Patent application number | Description | Published |
20130083691 | METHODS AND APPARATUS FOR A SELF-ORGANIZED LAYER-2 ENTERPRISE NETWORK ARCHITECTURE - In some embodiments, an apparatus includes a network node operatively coupled within a network. The network node is configured to send a first authentication message upon boot up, and receive, in response to the first authentication message, a second authentication message configured to be used to authenticate the network node. The network node is configured to send a first discovery message, and receive, based on the first discovery message, a second discovery message configured to be used by the network node to identify an address of the network node and an address of a core network node within the network. The network node is configured to set up a control-plane tunnel to the core network node based on the address of the network node and the address for the core network node and receive configuration information from the core network node through the control-plane tunnel. | 04-04-2013 |
20130083700 | METHODS AND APPARATUS FOR CENTRALIZED MANAGEMENT OF ACCESS AND AGGREGATION NETWORK INFRASTRUCTURE - In some embodiments, an apparatus comprises a core network node configured to be operatively coupled to a set of network nodes. The core network node is configured to define configuration information for a network node from the set of network nodes based on a template, where the configuration information excludes virtual local area network (VLAN) information or IP subnet information. The core network node is further configured to send the configuration information to the network node. | 04-04-2013 |
20130083724 | METHODS AND APPARATUS FOR A CONVERGED WIRED/WIRELESS ENTERPRISE NETWORK ARCHITECTURE - In some embodiments, an apparatus comprises a core network node and a control module within an enterprise network architecture. The core network node is configured to be operatively coupled to a set of wired network nodes and a set of wireless network nodes. The core network node is configured to receive a first tunneled packet associated with a first session from a wired network node from the set of wired network nodes. The core network node is configured to also receive a second tunneled packet associated with a second session from a wireless network node from the set of wireless network nodes through intervening wired network nodes from the set of wired network nodes. The control module is operatively coupled to the core network node. The control module is configured to manage the first session and the second session. | 04-04-2013 |
20130083725 | METHODS AND APPARATUS FOR ENFORCING A COMMON USER POLICY WITHIN A NETWORK - In some embodiments, an apparatus includes a core network node configured to be operatively coupled to a set of wired network nodes and a set of wireless network nodes. The core network node is configured to receive, at a first time, a first data packet to be sent to a wired device operatively coupled to a wired network node from the set of wired network nodes. The core network node is configured to also receive, at a second time, a second data packet to be sent to a wireless device operatively coupled to a wireless network node from the set of wireless network nodes. The core network node is configured to apply a common policy to the first data packet and the second data packet based on an identifier of a user associated with both the wireless device and the wired device. | 04-04-2013 |
20130083782 | METHODS AND APPARATUS FOR A SCALABLE NETWORK WITH EFFICIENT LINK UTILIZATION - In some embodiments, an apparatus comprises a core network node configured to be operatively coupled to a set of network nodes. The core network node is configured to receive a broadcast signal from a network node from the set of network nodes, which is originated from a host device operatively coupled to the network node. The broadcast signal is sent via a tunnel from the network node to the core network node, such that other network nodes that are not included in the tunnel do not receive the broadcast signal. The core network node is configured to retrieve control information associated with the broadcast signal without sending another broadcast signal, and then send the control information to the network node. | 04-04-2013 |
20140348111 | METHODS AND APPARATUS FOR ENFORCING A COMMON USER POLICY WITHIN A NETWORK - In some embodiments, an apparatus includes a core network node configured to be operatively coupled to a set of wired network nodes and a set of wireless network nodes. The core network node is configured to receive, at a first time, a first data packet to be sent to a wired device operatively coupled to a wired network node from the set of wired network nodes. The core network node is configured to also receive, at a second time, a second data packet to be sent to a wireless device operatively coupled to a wireless network node from the set of wireless network nodes. The core network node is configured to apply a common policy to the first data packet and the second data packet based on an identifier of a user associated with both the wireless device and the wired device. | 11-27-2014 |
Patent application number | Description | Published |
20080285435 | INTELLIGENT FAILBACK IN A LOAD-BALANCED NETWORKING ENVIRONMENT - One embodiment of the present invention sets forth a method for failing back network connections to a network interface card (NIC) within a computing device. The method includes the steps of monitoring a failed or unreliable NIC within the computing device, determining that the failed or unreliable NIC has recovered, determining that a functional NIC within the computing device is overloaded, selecting a first connection set communicating through the overloaded NIC, and transferring the first connection set to the recovered NIC. With this approach, intelligent decisions can be advantageously made regarding whether to fail back a network connection set to a recovered NIC based on the traffic loads on the overloaded NIC and the recovered NIC. Such an approach to balancing network traffic across the functional NICs within a computing device may substantially improve overall performance relative to prior art techniques. | 11-20-2008 |
20080285441 | INTELLIGENT LOAD BALANCING AND FAILOVER OF NETWORK TRAFFIC - A hash engine in a network device driver maintains data on the utilization and error rate for each network interface card (“NIC”) within a local computing device. From this data, the hash engine intelligently selects transmit NICs and receive NICs based on various networking parameters provided from a software driver program. Transmit packets sent from the operating system in a local computing device to a remote computing device are intercepted, modified and redirected to transmit NICs selected by the hash engine for transmission to remote computing devices. Similarly, address resolution protocol (“ARP”) response packets sent by the operating system in response to ARP request packets are intercepted, modified and redirected to receive NICs selected by the hash engine for transmission. By selecting receive NICs and transmit NICs in this fashion, the hash engine is able to intelligently load balance transmit and receive traffic in the local computing device, thereby improving overall network performance relative to prior art techniques. | 11-20-2008 |
20080285448 | INTELLIGENT LOAD BALANCING AND FAILOVER OF NETWORK TRAFFIC - A hash engine in a network device driver maintains data on the utilization and error rate for each network interface card (“NIC”) within a local computing device. From this data, the hash engine intelligently selects transmit NICs and receive NICs based on various networking parameters provided from a software driver program. Transmit packets sent from the operating system in a local computing device to a remote computing device are intercepted, modified and redirected to transmit NICs selected by the hash engine for transmission to remote computing devices. Similarly, address resolution protocol (“ARP”) response packets sent by the operating system in response to ARP request packets are intercepted, modified and redirected to receive NICs selected by the hash engine for transmission. By selecting receive NICs and transmit NICs in this fashion, the hash engine is able to intelligently load balance transmit and receive traffic in the local computing device, thereby improving overall network performance relative to prior art techniques. | 11-20-2008 |
20080285472 | INTELLIGENT FAILOVER IN A LOAD-BALANCED NETWORK ENVIRONMENT - A hash table in the network device driver maintains data on the traffic characteristics for each network interface (“NIC”) within a computing device. If one of the NICs in the computing device becomes unreliable, the cost function in the hash engine allows the software driver to initiate network traffic redistribution among the remaining reliable NICs in the computing device. Using this hash engine, the software driver is able to intelligently redirect each of the network connections on an unreliable NIC to a reliable NIC within the computing device, in a way that optimizes the distribution of network traffic across the remaining reliable NICs. Alternatively, if a connection is moved from an old NIC to a new NIC, the software driver can detect the moved connection and offload the moved connection to a hardware offload engine on the new NIC. With this approach, issues such as network interface overloading and computing device performance degradation may be more easily avoided when failing over network connections, thereby improving overall system performance relative to prior art techniques. | 11-20-2008 |
20080285552 | INTELLIGENT FAILOVER IN A LOAD-BALANCED NETWORKING ENVIRONMENT - A hash table in the network device driver maintains data on the traffic characteristics for each network interface (“NIC”) within a computing device. If one of the NICs in the computing device becomes unreliable, the cost function in the hash engine allows the software driver to initiate network traffic redistribution among the remaining reliable NICs in the computing device. Using this hash engine, the software driver is able to intelligently redirect each of the network connections on an unreliable NIC to a reliable NIC within the computing device, in a way that optimizes the distribution of network traffic across the remaining reliable NICs. Alternatively, if a connection is moved from an old NIC to a new NIC, the software driver can detect the moved connection and offload the moved connection to a hardware offload engine on the new NIC. With this approach, issues such as network interface overloading and computing device performance degradation may be more easily avoided when failing over network connections, thereby improving overall system performance relative to prior art techniques. | 11-20-2008 |
20080285553 | INTELLIGENT LOAD BALANCING AND FAILOVER OF NETWORK TRAFFIC - A hash engine in a network device driver maintains data on the utilization and error rate for each network interface card (“NIC”) within a local computing device. From this data, the hash engine intelligently selects transmit NICs and receive NICs based on various networking parameters provided from a software driver program. Transmit packets sent from the operating system in a local computing device to a remote computing device are intercepted, modified and redirected to transmit NICs selected by the hash engine for transmission to remote computing devices. Similarly, address resolution protocol (“ARP”) response packets sent by the operating system in response to ARP request packets are intercepted, modified and redirected to receive NICs selected by the hash engine for transmission. By selecting receive NICs and transmit NICs in this fashion, the hash engine is able to intelligently load balance transmit and receive traffic in the local computing device, thereby improving overall network performance relative to prior art techniques. | 11-20-2008 |
20120155249 | TECHNIQUE FOR IDENTIFYING A FAILED NETWORK INTERFACE CARD WITHIN A TEAM OF NETWORK INTERFACE CARDS - A method for identifying a failed network interface card in a system having two NICs configured as a team includes the steps of transmitting a first data packet from the first NIC to a third NIC, wherein the third NIC is not a member of the team, and transmitting a second data packet from the first NIC to the second NIC or from the second NIC to the third NIC, depending on whether the third NIC responds to the transmission of the first data packet. One advantage of the disclosed method is that it specifically identifies which NIC within the team has failed, which is something that cannot be determined by simply exchanging packets between the two NICs. | 06-21-2012 |
Patent application number | Description | Published |
20120131365 | Delayed Shut Down of Computer - A computer-implemented computer shut-down method includes identifying that a computing device has been moved from an open configuration in which input and output mechanisms on the computing device are accessible to a user, to a closed configuration in which at least some of the input and output mechanisms are inaccessible to a user; starting a shut-down timer in response to identifying that the computing device has been moved from the open configuration to the closed configuration; waiting a predefined time period, as established by the shut-down timer, and determining from the shut-down timer that the computing device can be transitioned from an active state into a sleep state in which power consuming components of the computing device are powered down; and transitioning the computing device from the active state to the sleep state upon determining that the computing device can be transitioned. | 05-24-2012 |
20120303990 | POSTPONING SUSPEND - According to one general aspect, a method may include operating a computing device in a first power mode. The method may also include executing, by a processor of the computing device, at least one non-interactive task. The method may also include detecting, by a processor of the computing device, a request to place the computing device in a second power mode, wherein the second power mode consumes less system resources than the first power mode. The method may further include delaying the transition of the computing device to the second power mode until either the completion of the non-interactive task or an overriding triggering event. | 11-29-2012 |
20140195066 | THERMAL ADJUSTMENT USING DISTRIBUTED SENSORS - A method and system detect temperatures of multiple zones of a computer system using sensors distributed across the computer system. For each of the sensors, the system may determine whether a detected temperature associated with the sensor exceeds a predetermined value. If the detected temperature exceeds the predetermined value, the system may cool at least one of a plurality of devices of the system, based on a proximity of the at least one of the plurality of devices to the sensor. | 07-10-2014 |
20150192984 | Delayed Shut Down of Computer - A computer-implemented computer shut-down method includes identifying that a computing device has been moved from an open configuration in which input and output mechanisms on the computing device are accessible to a user, to a closed configuration in which at least some of the input and output mechanisms are inaccessible to a user; starting a shut-down timer in response to identifying that the computing device has been moved from the open configuration to the closed configuration; waiting a predefined time period, as established by the shut-down timer, and determining from the shut-down timer that the computing device can be transitioned from an active state into a sleep state in which power consuming components of the computing device are powered down; and transitioning the computing device from the active state to the sleep state upon determining that the computing device can be transitioned. | 07-09-2015 |
Patent application number | Description | Published |
20090201907 | MULTI-HOP COMMUNICATIONS IN A WIRELESS NETWORK - Systems and techniques are disclosed relating to wireless communications. The systems and techniques involve wireless communications wherein a module or communications device is configured to select first and second terminal pairs, the first terminal pair having a first transmitting terminal and a first receiving terminal, and the second terminal pair having a second transmitting terminal and a second receiving terminal, schedule a first signal transmission from the first transmitting terminal to an intermediate terminal, the first signal transmission being destined for the first receiving terminal, schedule, simultaneously with the first signal transmission, a second signal transmission from the second transmitting terminal to the second receiving terminal, and schedule a power level for each of the first and second signal transmissions that satisfies a target quality parameter for each of the intermediate terminal and the second receiving terminal. | 08-13-2009 |
20090285116 | MULTIPLE FREQUENCY BAND OPERATION IN WIRELESS NETWORKS - Embodiments for bandwidth allocation methods, detecting interference with other systems, and/or redeploying in alternate bandwidth are described. Higher bandwidth channels may be deployed at channel boundaries ( | 11-19-2009 |
20090290616 | METHOD AND APPARATUS FOR DETERMINING THE SPATIAL CHANNELS IN AN SPATIAL DIVISION MULTIPLE ACCESS (SDMA)-BASED WIRELESS COMMUNICATION SYSTEM - An access point is disclosed herein that comprises a wireless network adapter configured to support a backhaul connection for a peer node to a network; a processing system configured to calculate precoding matrices that define spatial streams; and a transceiver configured to transmit data to the nodes on the spatial streams. | 11-26-2009 |
20100040019 | WIRELESS COMMUNICATION SYSTEMS WITH FEMTO NODES - Systems and methods for performing a handoff of an access terminal from a macro node to a femto node are disclosed. In one embodiment, the femto node is configured to transmit a predetermined signal for determining signal quality and an identifier that uniquely identifies the femto node to the access terminal. The access terminal is configured to transmit the identifier to the macro node. The femto node is identified as a hand in target based on the transmitted identifier and the macro node is configured to hand in the access terminal to the femto node. | 02-18-2010 |
20100040038 | WIRELESS COMMUNICATION SYSTEMS WITH FEMTO CELLS - Systems and methods of uniquely identifying communication nodes in a wireless communication system are described herein. One embodiment of the disclosure provides a wireless apparatus comprising a transceiver configured to receive a first identifier during at least one time slot. The first identifier identifies a first communication node. The apparatus further comprises a processing circuit configured to determine if the first identifier is received during a first time slot that is different from at least one pre-assigned time slot. | 02-18-2010 |
20100080163 | APPARATUS AND METHODS OF PROVIDING AND RECEIVING VENUE LEVEL TRANSMISSIONS AND SERVICES - A venue-cast system and method for providing and receiving venue level transmissions and services, including discovery of a venue specific transmission by receiving an overhead signal from a non-venue network, extracting information for receiving the venue specific transmission from the overhead signal, and tuning to receive the venue specific transmission based on the extracted information. The venue level transmission may be provided and received in a manner that does not prevent an access terminal from receiving a local area or wide area transmission. | 04-01-2010 |
20110154144 | ENHANCED BLOCK ACKNOWLEDGEMENT - Embodiments disclosed herein address the need in the art for enhanced block acknowledgement. In one embodiment, a receiver indicates a decoding delay for a maximum size aggregate frame in Block Ack negotiation, which may be used by a transmitter to determine to which Block Ack Request a Block Acknowledgement is responsive. In another embodiment, a Transmission Sequence Number (TSN) may be included in a Block Ack Request. The receiver includes the TSN in the corresponding Block Ack response. This allows the transmitter to determine which frames are “in transit.” The TSN may be used to identify blocks. In another embodiment, a TSN may be associated with one or more transmitted frames. While, the TSN is not transmitted with the Block Ack Request, the transmitter may determine which TSN corresponds with a Block Ack response in accordance with acknowledgements contained therein. Combinations of these techniques may be deployed. Various other aspects are also presented. | 06-23-2011 |
20110223952 | DISTRIBUTED HIERARCHICAL SCHEDULING IN AN AD HOC NETWORK - An ad hoc network with distributed hierarchical scheduling is disclosed. In one aspect, stations in a network mesh detect interfering neighbor stations and form interference lists. Stations transmit their interference lists. Scheduling stations schedule allocations for child stations in response to interference lists, received remote allocations, or a combination thereof. Coordination messages are transmitted including frame structure, allocations, and interference lists, among others. In another aspect, an ad hoc mesh network may be organized into a tree topology. In an example wireless backhaul network, this matches traffic flow. Distributed, hierarchical scheduling is provided where parents schedule communication with children while respecting already scheduled transmissions to/from interferers and to/from interferers of their respective children. Procedures to construct interference constraints for distributed, hierarchical scheduling are described, resulting in efficient scheduling and reuse in an ad hoc wireless network, without centralized scheduling. Various other aspects are also disclosed. | 09-15-2011 |
20120176949 | STANDBY TIME IMPROVEMENTS FOR STATIONS IN A WIRELESS NETWORK - A method includes receiving, at a station, a first delivery traffic indication message (DTIM) assigned to a first delivery interval. The first DTIM is configured to indicate whether group-addressed traffic is scheduled for delivery during a beacon interval. The first delivery interval is larger than a second delivery interval associated with a second DTIM. The method further includes receiving the group-addressed traffic during the beacon interval. | 07-12-2012 |
20120238268 | APPARATUS AND METHODS OF HAND-IN TO A FEMTO NODE - Methods and apparatuses are provided for causing active hand-in of a device from a macrocell base station to a femto node, which can be an inter-frequency hand-in. The femto node can broadcast a beacon over an operating frequency of the macrocell base station, and the macrocell base station, and/or one or more network components, can identify the femto node based on one or more parameters reported by the device from receiving the beacon. The beacon can be transmitted at varying powers to ensure active hand-in triggering, mitigate interference and/or can be powered on and off for such purposes. In addition, a macrocell base station can regulate compressed mode periods during which a device can measure the femto node based on receiving information regarding device proximity to the femto node, or a device can generate proximity indication messages base on measuring the beacon signals, etc. | 09-20-2012 |
20120309394 | APPARATUS AND METHODS FOR HAND-IN TO A FEMTO NODE - Methods and apparatuses are provided for causing active hand-in of a device from a macrocell base station to a femto node, which can be an inter-frequency hand-in. The femto node can broadcast a beacon, which can be received and reported by a device to a source base station along with one or more parameters for disambiguating a target femto node. The source base station can communicate a handover message to the femto node or a related femto gateway along with the one or more parameters. The femto node or femto gateway can disambiguate the intended target femto node based in part on the one or more parameters, which can include applying one or more filters. Additionally, the femto node can broadcast multiple beacons to assist in disambiguation of the target femto node. Also, where complete disambiguation is not possible, the femto gateway can prepare multiple femto nodes for hand-in. | 12-06-2012 |
20130034076 | METHOD, APPARATUS, AND SYSTEM FOR MEDIUM ACCESS CONTROL - Embodiments addressing MAC processing for efficient use of high throughput systems are disclosed. In one aspect, an apparatus comprises a first layer for receiving one or more packets from one or more data flows and for generating one or more first layer Protocol Data Units (PDUs) from the one or more packets. In another aspect, a second layer is deployed for generating one or more MAC frames based on the one or more MAC layer PDUs. In another aspect, a MAC frame is deployed for transmitting one or more MAC layer PDUs. The MAC frame may comprise a control channel for transmitting one or more allocations. The MAC frame may comprise one or more traffic segments in accordance with allocations. | 02-07-2013 |
20130121293 | PROTECTION FOR DIRECT LINK SETUP (DLS) TRANSMISSIONS IN WIRELESS COMMUNICATION SYSTEMS - Certain embodiments of the present disclosure provide techniques and apparatus for establishing direct link setup (DLS) connections between stations in a wireless local area network (WLAN). The DLS connections may be established in a manner that helps avoid collisions with transmissions from hidden stations. Other aspects, embodiments, and features are also claimed and described. | 05-16-2013 |
20130148632 | USING IDENTIFIER MAPPING TO RESOLVE ACCESS POINT IDENTIFIER AMBIGUITY - Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal | 06-13-2013 |
20130150046 | USING IDENTIFIER MAPPING TO RESOLVE ACCESS POINT IDENTIFIER AMBIGUITY - Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal. In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal. | 06-13-2013 |
20130188621 | NEIGHBOR DISCOVERY IN A WIRELESS SYSTEM - Beacons may be grouped to facilitate neighbor discovery in a wireless network. For example, neighboring access devices such as IEEE 802.11 access points may cooperate to transmit beacons in a group. In this way, a wireless device seeking to discover the neighboring access devices may scan for the beacons for a shorter period of time. An indication may be provided to enable a wireless device to more efficiently scan the beacons. For example, the indication may indicate the channel the wireless device should scan to receive the next beacon that is to be transmitted. In addition, the indication may include information relating to the transmission time of the next beacon. Other aspects, embodiments, and features are also claimed and described. | 07-25-2013 |
20130210485 | METHOD AND APPARATUS FOR LOCATING A WIRELESS LOCAL AREA NETWORK IN A WIDE AREA NETWORK - The disclosure is directed to a mobile communication device that measures characteristics or attributes of a first communications network that vary according to physical location within that first communications network to create a fingerprint, or signature, of a location within the first communications network. When the fingerprint of the current location of the mobile device is created it can be compared to a known fingerprint associated with a second communication network to determine the mobile device's proximity to the second communications network. For example, the first communications network may be a CDMA wide area wireless communication network and the second communications network may be a 802.11 wireless LAN. | 08-15-2013 |
20140223479 | APPARATUS AND METHODS OF PROVIDING AND RECEIVING VENUE LEVEL TRANSMISSIONS AND SERVICES - A venue-cast system and method for providing and receiving venue level transmissions and services, including discovery of a venue specific transmission by receiving an overhead signal from a non-venue network, extracting information for receiving the venue specific transmission from the overhead signal, and tuning to receive the venue specific transmission based on the extracted information. The venue level transmission may be provided and received in a manner that does not prevent an access terminal from receiving a local area or wide area transmission. | 08-07-2014 |
20140248870 | MOBILE DEVICES WITH FEMTO CELL FUNCTIONALITY - Aspects describe communications environments in which femtocell capability is provided to devices within the communications network. A non-femto enabled device and/or a femto enabled device can communicate with a femto enabled device in the same geographical area for femto-enabled peer-to-peer communication. Two non-femto enabled devices can be provided femto functionality through utilization of a femto enabled device, which operates as a hub between the two devices. Other aspects relate to enhanced position determination, adaptive coverage enhancement, local mobile networks, open access femtocells without a backhaul, and local broadcast of media though utilization of femto enabled devices. | 09-04-2014 |