Patent application number | Description | Published |
20100208593 | Method and apparatus for supporting network communications using point-to-point and point-to-multipoint protocols - Methods and apparatuses are disclosed for interworking a first protocol, e.g., Provider Backbone Bridge Traffic Engineering (PBB-TE), that provides Ethernet carrier-class traffic engineering, with a second protocol, e.g., Virtual Private LAN Service, that emulates local area network (LAN) service. Unicast, multicast, and broadcast transmissions are enabled across an Ethernet aggregation network and an MPLS core network. Dual homing protection and end-to-end traffic engineering with adjustable granularity are also provided. These capabilities are not available with traditional PBB-TE networks or with an interworking between PBB and VPLS that has been previously proposed. Embodiments of the invention terminate a PBB-TE tunnel at a user-facing provider edge (UPE) node and attach instance service identifiers (ISIDs) to different virtual switching instances (VSI)s. As a result, inexpensive Ethernet-only aggregation networks can be designed to interoperate with VPLS with increased reliability and control, benefiting service providers and end users. | 08-19-2010 |
20100208615 | Method and apparatus for provisioning a network element - Methods and apparatuses are disclosed for configuring a Provider Backbone Bridge (PBB) interface within Virtual Private LAN Service using Multi-Protocol Border Gateway Protocol (MP-BGP). Previously, the only ways to enable PBB interfaces for transmission were by learning, which poses security and scalability concerns due to flooding, or by manual configuration, which is impractical for large networks. Embodiments of the present invention enable custom topologies to be built in a controlled manner, which has not previously been possible for PBB over VPLS. By using MP-BGP messages to exchange PBB interface information between nodes, peering relationships are established, and communities may be built with any desired topology. Previously, PBB has only been used as a connectionless bridge; embodiments of the present invention use PBB as a connection between edge nodes. Network designers are provided increased flexibility, and security and congestion are improved, benefiting end users. | 08-19-2010 |
20110242968 | Method and Apparatus for Improving Network Communication Using BFD and VRRP Tracking System - An apparatus and method of a network system between a host and a group of routers using virtual router redundancy protocol (“VRRP”) messages and bidirectional forwarding detection (“BFD”) sessions are disclosed. The network system is capable of facilitating a first communication between a host and a master router of multiple VRRP routers and establishing a BFD session between the host and the master router. When the BFD session fails, the priority of the master router is subsequently lowered and a backup router is activated. In one embodiment, the backup router capable of performing functions of the master router becomes a new master until the BFD session resumes. | 10-06-2011 |
20120069742 | Method and Apparatus for Network OAM Interworking - Network service providers have largely addressed the growth in demand for communications networks in two ways: employing faster and more robust communications protocols through equipment upgrades and increasing use of Operations, Administrations, and Management (OAM) procedures for improved network performance. Typically, OAM operations procedures used by a network protocol are unique to that protocol and are not compatible with other network protocols. Service providers with networks that use multiple communications protocols, such as networks using legacy and newly installed equipment, can have difficulty ensuring optimal performance due to non-compatible OAM operations. A method, and corresponding apparatus, for supporting OAM interworking between first and second communications protocols used in an interworking circuit of a communications network is disclosed. The method, or corresponding apparatus, allows network service providers to ensure optimal network performance in a manner that does not affect customer traffic, is transparent to customers, and can be seamlessly integrated into existing interworking network nodes. | 03-22-2012 |
20140010073 | MULTICHASSIS FAILOVER AND RECOVERY FOR MLPPP WIRELESS BACKHAUL - A procedure, and an apparatus, system and computer program that operate in accordance with the procedure, for operating a dual homed communications network. In the procedure, a backup aggregation n ode is configured in accordance with a configuration of a primary multi-service router. A failure is detected in a first communication path that includes a primary multi-service router. In response to the detection, a second, backup communication path is activated that includes a backup multi-service router. In response to the activation, a router is negotiated with so that traffic forwarded by the router is provided to the second, backup communication path instead of the first communication path. | 01-09-2014 |
20140010112 | Method and Apparatus for Provisioning a Network Element - Methods and apparatuses are disclosed for configuring a Provider Backbone Bridge (PBB) interface within Virtual Private LAN Service using Multi-Protocol Border Gateway Protocol (MP-BGP). Previously, the only ways to enable PBB interfaces for transmission were by learning, which poses security and scalability concerns due to flooding, or by manual configuration, which is impractical for large networks. Embodiments of the present invention enable custom topologies to be built in a controlled manner, which has not previously been possible for PBB over VPLS. By using MP-BGP messages to exchange PBB interface information between nodes, peering relationships are established, and communities may be built with any desired topology. Previously, PBB has only been used as a connectionless bridge; embodiments of the present invention use PBB as a connection between edge nodes. Network designers are provided increased flexibility, and security and congestion are improved, benefiting end users. | 01-09-2014 |
Patent application number | Description | Published |
20130214450 | METHOD AND APPARATUS FOR MOLDING PARTS - A method and apparatus for injection molding plastic parts is described. In one embodiment, at least two materials are simultaneously injected into a mold. The resulting molded part can include at least two different regions. Each region can have distinct physical properties. Positions of the regions within the molded part can be at least partially controlled by controlling flow fronts of the at least two materials within the mold. | 08-22-2013 |
20140069789 | CYLINDRICAL ACTIVATION OF MENU BUTTONS - Cylindrical switch assemblies and methods of making the same are provided. Cylindrical switch assemblies can mitigate false presses by using switch assembly designs with vertically or near vertically mounted activation elements positioned around a perimeter of a button. The activation elements (e.g., switches) of the switch assemblies may be fixed to a vertical sidewall of a bracket and positioned such that a portion of the activation elements extend beneath the button. When the button is actuated by a user, the button activates the activation elements. Positioning multiple activation elements around the perimeter of the button ensures that the user can press anywhere on the button and still activate the activation elements. | 03-13-2014 |
20140073182 | Reinforcing Bars in I/O Connectors - Reinforcing bars or a reinforcing element with holes can be embedded within the shell of a receptacle connector to strengthen the shell, and potentially provide shielding. For example, a receptacle connector having a plurality of contacts configured to mate with corresponding contacts of a corresponding plug connector can include a shell having an opening for receiving the corresponding plug connector. The shell can include an upper portion and reinforcing bars embedded within the upper portion. The shell can include an upper portion and a reinforcing element with holes embedded within the upper portion. Methods for manufacturing the shell are also provided. | 03-13-2014 |
20140220320 | MOLDED PARTS - A method and apparatus for injection molding plastic parts is described. In one embodiment, at least two materials are simultaneously injected into a mold. The resulting molded part can include at least two different regions. Each region can have distinct physical properties. Positions of the regions within the molded part can be at least partially controlled by controlling flow fronts of the at least two materials within the mold. | 08-07-2014 |
20140331741 | Electronic Device With Printed Circuit Board Stress Monitoring - An electronic device may contain electrical components mounted on one or more substrates such as printed circuit boards. During a drop event, the printed circuit boards and components may be subjected to stresses. Strain gauges may be formed from metal traces embedded within dielectric layers in the printed circuit boards. The strain gauges may be used to make stress measurements at various locations on the boards. Stress data may be collected in response to data from an accelerometer indicating that the device has been dropped. Stress data collection may be halted in response to determining that the device has struck an external surface. Impact may be detected using accelerometer data, strain gauge output, or other sensor data. Stress data may be analyzed by the electronic device or external equipment. | 11-13-2014 |
20140357316 | Electronic Device With Mapping Circuitry - An electronic device may be provided with electronic components such as mapping circuitry for measuring distances, areas, volumes or other properties of objects in the surrounding environment of the device. The mapping circuitry may include a laser sensor and device position detection circuitry. The device may include processing circuitry configured to gather laser sample data and device position data using the laser sensor and the device position detection circuitry. The laser sample data and the device position data may be gathered while pointing a laser beam generated with a laser in the laser sensor at one or more sample points on a surface such as a surface of a wall. By tracking the device position and orientation using the device position detection circuitry, the objects may be mapped while gathering laser sample data from any position with respect to the object. | 12-04-2014 |
20150060126 | MODULES FOR INCREASING USEABLE SPACE ON CIRCUIT BOARDS - The described embodiments relate generally to electronic devices and to three dimensional modules for increasing useable space on a circuit board associated therewith. In some embodiments, the modules can have a cuboid geometry, and can include a number of surfaces having embedded circuit traces configured to interconnect electronic components arranged on various surfaces of the module. One of the surfaces of module can include at least one communication interface configured to interconnect the circuit traces on the module to associated circuit paths on a circuit board to which the module is coupled. In some embodiments the module can be operative as a standoff between the circuit board and another component of the electronic device. | 03-05-2015 |
20150092324 | LOW-PROFILE ELECTRICAL AND MECHANICAL CONNECTOR - A connector providing both an electrical and mechanical connection and an electronic device utilizing the connector. The connector includes a rigid body, a head connected to the rigid body, and a flexible conductor coupled to the body. The rigid body and the flexible conductor define an electrically conductive path to the head. An electronic device includes a housing defining at least one sidewall, an interior component, and a connector passing through at least one sidewall and mechanically contacting the interior component. The connector defines an electrically conductive path from the interior component to an exterior of the housing. | 04-02-2015 |
20150300961 | Electronic Device Having Components With Stress Visualization Features - An electronic device may have housing structures, electrical components, and other electronic device structures. Stress sensing structures may be formed using coatings on these electronic device structures. Stress sensing structures may have strip-shaped links that extend between pads or may be formed from blanket films. A stress sensing coating may be formed from a transparent thin film. The transparent thin film may be illuminated with monochromatic light while a video camera captures video images of resulting optical interference patterns. The video images may be captured during a test in which a device structure is exposed to stress from an impact between the device and an external object. Stress sensing coatings may also be formed from layers of material that develop cracks upon exposure to stress. Stress sensing structures may be used to evaluate stress during tests and to monitor stress during normal device use. | 10-22-2015 |
20160069507 | DOCKING STATION WITH INTEGRAL DEVICE SUPPORT STRUCTURE - An aesthetically pleasing docking station that is able to support electronic devices with only an interface connector. The docking station is further equipped with mechanisms that protect the electronic device from damage if it's deflected too far while mated to the docking station. | 03-10-2016 |
20160071660 | BUTTON INTEGRATION FOR AN ELECTRONIC DEVICE - This application relates to various button related embodiments for use with a portable electronic device. In some embodiments, a snap clip can be integrated with a button bracket to save space where two separate brackets would take up too much space in the portable electronic device. In other embodiments, a tactile switch can be waterproofed by welding a polymeric layer atop a tactile switch assembly. In this way water can be prevented from contacting moisture sensitive components of the tactile switch assembly. The weld joining the polymeric layer to the tactile switch can include at least one gap to trapped gas surrounding the tactile switch assembly to enter and exit during heat excursions caused by various operating and/or assembly operations. | 03-10-2016 |
20160071664 | BUTTON FEATURES OF AN ELECTRONIC DEVICE - Systems and methods for forming button assemblies for electronic devices are disclosed. According to some embodiments, the button assemblies include one or more sound improvement features to improve the sound that the button assemblies make when pressed by users of the electronic devices. According to some embodiments, the button assemblies include shims that provide proper alignment of the various components of the button assemblies and to accommodate any tolerance stack up of the various components of the button assemblies. The shims can include alignment features to prevent the shims from shifting within the button assemblies. According to some embodiments, thicknesses of the shims are customized to accommodate varying tolerance stack ups of the components of the button assemblies. In some embodiments, the button assemblies include a combination of sound improvement features and shims. | 03-10-2016 |
Patent application number | Description | Published |
20120270544 | SYSTEM AND METHOD FOR CONSTRUCTING A CARRIER TO INTERFERENCE MATRIX BASED ON SUBSCRIBER CALLS - A conventional wireless device constantly measures the signal strength of its server base station and the strength of signals from surrounding base stations for handoff purposes. The wireless device transmits this information to its serving base station, which discards the information a short time afterward, following handoff. The present system and method store the formerly discarded information in one of several existing network elements or in a separate computer system. This information is used to generate a carrier to interference ratio, which indicates the level of interference between station pairs, and to also generate a carrier to interference matrix, including identifying potential interference for each station pair. The frequency of occurrences during predetermined desired periods of time and the volume of traffic affected by each level of interference may also be calculated. This provides comprehensive, continuous, real-time information for wireless frequency planning. | 10-25-2012 |
20130143553 | FEMTOCELL USE FOR RADIO FREQUENCY NETWORK SWEEPS - Systems and methods that utilize femtocell access points (FAP) to perform radio frequency (RF) network sweeps are provided. In one embodiment, a method includes: predicting an availability of an access point (AP) to perform an RF network sweep; and determining that the access point is available to perform the RF network sweep based, at least, on a prediction that a mobile device on a white list for the access point is not likely to access the access point during a time interval associated with performing the RF network sweep. In another embodiment, a method includes: comparing a network quality characteristic for a wireless channel associated with a FAP with a network quality characteristic for a wired network communicatively coupled to the FAP. The network quality characteristics can be the same. The method can then include employing the comparison to determine to which network an impairment is attributable. | 06-06-2013 |
20130288666 | SYSTEM AND METHOD FOR CONSTRUCTING A CARRIER TO INTERFERENCE MATRIX BASED ON SUBSCRIBER CALLS - A conventional wireless device constantly measures the signal strength of its server base station and the strength of signals from surrounding base stations for handoff purposes. The wireless device transmits this information to its serving base station, which discards the information a short time afterward, following handoff. The present system and method store the formerly discarded information in one of several existing network elements or in a separate computer system. This information is used to generate a carrier to interference ratio, which indicates the level of interference between station pairs, and to also generate a carrier to interference matrix, including identifying potential interference for each station pair. The frequency of occurrences during predetermined desired periods of time and the volume of traffic affected by each level of interference may also be calculated. This provides comprehensive, continuous, real-time information for wireless frequency planning. | 10-31-2013 |
20140128005 | FEMTOCELL USE FOR RADIO FREQUENCY NETWORK SWEEPS - Systems and methods that utilize femtocell access points (FAP) to perform radio frequency (RF) network sweeps are provided. In one embodiment, a method includes: predicting an availability of an access point (AP) to perform an RF network sweep; and determining that the access point is available to perform the RF network sweep based, at least, on a prediction that a mobile device on a white list for the access point is not likely to access the access point during a time interval associated with performing the RF network sweep. In another embodiment, a method includes: comparing a network quality characteristic for a wireless channel associated with a FAP with a network quality characteristic for a wired network communicatively coupled to the FAP. The network quality characteristics can be the same. The method can then include employing the comparison to determine to which network an impairment is attributable. | 05-08-2014 |
20140155055 | SYSTEM AND METHOD FOR CONSTRUCTING A CARRIER TO INTERFERENCE MATRIX BASED ON SUBSCRIBER CALLS - A conventional wireless device constantly measures the signal strength of its server base station and the strength of signals from surrounding base stations for handoff purposes. The wireless device transmits this information to its serving base station, which discards the information a short time afterward, following handoff. The present system and method store the formerly discarded information in one of several existing network elements or in a separate computer system. This information is used to generate a carrier to interference ratio, which indicates the level of interference between station pairs, and to also generate a carrier to interference matrix, including identifying potential interference for each station pair. The frequency of occurrences during predetermined desired periods of time and the volume of traffic affected by each level of interference may also be calculated. This provides comprehensive, continuous, real-time information for wireless frequency planning. | 06-05-2014 |
Patent application number | Description | Published |
20080284569 | Guaranteed RFID Event Delivery - An RFID event tracking and management system provides a standardized approach that can be utilized by various industry verticals. Guaranteed event delivery can ensure that any event data captured by an RFID device is written to persistent storage. A first guaranteed commit process can ensure that event data captured by an RFID device is written to a persistent queue, and the event data is not released from the RFID device until the event data is verified to be in the persistent queue. A second guaranteed commit process then ensures that the event data in the persistent queue is written to persistent storage, and the event data is not released from the persistent queue until the event data is verified to be in the persistent storage. | 11-20-2008 |
20080284597 | Security Using EPCIS Data And A Virtual Private Database - An RFID event tracking and management system provides a standardized approach that can be utilized by various industry verticals. Loss of captured event data, such as RFID generated through an RFID event, can be prevented through a series of guarantee semantics. Approaches also provide for role-based data visibility. Queries received from a user or entity can be dynamically modified based on the role of the user/entity using a virtual private database (VPD). The modified query can result in a virtual private database automatically hiding or restricting access to event data at row, column, and/or cell levels, so that an authorized user/entity is only able to access data to which that user/entity should have access. | 11-20-2008 |
20080284598 | RFID Data Integrity and Event Compensation - An RFID event tracking and management system provides a standardized approach that can be utilized by various industry verticals. Loss of captured event data, such as RFID generated through an RFID event, can be prevented through a series of guarantee semantics. Approaches also allow an entity to control the integrity level of their data, such as where dimension data is not available to be correlated with coded event data. An entity can decide whether to allow querying on event data that has not been correlated with dimension data useful in interpreting the location data. The entity can alternatively decide to only allow access and querying of event data when the corresponding location and dimension data are compensated | 11-20-2008 |
20080288961 | Industry Vertical RFID Database Models - An RFID event tracking and management system provides a standardized approach that can be utilized by various industry verticals. A series of industry-specific data models can be built upon a common data model using an object-oriented database and relational mapping tool. Using the industry-specific data models, an object-oriented database is generated that can be used by all vertical applications that sit on top of the database. The data models can be defined using a data model service, such that query and capture interfaces can interact with the respective data model. Such an approach allows the data models to be dynamic, which is desirable as a single static data model is not appropriate for all industries. | 11-20-2008 |
Patent application number | Description | Published |
20080266383 | Method and system for identifying a multipoint control unit for hosting a conference - A method for identifying a multipoint control unit (MCU) for hosting a conference includes receiving a notification indicating one or more conference parameters and ranking a plurality of MCUs wherein the ranking is based on one or more, network conditions. The method includes selecting a first MCU based on a rank associated with the first MCU and determining whether the first MCU is capable of hosting the conference. In response to determining that the first MCU is capable of hosting the conference, the method includes assigning the conference to be hosted by the first MCU. | 10-30-2008 |
20080267282 | OPTIMIZING BANDWIDTH IN A MULTIPOINT VIDEO CONFERENCE - A plurality of multipoint conference units (MCUs) may optimize bandwidth by selecting particular video streams to transmit to endpoints and/or other MCUs participating in a video conference. An endpoint may generate video streams and audio streams and transmit these streams to its managing MCU. During the video conference, an endpoint may also receive and display different video streams and different audio streams. In a particular embodiment, a controlled MCU receives video streams from its managed endpoints, selects potential video streams based upon the maximum number of video streams that any endpoint can display concurrently, and transmits those potential video streams to a master MCU. The master MCU may also receive video streams from its managed endpoints and may select active video streams for transmission to its managed endpoints and to the controlled MCU, which transmits selected streams to its managed endpoints. | 10-30-2008 |
20080267379 | CALCULATING A FULLY QUALIFIED NUMBER - A teleconference server may calculate a fully qualified number (FQN), which specifies a string of numbers that, if dialed by an calling party, will establish a call with a called party. The fully qualified number may include, for example, an external access code, an international access code, a country code, a national destination code, and/or a subscriber number. In order to determine a calling party and a called party, the teleconference server may access data regarding a scheduled call. The teleconference server may determine a fully qualified number based on the relationship between the called party and the calling party. The teleconference server may send the fully qualified number to the calling party, which may then initiate a scheduled call with the called party by dialing the received fully qualified number. | 10-30-2008 |
20090232291 | One Button Conference Initiation - A method includes receiving at a local conference coordinator a first indication of a scheduled conference that includes a plurality of conference details. The method also includes transmitting at least one of the plurality of conference details to a remote conference coordinator and receiving at least one additional conference detail regarding the scheduled conference from the remote conference coordinator. The method additionally includes determining conference scheduling information comprising at least one resource to be used for the scheduled conference based on the plurality of conference details and the at least one additional conference detail. The method also includes identifying a conference room supporting the at least one resource to be used for the scheduled conference. The method further includes transmitting conference scheduling information to the conference room such that an interface in the conference room can initiate the scheduled conference based on a single indication received from a user. | 09-17-2009 |
20090240770 | Establishing a Remotely Hosted Conference Initiated with One Button Push - A method includes registering with a first remote conference manager operated by a first entity and a request to enable conferencing with a second entity. The method also includes querying the first remote conference manager for at least one conference room hosted by the second entity and updating a directory of conference rooms comprising at least one local conference room to further comprise the at least one remote conference room. The method further includes receiving a request to schedule a conference. Upon determining at least one remote conference room is to be used for the scheduled conference, the method also includes transmitting the request to the first remote conference manager. Upon the second remote conference manager transmitting an acceptance of the conference, the method also includes receiving details from the first remote conference manager for establishing a connection for use with the conference and transmitting the details to the at least one local conference room. | 09-24-2009 |
20110135079 | ACCESSING A CALENDAR SERVER TO FACILITATE INITIATION OF A SCHEDULED CALL - A conference control server accesses a calendar server in order to identify calls scheduled by an organizer and to facilitate initiation of the calls at the scheduled time. A method for integrating the calendar server and the conference control server includes identifying a plurality of resources, which each have a resource identifier, and registering to receive notifications of updates to those resources. If update notifications are received, the conference control server determines meeting information for a scheduled conference indicated by the update notifications. The conference control server may also provide a portion of the meeting information to a resource identified by the meeting information. | 06-09-2011 |
20120257003 | Calculating A Fully Qualified Number - A teleconference server may calculate a fully qualified number (FQN), which specifies a string of numbers that, if dialed by an calling party, will establish a call with a called party. The fully qualified number may include, for example, an external access code, an international access code, a country code, a national destination code, and/or a subscriber number. In order to determine a calling party and a called party, the teleconference server may access data regarding a scheduled call. The teleconference server may determine a fully qualified number based on the relationship between the called party and the calling party. The teleconference server may send the fully qualified number to the calling party, which may then initiate a scheduled call with the called party by dialing the received fully qualified number. | 10-11-2012 |
20130021432 | OPTIMIZING BANDWIDTH IN A MULTIPOINT VIDEO CONFERENCE - A plurality of multipoint conference units (MCUs) may optimize bandwidth by selecting particular video streams to transmit to endpoints and/or other MCUs participating in a video conference. An endpoint may generate video streams and audio streams and transmit these streams to its managing MCU. During the video conference, an endpoint may also receive and display different video streams and different audio streams. In a particular embodiment, a controlled MCU receives video streams from its managed endpoints, selects potential video streams based upon the maximum number of video streams that any endpoint can display concurrently, and transmits those potential video streams to a master MCU. The master MCU may also receive video streams from its managed endpoints and may select active video streams for transmission to its managed endpoints and to the controlled MCU, which transmits selected streams to its managed endpoints. | 01-24-2013 |
Patent application number | Description | Published |
20130007218 | Network Assisted Tracker for Better P2P Traffic Management - Embodiments described herein may disclose systems and methods to employ an enhanced tracker in a P2P scenario to increase P2P performance and efficiency. After receiving a request for content the tracker may assist in obtaining as many chunks of the requested content as possible from the plurality of peers on the local network and may obtain any chunks of the requested content not obtained from the plurality of peer on the local network from a randomly selected list of remote peers. | 01-03-2013 |
20130308455 | METHODS AND APPARATUS FOR LOAD BALANCING ACROSS MEMBER PORTS FOR TRAFFIC EGRESSING OUT OF A PORT CHANNEL - Methods and apparatus for load balancing across member ports for traffic egressing out of a port channel are provided herein. An example method according to one implementation may include: assigning a quantized value based on current load to each of the network ports in the port channel; receiving a data packet addressed to egress through the port channel; identifying a traffic flow with which the received data packet is associated; determining whether the identified traffic flow is a new traffic flow; and selecting one of the network ports in the port channel as an egress port. Selection of the egress port may be weighted according to the quantized value of each of the network ports in the port channel. | 11-21-2013 |
20140050217 | Two-Stage Port-Channel Resolution in a Multistage Fabric Switch - In some embodiments, a data packet may be received at a leaf switch. A port-channel associated with a destination port for the data packet may be identified, and the data packet may be transmitted to the destination port via the identified port-channel. | 02-20-2014 |
20140064104 | Host Detection by Top of Rack Switch Devices in Data Center Environments - Techniques are provided for detecting and identifying host devices in a network. At a switch device, a packet is received from a server that is interfaced with a switch device and is configured to host a virtual machine that is a source of the packet. A Media Access Control (MAC) address or an Internet Protocol (IP) address is identified. The MAC address and IP address are associated with the virtual machine. In response to identifying the MAC or IP addresses, the switch device determines whether a binding between the IP and MAC addresses of the virtual machine is present in a database of addresses accessible by the switch device. If the association is not present, based on the fields obtained from the packet header, a request message is sent to the virtual machine to resolve the association between the IP address and the MAC address of the virtual machine. | 03-06-2014 |
20140064270 | Using Fabric Port-Channels to Scale IP Connectivity to Hosts in Directly Connected Subnets in Massive Scale Data Centers - Systems and methods are provided for using fabric port-channels for Switched Virtual Interfaces (SVIs) to scale IP connectivity for hosts in directly connected subnets in massive scale data centers. By representing SVIs by internal fabric port-channels, ToRs hosting the SVI can share routed traffic directed toward hosts within the associated vlan in a load-balanced manner without frequent updates to the FIB/Adjacency tables. | 03-06-2014 |
20140092901 | SYSTEM AND METHOD FOR HARDWARE-BASED LEARNING OF INTERNET PROTOCOL ADDRESSES IN A NETWORK ENVIRONMENT - A method is provided one example embodiment and includes receiving a packet including a source /32 address and a destination /32 address. The source /32 address can indicate an Internet Protocol (IP) address of a source host that sent the packet. The destination /32 address can indicate an IP address of a destination host to which the packet is destined. The method may also include looking up the destination /32 address and the source /32 address in a Forwarding Information Base/adjacency (FIB)/(ADJ) table implemented in a hardware of a leaf switch in a network. Additionally, the method may include adding the source /32 address and corresponding adjacency information to the FIB/ADJ table if the destination /32 address is found in the FIB/ADJ table, and the source /32 address is not found in the FIB/ADJ table. The method may also include forwarding the packet to the destination host. | 04-03-2014 |
20140098823 | Ensuring Any-To-Any Reachability with Opportunistic Layer 3 Forwarding in Massive Scale Data Center Environments - Techniques are provided for updating routing tables of switch devices. At a first switch device of a first rack unit in a network, information is received about addresses of host devices in the network. The addresses are stored in a software cache. A packet is received from a first host device assigned to a first subnet and housed in the first rack unit. The packet is destined for a second host device assigned to a second subnet and housed in a second rack unit in the network. The packet is forwarded using the subnet entry and it may remain sub-optimal during a period before which an entry can be installed form a software cache. The software cache is evaluated to determine the address of the second host device. The packet is then forwarded optimally. This will ensure any-to-any communications in the network initially sub-optimally and subsequently optimally. | 04-10-2014 |
20140112122 | SYSTEM AND METHOD FOR OPTIMIZING NEXT-HOP TABLE SPACE IN A DUAL-HOMED NETWORK ENVIRONMENT - A method for optimizing next-hop table space in a dual-homed network environment is provided and includes associating an Emulated Switch Internet Protocol (ES-IP) address and an Emulated Switch Media Access Control (ES-MAC) address with an Emulated Switch Identifier (ES-ID) of an emulated switch connected to a dual-homed host having a host IP address in a network environment, and populating a host route table with a mapping between the host IP address and the ES-IP address. The method further includes receiving an outgoing packet with the host IP address as a destination address, determining the ES-IP address corresponding to the host IP address, sending out an ARP request for a MAC address corresponding to the ES-IP address, receiving the ES-MAC address, determining the ES-ID corresponding to the ES-MAC address, encapsulating the outgoing packet with the ES-ID, and forwarding the packet. | 04-24-2014 |
20140156667 | Increasing Internet Protocol Version 6 Host Table Scalability in Top of Rack Switches for Data Center Deployments - Techniques are provided for optimizing storage of address information in switch device databases. A control packet is received from a source host. An address associated with a host is determined. The address comprises a first and second address component. The first address component is stored in a first database and is mapped to an index value that is stored in the first database. The index value is also stored in a second database along with the second address component. The first database may also be examined to determine whether the first address component is stored in the first database. If the first address component is stored in the first database, the index value mapped to the first address component is retrieved. The second database is examined to determine whether the index value and the second address component are stored in the second database. | 06-05-2014 |
20140250220 | Optimizing Handling of Virtual Machine Mobility in Data Center Environments - Techniques are provided for sending address information of virtual machines to a physical switch. A migration of a virtual machine to a physical server is detected. The physical server obtains address information of the virtual machine, and upon obtaining the address information of the virtual machine, the physical server sends the address information to a first physical switch that is connected to the physical server. | 09-04-2014 |
20140254589 | "Slow-Start" Problem in Data Center Networks and a Potential Solution - Systems and methods are provided for a multicast based solution to solving the slow-start problem that ensures both optimal (1-hop) and in-sequence delivery of packets to the destination. Packets are hardware switched thereby completely eliminating the slow software switching path. | 09-11-2014 |
20140347994 | METHODS AND APPARATUS FOR LOAD BALANCING ACROSS MEMBER PORTS FOR TRAFFIC EGRESSING OUT OF A PORT CHANNEL - Methods and apparatus for load balancing across member ports for traffic egressing out of a port channel are provided herein. An example method according to one implementation may include: assigning a quantized value based on current load to each of the network ports in the port channel; receiving a data packet addressed to egress through the port channel; identifying a traffic flow with which the received data packet is associated; determining whether the identified traffic flow is a new traffic flow; and selecting one of the network ports in the port channel as an egress port. Selection of the egress port may be weighted according to the quantized value of each of the network ports in the port channel. | 11-27-2014 |
20150043581 | Intelligent Handling of Virtual Machine Mobility in Large Data Center Environments - At a physical device in a network configured to host a virtual switch and one or more virtual machines, a packet is received at the virtual switch from a source virtual machine that is directly attached to that virtual switch. A destination Media Access Control (MAC) address is identified from the packet indicating a destination virtual machine for the packet. In response to determining that the destination MAC address of the packet is not present in a database of MAC addresses accessible by the virtual switch, the destination MAC address of the packet is replaced with a shared MAC address associated with a plurality of physical switches in the network. | 02-12-2015 |
20150046572 | Extending Virtual Station Interface Discovery Protocol (VDP) and VDP-Like Protocols for Dual-Homed Deployments in Data Center Environments - Techniques are provided for provisioning network resources for virtual machines. At a first switch device, a configuration request message is received from a virtual switch to provision virtual network segmentation resources for a virtual machine managed by the virtual switch. The first switch device provisions the virtual network segmentation resources for the virtual machine. The first switch devices sends to a second switch device a first synchronization message that includes information describing the virtual network segmentation resources. The second switch device is a peer of the first switch device. The first switch device also sends to the second switch device a second synchronization message that includes state information indicating that the first switch device is in an active state for servicing the virtual machine and that the second switch device is to be placed in a dormant state for servicing the virtual machine. | 02-12-2015 |
20150063353 | IMPLEMENTATION OF VIRTUAL EXTENSIBLE LOCAL AREA NETWORK (VXLAN) IN TOP-OF-RACK SWITCHES IN A NETWORK ENVIRONMENT - An example method for implementation of virtual extensible local area network (VXLAN) in top-of-rack (ToR) switches in a network environment is provided and includes receiving a packet encapsulated with a VXLAN header having an unknown virtual tunnel endpoint (VTEP) Internet Protocol (IP) address in a network environment, and installing an entry at an index location of a forwarding table. The index location includes an encoding of the VTEP-IP address as a VTEP index (VTEP-IDX), and the entry maps a VXLAN interface to an IP address associated with a VXLAN network interface (VNI). In specific embodiments, the VTEP-IDX is logN bits, where N is a size of the forwarding table. The forwarding table indicates a destination VTEP IP address when encapsulating the packet, and the source VTEP IP address when decapsulating the packet. | 03-05-2015 |
20150085859 | Two-Stage Port-Channel Resolution in a Multistage Fabric Switch - In some embodiments, a data packet may be received at a leaf switch. A port-channel associated with a destination port for the data packet may be identified, and the data packet may be transmitted to the destination port via the identified port-channel. | 03-26-2015 |
20150103692 | Host Traffic Driven Network Orchestration within Data Center Fabric - Presented herein are techniques to handle data packets received at a top-of-rack (ToR) switch in an underlay network hosting one or more tenant networks. The underlay network may comprise a plurality of ToR switches each connected to each of a plurality of spine switches. The data packet may be received from a virtual machine in a tenant network, and have a header with a data packet identifier. A mobility domain identifier may be determined that corresponds to the network portion within which the virtual machine can be migrated. The mobility domain may be configured on the ToR switch on a per-port basis based on the virtual machine connected to the ToR switch port. A unique identifier may be formed based on the data packet identifier and mobility domain identifier. Using this unique identifier, provisioning information may be obtained for the tenant network on the ToR switch. | 04-16-2015 |
20150124814 | ENABLING SCALABLE VIRTUAL MACHINE TRACKING IN A DATA CENTER FABRIC - A method is provided in one example embodiment and includes receiving at a first network element a packet from a second network element; processing the packet at the first network element to obtain information regarding an identity of a virtual machine (“VM”) hosted by the second network element contained within the packet; and storing at the first network element the identifying information. The identifying information stored at the first network element is accessible by at least one third network element. In some embodiments, the first network element comprises a physical switch and the second network element comprises a virtual switch. | 05-07-2015 |
20160028656 | Extending Virtual Station Interface Discovery Protocol (VDP) and VDP-Like Protocols for Dual-Homed Deployments in Data Center Environments - Techniques are provided for provisioning network resources for virtual machines. At a first switch device, a configuration request message is received from a virtual switch to provision virtual network segmentation resources for a virtual machine managed by the virtual switch. The first switch device provisions the virtual network segmentation resources for the virtual machine. The first switch devices sends to a second switch device a first synchronization message that includes information describing the virtual network segmentation resources. The second switch device is a peer of the first switch device. The first switch device also sends to the second switch device a second synchronization message that includes state information indicating that the first switch device is in an active state for servicing the virtual machine and that the second switch device is to be placed in a dormant state for servicing the virtual machine. | 01-28-2016 |
20160103696 | TOUCHLESS MULTI-DOMAIN VLAN BASED ORCHESTRATION IN A NETWORK ENVIRONMENT - An example method for touchless multi-domain VLAN based orchestration in a network environment is provided and includes receiving mobility domain information for a virtual machine associated with a processor executing the method in a network environment, the mobility domain information comprising a mobility domain identifier (ID) indicating a scope within which the virtual machine can be moved between servers, generating a virtual station interface (VSI) discovery protocol (VDP) message in a type-length-value (TLV) format with the mobility domain information, and transmitting the VDP message to a leaf switch directly attached to the server, wherein the leaf switch provisions a port according to the mobility domain information. | 04-14-2016 |
Patent application number | Description | Published |
20100054241 | INTEGRATING SECURITY SERVER POLICIES WITH OPTIMIZED ROUTING CONTROL - In one embodiment, a first set of one or more control policies at a control server of a network domain may be transmitted to a routing master controller of the network domain, which uses a second set of one or more traffic policies to determine optimal paths for directing traffic through the domain. The routing master controller may then generate a third set of one or more integrated policies based on the first and second sets of policies, e.g., based on the knowledge and policies of both the control server and the routing master controller. | 03-04-2010 |
20100110891 | SHARING PERFORMANCE MEASUREMENTS AMONG ADDRESS PREFIXES OF A SAME DOMAIN IN A COMPUTER NETWORK - In one embodiment, performance measurements may be obtained at a local domain from a set of one or more responding targets of a particular remote domain. The performance measurements may then be applied to prefix-specific policies of any corresponding destination address prefix within the particular remote domain, such that traffic destined to a particular prefix of the particular remote domain may be routed from the local domain based on the corresponding prefix-specific policies and applied performance measurements. | 05-06-2010 |
20100128606 | FIRST-HOP DOMAIN RELIABILITY MEASUREMENT AND LOAD BALANCING IN A COMPUTER NETWORK - In one embodiment, probe messages may be transmitted from a local domain to a set of one or more responding probe targets located beyond a plurality of probed first-hop domains of the local domain, the probe messages transmitted via each of a plurality of probed first-hop domains. A reliability of each probed first-hop domain may then be determined based on responsiveness of probe messages transmitted via each respective probed first-hop domain, such that traffic destined beyond the probed first-hop domains may be load balanced across the probed first-hop domains based on the respective reliability, regardless of a traffic-class and a destination of the traffic. | 05-27-2010 |
20100309795 | DYNAMICALLY RIGHT-SIZING PREFIXES FOR NETWORK AND APPLICATION PERFORMANCE - In one embodiment, performance parameters may be determined for each of a plurality of network address prefixes in a computer network. Based on the respective performance parameters, the prefixes may be resized through at least one of consolidation of adjacent prefixes and splitting of prefixes, and traffic may then be routed in the computer network based on the resized prefixes. | 12-09-2010 |
20120120795 | SYSTEM AND METHOD FOR INCREASING GRANULARITY OF PREFIX CONTROL IN A COMPUTER NETWORK - In one embodiment, a routing table of a router is populated with a plurality of prefixes. One or more performance characteristics of the plurality of prefixes are monitored. The router determines that a need exists to split a selected prefix of the plurality of prefixes. The router determines one or more boundaries upon which to split the selected prefix based on the monitored performance characteristics. The router then injects one or more more-specific prefixes into the routing table, each more-specific prefix referring to a smaller subset of nodes than the selected prefix, to split the selected prefix on the one or more boundaries to create a plurality of split prefixes. The split prefixes are controlled to optimize distribution of traffic. | 05-17-2012 |
20120166360 | ROUTE OPTIMIZATION OF SERVICES PROVIDED BY ONE OR MORE SERVICE PROVIDERS FOR COMBINED LINKS - In one embodiment, two or more links, coupled to a first service provider (SP) that charges a price for utilization of services according to a first pricing structure, are combined to form a single virtual combined link. Each of the two or more links of the virtual combined link and one or more other links, coupled to a second SP that charges a price for utilization of services according to a second pricing structure, are monitored to obtain link data. The link data for the two of more links of the virtual combined link is merged to form link data for the virtual combined link. Data distribution among the virtual combined link and the one or more other links is optimized to distribute data among the virtual combined link and the one or more other links in a manner that minimizes cost. | 06-28-2012 |
20120233308 | Determining Network Node Performance Data Based on Location and Proximity of Nodes - In an embodiment, a method comprises receiving a request to obtain network performance data for a plurality of target nodes; determining geo-locations of the plurality of target nodes; based on the geo-locations, determining a set of the plurality of target nodes that are within a specified proximity radius; selecting one particular target node in the set; sending a probe packet, requesting network performance data, to the one particular target node in the set and not to all other target nodes in the set; applying, to all the target nodes in the set, network performance data that is received in response to the probe packet; wherein the method is performed by one or more processors. | 09-13-2012 |
20120250516 | TECHNIQUE FOR USING OER WITH AN ECT SOLUTION FOR MULTI-HOMED SITES - In one embodiment, a plurality of spoke-to-hub virtual private network (VPN) tunnels are established from a spoke router located at an edge of a spoke network to a hub network. The spoke router is configured as an optimized edge routing (OER) node. The spoke router monitors a network statistic for each of a plurality of prefixes on each of the plurality of spoke-to-hub VPN tunnels. The monitored network statistic is analyzed to determine whether a distribution of traffic between the spoke network and the hub network can be optimized. In the event the distribution of traffic between the spoke network and the hub network can be optimized, traffic is redistributed on a per-prefix basis among the plurality of spoke-to-hub VPN tunnels based on the monitored network statistic, such that at least a portion of the traffic is routed over each of the plurality of spoke-to-hub VPN tunnels. | 10-04-2012 |
20130336167 | IDENTIFYING THE BEST SERVICE PROVIDER LINK FOR PERFORMANCE ROUTING - In one embodiment, a method includes obtaining a first packet included in a flow to be forwarded to a border router, and replicating the first packet to create a duplicate. The first packet is forwarded onto a first set of links, and the duplicate is forwarded onto a second set of links, to the border router. First information relating to the first packet and the first set of links, and second information relating to the duplicate and the second set of links, is obtained. The first information and the second information are used to determine whether to forward the flow on the first set of links. The first set of links is used to forward the flow if it is determined that the first set of links is to be used to forward the flow, otherwise the second set of links is used to forward the flow. | 12-19-2013 |
20140241515 | Location Aware Conferencing System And Method - In one embodiment, a method includes receiving a first request to join a conference from a first user device. The location of the first user device is determined. Based on the location of the first user device, the proximity of the first user device relative to endpoints configured to facilitate the conference is identified. A first one of the endpoints that is more proximate to the first user device than other endpoints is selected for handling the conferences. | 08-28-2014 |
Patent application number | Description | Published |
20150237013 | SPECIFYING POINT OF ENFORCEMENT IN A FIREWALL RULE - Some embodiments of the invention provide a novel method for specifying firewall rules. In some embodiments, the method provides the ability to specify for a particular firewall rule, a set of network nodes (also called a set of enforcement points below) at which the particular firewall should be enforced. To provide this ability, the method of some embodiments adds an extra tuple (referred to below as the AppliedTo tuple) to a firewall rule. This added AppliedTo tuple lists the set of enforcement points at which the firewall rule has to be applied (i.e., enforced). | 08-20-2015 |
20150237014 | METHOD AND APPARATUS FOR DISTRIBUTING FIREWALL RULES - Some embodiments of the invention provide a novel method for specifying firewall rules. In some embodiments, the method provides the ability to specify for a particular firewall rule, a set of network nodes (also called a set of enforcement points below) at which the particular firewall should be enforced. To provide this ability, the method of some embodiments adds an extra tuple (referred to below as the AppliedTo tuple) to a firewall rule. This added AppliedTo tuple lists the set of enforcement points at which the firewall rule has to be applied (i.e., enforced). | 08-20-2015 |
20150237015 | PROVISIONING FIREWALL RULES ON A FIREWALL ENFORCING DEVICE - Some embodiments of the invention provide a novel method for specifying firewall rules. In some embodiments, the method provides the ability to specify for a particular firewall rule, a set of network nodes (also called a set of enforcement points below) at which the particular firewall should be enforced. To provide this ability, the method of some embodiments adds an extra tuple (referred to below as the AppliedTo tuple) to a firewall rule. This added AppliedTo tuple lists the set of enforcement points at which the firewall rule has to be applied (i.e., enforced). | 08-20-2015 |