Patent application number | Description | Published |
20110188406 | Message Transport System Using Publication and Subscription Mechanisms - A message transport system may use a publication subscription mechanism to connect nodes and transport messages through the nodes. Each node may establish connections to other nodes, and subscription requests and publication notifications may be passed across the nodes to establish paths for messages. When a message is published, the message may be passed over those connections for which a subscription is active. A path identifier may be added to the message as it is passed between nodes, and the path identifier may be used by a subscribing node for identification of the information being received. When a subscriber notification is removed, the path may be deconstructed across multiple nodes. The nodes may be arranged such that each node is agnostic to any connections past the nodes to which it is connected, and may allow any node to subscribe to any information published within the network. | 08-04-2011 |
20110213754 | Opportunistic Asynchronous De-Duplication in Block Level Backups - A block based backup system may store backed up data from multiple clients by maintaining backup databases for each client, where each backup database may include blocks of data. The backup system may perform a de-duplication process by examining the databases to identify common blocks and moving the common blocks to a common database. The common blocks may be removed from the client backup databases and a pointer substituted for the data, thus compacting the client backup databases. The de-duplication operation may be performed at an opportunistic time, such as after the clients have completed any data transfer to the backup system. | 09-01-2011 |
20110218967 | Partial Block Based Backups - A block based backup system may perform several partial backups to incrementally transfer backup information to a backup system. Each partial backup may build on the previous backup and the partial backups may be marked as unable to be used for restoration. In some cases, the partial backups may be portions of a file system snapshot, while in other cases, the partial backups may include any changes that occurred since a last partial backup. The size of the partial backups may be dynamically changed depending on network connections, workloads, and other factors. | 09-08-2011 |
20120102088 | PRIORITIZED CLIENT-SERVER BACKUP SCHEDULING - A prioritized backup time within a predetermined backup window can be calculated. The calculated backup time can be a time to initiate a backup operation to backup information from a client to a server. The calculation of the backup time can use a priority of the client and/or a degree of compliance of the client with a backup policy. An initiation of the backup operation by the client can be scheduled to occur at the calculated backup time, and the backup operation can be initiated. Other prioritized scheduling techniques can also be used, such as prioritized backup queue ordering, prioritized preemption of partially complete backup operations, and/or server override of the client's calculated backup time to begin a backup operation on demand. | 04-26-2012 |
20140161129 | Message Transport System Using Publication and Subscription Mechanisms - A message transport system may use a publication subscription mechanism to connect nodes and transport messages through the nodes. Each node may establish connections to other nodes, and subscription requests and publication notifications may be passed across the nodes to establish paths for messages. When a message is published, the message may be passed over those connections for which a subscription is active. A path identifier may be added to the message as it is passed between nodes, and the path identifier may be used by a subscribing node for identification of the information being received. When a subscriber notification is removed, the path may be deconstructed across multiple nodes. The nodes may be arranged such that each node is agnostic to any connections past the nodes to which it is connected, and may allow any node to subscribe to any information published within the network. | 06-12-2014 |
20140280818 | DISTRIBUTED DATA CENTER TECHNOLOGY - A regional data center system corresponding to a particular region of the world. The data center system includes multiple data centers, each configured such that region-specific requests for services may be satisfied by any of the data centers. One or more of the data centers may also perform load balancing on received region-specific request. In order to perform load balancing, the receiving data center may itself process the requests, but in some cases may determine that the request is to be processed by another data center within the regional data center system. | 09-18-2014 |
Patent application number | Description | Published |
20100278073 | METHOD AND SYSTEM FOR DETERMINING NETWORK TOPOLOGY OF A VIRTUAL PRIVATE NETWORK IN MULTI PROTOCOL LABEL SWITCHING (MPLS) BASED VIRTUAL PRIVATE NETWORKS (VPNs) - Presented is a method and system of determining network topology of a virtual private network in Multi Protocol Label Switching (MPLS) based Virtual Private Networks (MPLS/VPNs). The method includes obtaining VPN routing and forwarding (VRF) details of at least one virtual private network, determining any variations in network configuration and determining, from said network configuration variations, network topology of the at least one virtual private network. | 11-04-2010 |
20110085555 | Method For Providing Network Information - Embodiments of the present invention provide a method of providing network information, comprising determining one or more pseudowires between nodes in a network; grouping the pseudowires, according to information associated with each pseudowire and one or more predetermined criteria, into one or more groups each representing a virtual private network (VPN); providing a graphical user interface (GUI) displaying information associated with at least one pseudowire participating in the virtual private network. | 04-14-2011 |
20110255422 | ANALYZING SERVICE IMPACTS ON VIRTUAL PRIVATE NETWORKS - Methods, computer-readable media and computing systems are provided for analyzing service impacts on one or more VPNs on a computer network. A topology of each VPN may be identified. A protocol failure may be detected between routers of the computer network. It may then be determined how the VPN is affected by the protocol failure based on the identified topology and VRF information obtained from routers of the computer network. | 10-20-2011 |
20140029443 | INTERPROVIDER VIRTUAL PRIVATE NETWORK PATH IDENTIFICATION - An inter-provider virtual provider network path is identified by identifying a provider network provider edge router having a provider edge interface serving, obtaining routing information from the provider edge router, identifying, from the routing information, a remote customer edge interface of a customer edge router connected to the provider edge router by an intermediate service provider, and identifying the path and associated links between the identified provider edge interface and the identified remote customer edge interface. | 01-30-2014 |
20140160918 | IDENTIFYING A LABEL-SWITCHED PATH (LSP) ASSOCIATED WITH A MULTI PROTOCOL LABEL SWITCHING (MPLS) SERVICE AND DIAGNOSING A LSP RELATED FAULT - Provided is a method of identifying a Label-switched Path (LSP) associated with a Multi Protocol Label Switching (MPLS) service in a network. An MPLS service is identified in a network and logical neighbors of the MPLS service are determined. For each logical neighbor of the MPLS service, an LSP label is identified. Based on the LSP label, a unique out segment of the LSP associated with the Multi Protocol Label Switching (MPLS) service is identified. | 06-12-2014 |
20140160942 | CUSTOMER EDGE DEVICE PROBLEM IDENTIFICATION - Systems, methods, and machine-readable and executable instructions are provided for customer edge device problem identification. Customer edge device problem identification can include obtaining a status of a connection between a provider edge (PE) device and a customer edge (CE) device. Customer edge device problem identification can also include determining whether the status of the connection is non-normal. Customer edge device problem identification can include sending an internet control message protocol (ICMP) echo request to the CE device in response to the status of the connection being non-normal. Customer edge device problem identification can include receiving an ICMP echo response from the CE device. Customer edge device problem identification can also include identifying a simple network management protocol (SNMP) problem that is associated with the CE device based upon the receipt of the ICMP echo response. | 06-12-2014 |
20140325279 | TARGET FAILURE BASED ROOT CAUSE ANALYSIS OF NETWORK PROBE FAILURES - Provided is a method of performing a target failure based root cause analysis of network probe failures in a computer network. A determination is made whether all network probes have failed between a specific source network node and a destination network node. Based on said determination, a problem is identified in the computer network. | 10-30-2014 |