e.g., a core layer) interposed between the first and second metallic sheets. The polymeric layer preferably includes a thermoplastic polymer. Preferably, the composite material includes a first region having an insert interposed between the metallic sheets so that the first region (relative to the second region) has a high tensile strength, a high thickness, a high density, or any combination thereof. | 08-23-2012 |
20130136944 | DELAMINATION RESISTANT, WELDABLE AND FORMABLE LIGHT WEIGHT COMPOSITES - The present invention relates to filled polymeric materials | 05-30-2013 |
20140034233 | COMPOSITES HAVING IMPROVED INTERLAYER ADHESION AND METHODS THEREOF - The invention relates to multi-layered composite materials and methods for making multi-layered composite materials having good adhesion between the layers. The adhesion between a polymer layer and a metal layer of a multi-layered composite material may be improved by a process including a step of pre-treating a surface of the metal layer prior to contacting the metal surface with the polymer layer, and by including filler particles in the polymer layer. Using this approach, it is possible to increase the peel strength by about 10% or more, by about 20% or more, by about 40% or more, or by about 100% or more, compared with an otherwise identical composite material that does not include both of these features. | 02-06-2014 |
20140162086 | FORMABLE LIGHT WEIGHT COMPOSITES - The present invention relates to light weight composite materials which comprise a metallic layer and a polymeric layer, the polymeric layer containing a filled thermoplastic polymer which includes a thermoplastic polymer and a metallic fiber. The composite materials of the present invention may be formed using conventional stamping equipment at ambient temperatures. Composite materials of the present invention may also be capable of being welded to other metal materials using a resistance welding process such as resistance spot welding. | 06-12-2014 |
20140286699 | PROCESSES FOR WELDING COMPOSITE MATERIALS AND ARTICLES THEREFROM - The invention is directed at a method for welding a composite material and to welded structures thus prepared. The method includes a step of contacting a substrate material with a composite material, wherein the composite material includes a pair of spaced apart steel sheets and a core layer between the sheets; the volume of the core layer is about 25 volume % or more, based on the total volume of the composite material; the core layer includes a plurality of steel fibers arranged in one or more masses of fibers that extend the thickness of the core layer so that the core layer is in electrical communication with the steel sheets; and the steel fibers have a cross sectional area perpendicular to the length of the fibers from about 1×10 | 09-25-2014 |
20150151513 | COMPOSITE MATERIALS INCLUDING REGIONS DIFFERING PROPERTIES, AND METHODS - The invention is directed at composite materials, articles including the composite materials, and methods for producing and using them. The composite material include regions that differ in one or more properties. The composite material generally includes a first metallic sheet, a second metallic sheet; one or more metallic inserts interposed between the first and second metallic sheets; and a polymeric layer (e.g., a core layer) interposed between the first and second metallic sheets. The polymeric layer preferably includes a thermoplastic polymer. Preferably, the composite material includes a first region having an insert interposed between the metallic sheets so that the first region (relative to the second region) has a high tensile strength, a high thickness, a high density, or any combination thereof. | 06-04-2015 |
20150328864 | DELAMINATION RESISTANT, WELDABLE AND FORMABLE LIGHT WEIGHT COMPOSITES - The present invention relates to filled polymeric materials | 11-19-2015 |
Patent application number | Description | Published |
20090316700 | CASCADED MEMORY TABLES FOR SEARCHING - Devices, systems, methods, and other embodiments associated with cascaded memory tables for searching are described. In one embodiment, an integrated chip is implemented with two or more address tables. The two or more address tables are implemented with separate memory tables to store addresses. The two or more address tables are comprised of a first address table and a second address table. Connection lines connect the first address table and the second address table to create a cascaded address table. Search logic initiates a search of the first address table for an address. If the address is not found, the search logic initiates a search of the second address table through the connection lines. | 12-24-2009 |
20110255540 | System and Method for Adapting a Packet Processing Pipeline - An apparatus for forwarding packets includes a packet processing pipeline having a processing unit that processes packets compliant with a recognized communication protocol. A first port coupled to the packet processing pipeline is configured to receive a packet that does not comply with the recognized communication protocol and has a header that conforms to a second communication protocol. A data extraction unit extracts first destination information from the header of the packet and, based on the first destination information, generates second destination information that conforms to the recognized communication protocol. The processing unit determines, based on the second destination information, an egress interface to which the packet is to be forwarded. | 10-20-2011 |
20120134266 | LOAD BALANCING HASH COMPUTATION FOR NETWORK SWITCHES - Techniques to load balance traffic in a network device or switch include a network device or switch having a first interface to receive a data unit or packet, a second interface to transmit the packet, and a mapper to map between virtual ports and physical ports. The network device includes hash value generator configured to generate a hash value based on information included in the packet and based on at least one virtual port. The hash value may be optionally modified to load balance egress traffic of the network device. The network device selects a particular virtual port for egress of the packet, such as by determining an index into an egress table based on the (modified) hash value. The packet is transmitted from the network device using a physical port mapped to the particular virtual port. | 05-31-2012 |
20120134497 | LOAD BALANCING HASH COMPUTATION FOR NETWORK SWITCHES - Techniques to load balance traffic in a communication network include a network switch or device having an interface to receive a data unit or packet. The network device includes a hash value generator configured to generate a symmetric key from an initial key that is based on the packet, and configured to generate a hash value based on the symmetric key and the packet. The hash value may be optionally modified to load balance egress traffic of the network device. The network device selects an egress link or port, such as by determining an index into an egress table based on the (modified) hash value. The techniques described herein allow packets or data units of a particular flow to travel in both directions along a same path through the communication network. | 05-31-2012 |
20120136999 | LOAD BALANCING HASH COMPUTATION FOR NETWORK SWITCHES - Techniques to avoid polarization in a communication network include a network switch or device having a first interface to receive a data unit or packet, and a second interface via which the packet is transmitted from the network device. The network device includes a hash value generator configured to generate, using a depolarizer, a depolarized key from an initial key (where the initial key is based on contents of the packet and the depolarizer is unique to the network device), and to generate a hash value based on the depolarized key and the packet by using a hash function that is common to all network devices in the network. The hash value may be optionally modified to load balance egress traffic of the network device. The network device selects an egress link or port, such as by determining an index into an egress table based on the (modified) hash value. | 05-31-2012 |
20120300779 | CASCADED MEMORY TABLES FOR SEARCHING - Devices, systems, methods, and other embodiments associated with cascaded memory tables for searching are described. In one embodiment, an integrated chip is implemented with two or more address tables. The two or more address tables are implemented with separate memory tables to store addresses. The two or more address tables are comprised of a first address table and a second address table. Connection lines connect the first address table and the second address table to create a cascaded address table. Search logic initiates a search of the first address table for an address. If the address is not found, the search logic initiates a search of the second address table through the connection lines. | 11-29-2012 |
20120327936 | FCOE OVER TRILL - A method for processing packets, in a network device including at least one processing engine that i) is not configured to process destination information that conforms to a first protocol and ii) is configured to process destination information that conforms to a second protocol, includes receiving a packet at the network device, and determining, in the network device, first destination information included in the packet. The first destination information conforms to the first protocol. The method also includes generating, in the network device, second destination information conforming to a third protocol based on the first destination information. The method also includes generating, in the network device, third destination information conforming to the second protocol based on the second destination information. The method also includes processing the packet with the at least one processing engine included in the network device using the third destination information. | 12-27-2012 |
20120327937 | FCOE OVER TRILL - A method for forwarding FCoE packets in a network switching device includes receiving a first packet at the network switching device via an Ethernet link, determining, in the network switching device, an FC destination identifier included in the first packet, updating, in the network switching device, an Ethernet address based on the FC destination identifier, generating, in the network switching device, a first TRILL destination identifier based on the updated Ethernet address, and causing, in the network switching device, the first packet to be forwarded to a different device based on the first TRILL destination identifier. | 12-27-2012 |
20130016723 | SCALING OF VIRTUAL MACHINE ADDRESSES IN DATACENTERS - A device in a server having a processor and a storage. The device has a downstream communication unit configured to receive a data packet. The device also has a protocol blind network path indication unit configured to obtain an indicator corresponding to a predetermined path to a data communication unit in the network, by accessing the protocol blind correlation structure using a destination address of the data packet. The device, furthermore, has an upstream communication unit configured to transmit a network protocol blind packet including the data packet and the indicator corresponding to the predetermined data path to the data communication unit in the network. The device also includes a combiner configured to bind the indicator to the data packet received by the downstream communication unit. | 01-17-2013 |
20130208735 | CLOCK SYNCHRONIZATION USING MULTIPLE NETWORK PATHS - In a network device communicatively coupled to a master clock via a plurality of different communication paths, a clock synchronization module is configured to determine a plurality of path time data sets corresponding to the plurality of different communication paths based on signals received from the master clock via the plurality of different communication paths between the network device and the master clock. A clock module is configured to determine a time of day as a function of the plurality of path time data sets. | 08-15-2013 |
20130259049 | CLOCK SYNCHRONIZATION USING MULTIPLE NETWORK PATHS - A network device includes one or more ports coupled to a network, and a time synchronization module. The time synchronization module processes (i) respective path information, and (ii) respective time synchronization information included in each of at least some of a plurality of time synchronization packets received from a master clock device over two or more different communication paths and via at least one of the one or more ports, wherein the respective path information indicates a respective communication path in the network via which the respective time synchronization packet was received. The time synchronization module determines a system time clock responsive to the processing of the path information and the time synchronization information included in the at least some of the plurality of time synchronization packets. | 10-03-2013 |
20130266011 | TRANSPARENT RBRIDGE - A transparent edge Routing Bridge (RBridge) including a first communication unit configured to receive a data packet from an access segment of a network, the data packet including an egress device nickname and at least one Virtual Local Area Network (VLAN) tag, a TRansparent Interconnection of Lots of Links (TRILL) header constructing unit configured to construct a TRILL header based on the VLAN tag, and a second communication unit that transmits the data packet, including the TRILL header, to an egress device corresponding to the egress device nickname via a TRILL compliant interconnection layer. | 10-10-2013 |
20140115167 | Load Balancing Hash Computation for Networks - A data unit is received at a network device associated with a link aggregate group. An initial key is determined based on information included in the data unit. Another key is generated based on a first field of the initial key and a second field of the initial key. A hash function is applied to the other key to generate a hash value. A communication link in the link aggregate group is determined based on the hash value, and the data unit is transmitted over the communication link. | 04-24-2014 |
20140160934 | LOAD BALANCING HASH COMPUTATION FOR NETWORK SWITCHES - Techniques to load balance traffic in a network device or switch include a network device or switch having a first interface to receive a data unit or packet, a second interface to transmit the packet, and a mapper to map between virtual ports and physical ports. The network device includes hash value generator configured to generate a hash value based on information included in the packet and based on at least one virtual port. The hash value may be optionally modified to load balance egress traffic of the network device. The network device selects a particular virtual port for egress of the packet, such as by determining an index into an egress table based on the (modified) hash value. The packet is transmitted from the network device using a physical port mapped to the particular virtual port. | 06-12-2014 |
20140161143 | Clock Synchronization Using Multiple Network Paths - A packet transmitted by a master clock via a network is received via a port of a network device. The packet includes a time stamp from the master clock. It is determined via which one of a plurality of communication path in the network the packet was received. An application layer module of the network device uses (i) the time stamp in the packet and (ii) the determination of the communication path to determine time information. | 06-12-2014 |
20140325228 | LOAD BALANCING HASH COMPUTATION FOR NETWORK SWITCHES - Techniques to avoid polarization in a communication network include a network switch or device having a first interface to receive a data unit or packet, and a second interface via which the packet is transmitted from the network device. The network device includes a hash value generator configured to generate, using a depolarizer, a depolarized key from an initial key (where the initial key is based on contents of the packet and the depolarizer is unique to the network device), and to generate a hash value based on the depolarized key and the packet by using a hash function that is common to all network devices in the network. The hash value may be optionally modified to load balance egress traffic of the network device. The network device selects an egress link or port, such as by determining an index into an egress table based on the (modified) hash value. | 10-30-2014 |
20150117471 | METHOD AND APPARATUS FOR SECURING CLOCK SYNCHRONIZATION IN A NETWORK - Aspects of the disclosure provide a method that includes receiving a first packet through a network at a first device. The first packet includes a first message generated according to a precision time protocol and a first encapsulation that encapsulates one or more fields of the first message. Further, the method includes security-verifying the first packet based on the first message and the first encapsulation, and processing the first message according to the precision time protocol after the first packet is security-verified. | 04-30-2015 |
20150188798 | ACCURATE MEASUREMENT OF DISTRIBUTED COUNTERS - Aspects of the disclosure provide a method for collecting distributed counter values in a packet-switched system having multiple distributed packet processors. The method includes receiving a probe packet at a packet processor, storing a counter value corresponding to a flow processed by the packet processor for subsequent delivery to a management controller, and forwarding the probe packet to a next packet processor. The next packet processor stores a counter value of the next packet processor for subsequent delivery to the management controller. | 07-02-2015 |
20150236807 | CLOCK SYNCHRONIZATION IN THE PRESENCE OF SECURITY THREATS - In a network device communicatively coupled to a master clock via a plurality of different communication paths, a clock synchronization module is configured to determine a plurality of path time data sets corresponding to the plurality of different communication paths based on signals received from the master clock via the plurality of different communication paths between the network device and the master clock. A clock module is configured to determine that at least one of the plurality of path time data sets is inaccurate based on accuracy metrics corresponding to the plurality of path time data sets, and determine a time of day as a function of a remainder of one or more path time data sets, in the plurality of path time data sets, not determined to be inaccurate. The device may detect and/or mitigate “man-in-the-middle” attacks aimed at a clock synchronization protocol. | 08-20-2015 |