Patent application number | Description | Published |
20110317642 | SYSTEM AND PROCESS FOR TRANSMISSION SEQUENCE NUMBER MANAGEMENT IN AN INTRA-NODE B UNSYNCHRONIZED SERVING CELL CHANGE - Various aspects of the disclosure provide an intra-Node B unsynchronized serving cell change enabling the typical loss of packets resulting from such a procedure to be reduced or eliminated. In one example, when a UE ceases listening to a downlink channel from a first cell provided by a Node B and starts to configure its receiver to listen to a downlink channel from a second cell provided by the Node B, a continued incrementing of a sequence number may be stalled in the transmission of packets to the UE. That is, the TSN space may be stalled, such that HARQ retransmissions recur beyond the preconfigured maximum number of retransmissions, until the UE indicates that the serving cell change is complete. In another example, the transmission of packets to the UE from the first cell may be halted until the UE indicates that the serving cell change is complete. | 12-29-2011 |
20120147869 | SYSTEM AND METHOD FOR REDUCING RESETS DURING HANDOVERS IN A SINGLE FREQUENCY DUAL CARRIER WIRELESS COMMUNICATION SYSTEM - A method, apparatus, and computer program product can provide for procedures at an access terminal for handling the delivery of packets from the MAC entity to the RLC entity, with an aim to reduce the occurrence of RLC resets that might otherwise be caused by out-of-order processing of control packets following a serving cell change. In one example, a MAC entity may insert an identifier into a packet delivered up to the RLC entity, to indicate whether the packet arrived from the current primary serving cell. In another example, a serving cell change procedure may include steps to flush a queue at the MAC entity and kill any running reordering release timers. In these ways potential problems caused by out-of-order control packets can be reduced or avoided. | 06-14-2012 |
20120163315 | SYSTEM AND METHOD FOR PERFORMING A RADIO LINK CONTROL (RLC) RESET IN A DOWNLINK MULTIPOINT SYSTEM - A method and apparatus for wireless communication may provide an RLC reset procedure tailored for a multipoint HSDPA system utilizing a plurality of disparate Node Bs to provide an RLC flow from an RNC to a UE. Some aspects of the disclosure provide for a flush request to be provided to each of a plurality of Node Bs utilized as serving cells in the multipoint HSDPA system, so that stale packets are not retained in internal buffers at the Node Bs following the RLC reset procedure. In some examples, the RLC reset procedure is only completed after confirmation that the flush of the internal buffers has been completed. Confirmation may be explicitly provided by each Node B utilizing a backhaul interface, or may be implicitly determined utilizing timers or signaling between the respective Node Bs. | 06-28-2012 |
20150016475 | METHOD AND APPARATUS FOR EFFICIENT PACKET COMPRESSION - Methods and apparatus are described for reordering a header of a transmission data packet. The methods and apparatus include identifying one or more static fields and one or more dynamic fields within a header of the transmission data packet. Moreover, these aspects include reordering the one or more static fields and the one or more dynamic fields within the header of the transmission data packet. Additionally, these aspects include compressing the header of the transmission data packet to form a compressed transmission data packet in response to reordering the one or more static fields and the one or more dynamic fields. The aspects also may include transmitting the compressed transmission data packet. | 01-15-2015 |
20150063374 | FORMATTING DATA PACKETS FOR COMPRESSION - Methods and apparatus are described for formatting a compressed data packet. The methods and apparatus include identifying a first data string within a data packet that was previously stored at a first memory location in a compressor memory, and generating a first pointer that references the first memory location in the compressor memory. Further, these aspects optionally include identifying a second data string within the data packet that was not previously stored in the compressor memory. Additionally, these aspects include creating a compressed data packet by replacing the first data string with the first pointer and copying the second data string, and including an indicator corresponding to a number of pointers in the data packet. | 03-05-2015 |
20150085749 | MECHANISM TO EXCHANGE PROPRIETARY SIGNALING MESSAGES BETWEEN A UE AND A NETWORK - Methods and apparatus are described for configuring features for a user equipment (UE) communicating with a network entity. For example, the methods and apparatus include receiving, at the network entity, a capability message indicating one or more features supported by the UE; transmitting control data in a data type Protocol Data Unit (PDU), wherein the control data is configured to enable one of the one or more features based on the capability message; and enabling one of the one or more features in response to receiving an acknowledgement message from the UE. | 03-26-2015 |
20150085835 | OUT-OF-SYNCHRONIZATION DETECTION AND CORRECTION DURING COMPRESSION - Methods and apparatus are described for synchronizing compression for communication between a user equipment (UE) and a serving node. The methods and apparatus include determining that a compressor memory of a compressor and a decompressor memory of a decompressor are out-of-synchronization based on a checksum failure. Further, the methods and apparatus include resetting the compressor memory and the decompressor memory to a predetermined state in response to determining that the compressor memory and the decompressor memory are out-of-synchronization, wherein the compressor memory and the decompressor memory are synchronized at the predetermined state. | 03-26-2015 |
20150085876 | HANDLING INCOMPRESSIBLE DATA PACKETS ON MULTIPLE DATA FLOWS - Methods and apparatus of compression on multiple data flows for communication between a user equipment (UE) and a serving node. The methods and apparatus include receiving multiple data flows for compression, wherein each of the multiple data flows includes a plurality of data packets, with each data packet having a data packet header and a payload. Further, the methods and apparatus include determining a compression state for each of the multiple data flows. Moreover, the methods and apparatus include performing a first compression algorithm on each of the multiple data flows determined to have a compression state set to a do-not-compress state, wherein the first compression algorithm includes compressing the data packet header of each data packet without compressing the payload of each data packet. | 03-26-2015 |
Patent application number | Description | Published |
20140013025 | HYBRID MEMORY WITH ASSOCIATIVE CACHE - A hybrid memory system includes a primary memory comprising a host memory space arranged as memory sectors corresponding to host logical block addresses (host LBAs). A secondary memory is implemented as a cache for the primary host memory. A hybrid controller is configured map the clusters of host LBAs to clusters of solid state drive (SSD) LBAs. The SSD LBAs correspond to a memory space of the cache. Mapping of the host LBA clusters to the SSD LBA clusters is fully associative such that any host LBA cluster can be mapped to any SSD LBA cluster. | 01-09-2014 |
20140013026 | MEMORY ACCESS REQUESTS IN HYBRID MEMORY SYSTEM - Incoming memory access requests are routed in a set of incoming queues, the incoming memory access requests comprise a range of host logical block addresses (LBAs) that correspond to a memory space of a primary memory. The host LBA range is mapped to clusters of secondary memory LBAs, the secondary memory LBAs corresponding to a memory space of a secondary memory. Each incoming memory access request queued in the set of incoming queues is transformed into one or more outgoing memory access requests that include a range of secondary memory LBAs or one or more clusters of secondary memory LBAs. The outgoing memory access requests are routed in a set of outgoing queues. The secondary memory is accessed using the outgoing memory access requests. | 01-09-2014 |
20140013027 | LAYERED ARCHITECTURE FOR HYBRID CONTROLLER - Approaches for implementing a controller for a hybrid memory that includes a main memory and a cache for the main memory are discussed. The controller comprises a hierarchy of abstraction layers, wherein each abstraction layer is configured to provide at least one component of a cache management structure. Each pair of abstraction layers utilizes processors communicating through an application programming interface (API). The controller is configured to receive incoming memory access requests from a host processor and to manage outgoing memory access requests routed to the cache using the plurality of abstraction layers. | 01-09-2014 |
20140013052 | CRITERIA FOR SELECTION OF DATA FOR A SECONDARY CACHE - Host read operations affecting a first logical block address of a data storage device are tracked. The data storage device includes a main storage and a non-volatile cache that mirrors a portion of data of the main storage. One or more criteria associated with the host read operations are determined. The criteria are indicative of future read requests of second logical block address associated with the first logical block address. Data of the at least the second logical block address is copied from the main storage to the non-volatile cache if the criteria meets a threshold. | 01-09-2014 |
20140013053 | DETERMINING A CRITERION FOR MOVEMENT OF DATA FROM A PRIMARY CACHE TO A SECONDARY CACHE - A new segment of data is copied to a volatile, primary cache based on a host data read access request. The primary cache mirrors a first portion of a non-volatile main storage criterion is determined for movement of data from the primary cache to a non-volatile, secondary cache that mirrors a second portion of the main storage. The criterion gives higher priority to segments having addresses not yet selected for reading by the host. In response to the new segment of data being copied to the primary cache, a selected segment of data is copied from the primary cache to the secondary cache in response to the selected segment satisfying the criterion. | 01-09-2014 |
20140333449 | DISPLAYING STORAGE DEVICE STATUS CONDITIONS USING MULTI-COLOR LIGHT EMITTING DIODE - Displaying storage device status conditions using multi-color light emitting diodes (LEDs) involves monitoring values of a status condition of at least one persistent storage device. The values are mapped to two or more colors, and at least one multi-color LED displays the two or more colors in response to the respective values. | 11-13-2014 |
20150026228 | User Invisible Device Diagnostic Region in a Distributed Data Storage Network - A data storage system may generally have a controller connected to multiple separate data storage devices in a distributed network. Each data storage device may be configured with a user invisible diagnostic region where diagnostic information is stored in logical block addresses (LBA) beyond a storage capacity of the respective data storage devices and the diagnostic information can be accessible via read and write requests to LBA beyond the storage capacity of the respective data storage devices. | 01-22-2015 |
20150058525 | GARBAGE COLLECTION IN HYBRID MEMORY SYSTEM - A hybrid memory system includes a primary memory and a secondary memory. A garbage collection operation is performed on the hybrid memory system. A read operation comprising reading data from a first cluster of a plurality of clusters is performed. Responsive to a determination that the read operation failed, the first cluster is unmapped without writing the data to a second cluster and the first cluster continues to be used for subsequent data storage. Responsive to a determination that the read operation did not fail, data is written to the second cluster. | 02-26-2015 |
20150058526 | MEMORY ACCESS REQUESTS IN HYBRID MEMORY SYSTEM - Incoming memory access requests are routed in a set of incoming queues, the incoming memory access requests comprise a range of host logical block addresses (LBAs) that correspond to a memory space of a primary memory. The host LBA range is directly mapped to clusters of secondary memory, the secondary memory corresponding to a memory space of a secondary memory. Each incoming memory access request queued in the set of incoming queues is transformed into one or more outgoing memory access requests that include a range of secondary memory clusters or one or more clusters of secondary memory clusters. The outgoing memory access requests are routed in a set of outgoing queues. The secondary memory is accessed using the outgoing memory access requests. | 02-26-2015 |
20150058527 | HYBRID MEMORY WITH ASSOCIATIVE CACHE - A hybrid memory system includes a primary memory comprising a host memory space arranged as memory sectors corresponding to host logical block addresses (host LBAs). A secondary memory is implemented as a cache for the primary host memory. A hybrid controller is configured directly map the clusters of host LBAs to clusters of secondary memory. The secondary memory clusters correspond to a memory space of the cache. Mapping of the host LBA secondary memory clusters is fully associative such that any host LBA cluster can be mapped to any secondary memory cluster. | 02-26-2015 |
20150058683 | RETENTION BASED DEFECTING IN A HYBRID MEMORY SYSTEM - A first page in a memory unit is programmed with one or more pages of the secondary memory. A first time corresponding to the start of the programming of the first page is recorded. A second time corresponding to the completion of the programming of the one or more pages is recorded. A time difference between the first time and the second time is determined. It is determined if the time difference is greater than a threshold. In response to the time difference being greater than the threshold, a retention based defecting process is for the memory unit is disabled. | 02-26-2015 |
Patent application number | Description | Published |
20110255422 | ANALYZING SERVICE IMPACTS ON VIRTUAL PRIVATE NETWORKS - Methods, computer-readable media and computing systems are provided for analyzing service impacts on one or more VPNs on a computer network. A topology of each VPN may be identified. A protocol failure may be detected between routers of the computer network. It may then be determined how the VPN is affected by the protocol failure based on the identified topology and VRF information obtained from routers of the computer network. | 10-20-2011 |
20110274111 | EDGE LINK DISCOVERY - A method for discovering a link between an entry-exit device of a computer network and a customer edge device is disclosed. The customer edge device includes an address and the entry/exit point device includes a routing table. Interfaces with the routing table and addresses of the computer network related to the entry/exit point device are obtained. Either a routing protocol or the routing table is used to obtain routing information. The routing information is compared to a selected address to find a match. The routing information the matches the selected address represents the address of the customer edge device. | 11-10-2011 |
20120239796 | ZONE-BASED NETWORK TRAFFIC ANALYSIS - Network discovery is performed to detect routers and to collect discovery data from them. The discovery data is analyzed to identify zones, i.e., autonomous routing domains and subdomain areas. Network traffic is monitored at border router ports to obtain zone traffic data. The zone traffic data is analyzed to evaluate per-zone or inter-zone traffic parameters. | 09-20-2012 |
20150074035 | DETECTING ROOT CAUSE FOR TRANSACTION DEGRADATION USING CAUSAL BAYESIAN NETWORKS - Techniques for detecting root cause for transaction degradation using causal Bayesian networks are disclosed. In some embodiments, various states associated with an application comprising transactions and components are determined, wherein the determined states are associated with the application transactions and components. The determined states are used as input to build a Bayesian network whose nodes represent application transactions and components. A root cause set comprising one or more application components that is associated with a transaction degradation is inferred by traversing the Bayesian network. | 03-12-2015 |
20150199254 | APPLICATION PERFORMANCE MONITORING - Various techniques associated with application performance monitoring are disclosed. In some embodiments, a subset of application methods is configured to capture response time metrics, and response time metrics for a prescribed application transaction are computed by summing corresponding response time metrics of methods of the subset that are executed during each transaction invocation. Method and transaction response time metrics are collected for each of a plurality of observation intervals, and the collected response time metrics are analyzed to identify anomalous method and transaction states. Co-occurring anomalous transaction and method states are correlated to identify a set of hotspot methods for the transaction, wherein hotspot methods comprise expected root causes for anomalies of the transaction. | 07-16-2015 |
20150310139 | APPLICATION BEHAVIOR LEARNING BASED CAPACITY FORECAST MODEL - Various techniques employed by an application performance management service to generate an application behavior learning based capacity forecast model are disclosed. In some embodiments, such a capacity forecast model is at least in part generated by clustering collected transaction data into one or more usage patterns, analyzing collected usage pattern data, and solving a mathematical model generated from the usage pattern data to determine a sensitivity of a resource to each type of transaction associated with an application. | 10-29-2015 |
Patent application number | Description | Published |
20120143356 | AUTOMATED FACILITIES MANAGEMENT SYSTEM - An automated facilities management system has the ability to predict occupant behavior by identifying recurring patterns in the way that people use buildings and comparing them with environmental characteristics. This technology is not limited to human behavior patterns, but extends to any mechanical systems or data points that tend to vary in recurring patterns. The data processing is carried out by rules engines triggered by relational database modifications. | 06-07-2012 |
20120150788 | AUTOMATED FACILITIES MANAGEMENT SYSTEM - An automated facilities management system has the ability to predict occupant behavior by identifying recurring patterns in the way that people use buildings and comparing them with environmental characteristics. This technology is not limited to human behavior patterns, but extends to any mechanical systems or data points that tend to vary in recurring patterns. The data processing is carried out by rules engines triggered by relational database modifications. | 06-14-2012 |
20130226320 | POLICY-DRIVEN AUTOMATED FACILITIES MANAGEMENT SYSTEM - An automated facilities management system has the ability to predict occupant behavior by identifying recurring patterns in the way that people use buildings and comparing them with environmental characteristics. This technology is not limited to human behavior patterns, but extends to any mechanical systems or data points that tend to vary in recurring patterns. The data processing is carried out by rules engines triggered by relational database modifications. | 08-29-2013 |
20140316582 | Automated Facilities Management System having Occupant Relative Feedback - An automated facilities management system has the ability to predict occupant behavior by identifying recurring patterns in the way that people use buildings and comparing them with environmental characteristics. This technology is not limited to human behavior patterns, but extends to any mechanical systems or data points that tend to vary in recurring patterns. The data processing is carried out by rules engines triggered by relational database modifications. | 10-23-2014 |