Patent application number | Description | Published |
20130207843 | DETERMINATION OF AN IMPAIRMENT COMPENSATION MATRIX FOR AN ANTENNA ARRAY - Determination of an impairment compensation matrix for compensation of impairments in an antenna array is disclosed. A plurality of different combinations of multi-signal transmissions which form at least one null at a respective location of a plurality of locations is determined. Each combination includes a multi-signal transmission that comprises at least two concurrent signal transmissions from at least two antenna subarrays of N antenna subarrays and the respective location. Based on signal characteristics associated with the plurality of different combinations of multi-signal transmissions and an expected signal reception at the plurality of locations, an impairment matrix that identifies an effect of impairments among the N antenna subarrays is determined. The impairment compensation matrix is determined based on the impairment matrix. | 08-15-2013 |
20130208671 | APPARATUS, SYSTEMS, METHODS, AND COMPUTER PRODUCTS SUITABLE FOR USE IN AN ADVANCED DIGITAL BASEBAND PROCESSOR - The present disclosure relates to an advanced digital baseband processor for a base station in a cellular communications network. In general, the advanced digital baseband processor integrates multiple Radio Access Technologies (RATs). As used herein, a RAT is a radio access technology as defined by a corresponding standard. For example, in one embodiment, RATs integrated by the advanced digital baseband processor include a Code Division Multiple Access (CDMA) voice RAT (e.g., 3GPP2 CDMA 1xRTT or 3GPP2 CDMA 1xAdvanced) as well as a CDMA Data Only, or Data Optimized, (DO) RAT (e.g., 3GPP2 CDMA EV-DO or 3GPP2 CDMA EV-DO Rev B). In another embodiment, the RATs integrated by the advanced digital baseband processor also include 3GPP Long Term Evolution (LTE). The RATs given above are only examples. The advanced digital baseband processor may integrate additional or alternative RATs. | 08-15-2013 |
20130208688 | SYSTEMS AND METHODS FOR TRANSMITTING RADIO LINK CONTROL (RLC) DATA BLOCKS - In one aspect, the invention provides apparatuses and methods for wirelessly transmitting application data utilizing priority information for each radio link control (RLC) data block transmitted. Advantageously, the application data with a relatively high transmission priority is not substantially delayed by the transmission of application data with substantially lower transmission priorities. | 08-15-2013 |
20130212236 | M2M SERVICE ENABLEMENT OVER ACCESS NETWORKS - Upon attachment of a machine-to-machine (M2M) device to a network, the access network determines which service provider to connect the device to. During an initial attachment process, the device can be configured so that it only will connect to a defined M2M service provider. | 08-15-2013 |
20130212614 | LOCATION BASED USER AWARE VIDEO ON DEMAND SESSIONS - A system and a method are described herein for enabling a user with a location-aware mobile device to have at least partial control of a closest set top box associated with a closest television. The closest set top box does not need to be associated with the user's home television but instead can be any set top box that is associated with a television located for instance at a stranger's house, an airport, a bar, or wherever. | 08-15-2013 |
20130214965 | Obtaining a Calibration Parameter for an Antenna Array - Embodiments herein include a method for obtaining a calibration parameter for an antenna array. The antenna array comprises a first and a second radio module with respective associated antennas, wherein both radio modules comprise a main transmitter and a connected calibration receiver or both radio modules comprise a main receiver and a connected calibration transmitter. The method comprises: injecting a first calibration signal in the first radio module and measuring a first response to the first calibration in the first radio module. This injecting and measuring is repeated for all combinations of the first and second radio modules. Finally, a numerical value is calculated using the responses; a calibration parameter is calculated based on the calculated numerical value. Embodiments herein also include a corresponding antenna array, computer program and computer program product. | 08-22-2013 |
20130215843 | METHODS OF TRANSMITTING ACCESS REQUESTS USING REDUCED RESPONSE INTERVALS AND RELATED MOBILE STATIONS AND BASE STATION SUBSYSTEMS - A method of operating a mobile station requesting uplink access from a base station subsystem includes transmitting a first access request to a base station subsystem, and looking for an assignment message matching the first access request from the base station subsystem during a response interval after transmitting the first access request. When an assignment message is not received during, the response interval, a second access request is transmitted to the base station subsystem after expiration of a retransmission interval after transmitting the first access request, with the retransmission interval being longer than the response interval. | 08-22-2013 |
20130215907 | Communication with Compressed Headers - Communication efficiency may be enhanced by using compressed headers. In an example embodiment, a method is performed by a transmitting device to reduce header size. A mapping is created between a logical channel identifier and a compressed logical channel identifier. The compressed logical channel identifier occupies fewer bits than the logical channel identifier. The mapping is transmitted to a receiving device. A compressed header that includes the compressed logical channel identifier is formulated. A communication that includes the compressed header is transmitted to the receiving device. In another example embodiment, a method is performed by a receiving device to decode a header having a reduced size. A mapping and a communication including a compressed header are received. A compressed logical channel identifier is extracted from the compressed header. A logical channel identifier is recovered from the compressed logical channel identifier using the mapping. | 08-22-2013 |
20130215939 | METHOD, APPARATUS AND SYSTEM FOR SETTING A SIZE OF AN EVENT CORRELATION TIME WINDOW - Transmitting and receiving arrangements and methods in a Digital Subscriber Line (DSL) system having a plurality of modems and vectored transmission capability. A first part of an available frequency band is reserved for vectored DSL transmission and reception using modems operating in the first part of the frequency band. The remaining, second, part of the available frequency band is reserved for both vectored and non-vectored transmission using modems operating in the second part of the frequency band. | 08-22-2013 |
20130218577 | Method and Device For Noise Filling - A method for perceptual spectral decoding comprises decoding of spectral coefficients recovered from a binary flux into decoded spectral coefficients of an initial set of spectral coefficients. The initial set of spectral coefficients are spectrum filled. The spectrum filling comprises noise filling of spectral holes by setting spectral coefficients in the initial set of spectral coefficients not being decoded from the binary flux equal to elements derived from the decoded spectral coefficients. The set of reconstructed spectral coefficients of a frequency domain formed by the spectrum filling is converted into an audio signal of a time domain. A perceptual spectral decoder comprises a noise filler, operating according to the method for perceptual spectral decoding. | 08-22-2013 |
20130223333 | METHOD TO OPTIMIZE CALL ESTABLISHMENT IN MOBILE SATELLITE COMMUNICATION SYSTEMS - Call placement to or from satellite UEs is optimized by reducing IMS message exchanges, the originating party has control over QoS parameters, a HPA subscription service is made available, and calls to a terminating satellite UE that is shielded from satellite coverage are completed by selectively employing HPA pages. For a call request without preconditions, an IMS node associated with an originating UE uses the NRSCPA on Offer instead of using the standard terminating node initiated NRSCPA on Answer. An IMS node associated with a terminating UE checks for HPA subscription by the user. If subscribed, the terminating INVITE request is for a “Conversational” or “Interactive” service, and the terminating UE is in PMM_IDLE state, the satellite RAN pages the terminating UE using HPA. | 08-29-2013 |
20130223379 | Interference Randomization of Control Channel Elements - A method and a radio base station for interleaving control channel data to be transmitted in a telecommunications system are described. The method comprises grouping the control channel elements CCE | 08-29-2013 |
20130231116 | METHOD AND ARRANGEMENT FOR PROCESSING MOBILE STATION HISTORY INFORMATION IN A WIRELESS COMMUNICATION SYSTEM - Methods and apparatus for processing mobile station transaction information at a serving control node in a wireless communication system are disclosed. The serving control node may be a base station, such as an eNodeB in an LTE/SAE wireless communication system. The transaction information, which may include, for example, mobility-related transaction information and traffic-related transaction information for a given mobile station, may be passed between controlling control nodes as the corresponding mobile station is handed over, so that a controlling control node has access to information characterizing the past activities of the mobile station. This information may be used in some embodiments for selecting a target control node for handover or for allocating link resources. | 09-05-2013 |
20130236017 | TELECOMMUNICATION SYSTEMS AND ENCRYPTION OF CONTROL MESSAGES IN SUCH SYSTEMS - A method for encrypting radio resource control (RRC) messages exchanged between a wireless communication device and a node in a wireless communication system includes separating sequence number rollover events from mobility events while encrypting radio resource control (RRC) messages for exchange within a wireless communication system. According to the method, the sequence number rollover events and mobility events are separated by utilizing a state transition counter, a handover counter, and an overflow counter such that, when the state counter is incremented due to occurrences of a first group of events, the handover counter and the overflow counter are re-set to zero and, when the handover counter is incremented due to occurrences of a second group of events the overflow counter is re-set to zero. The method further includes providing one or more outputs from the state transition counter, the handover counter, and the third overflow counter as one or more inputs to a crypto algorithm for encrypting RRC messages. | 09-12-2013 |
20130279482 | MULTIRECEIVER TIMING ADVANCE PROVISIONING - A method of operating a mobile station in a packet transfer mode includes receiving a distribution timing advance message on a control channel from a base station. The distribution timing advance message contains a plurality of mobile station identifiers and associated timing advance values. One of the mobile station identifiers is identified as corresponding to the mobile station. The timing advance value associated with the identified one of the mobile station identifiers is determined. The timing of an uplink transmission to the base station is then adjusted responsive to the timing advance value. Related mobile stations, methods of operating a base station subsystem to communicate timing advance values to a plurality of mobile stations, base station subsystems, and methods of operating a serving GPRS support node to control communication of timing advance values by a base station subsystem are also disclosed. | 10-24-2013 |
20130287295 | WEIGHT BASED IMAGE PROCESSING - In an image-encoding scheme, an input image is decomposed into several image blocks comprising multiple image elements. The image blocks are encoded into encoded block representations. In this encoding, color weights are assigned to the image elements in the block based on their relative positions in the block. At least two color codeword are determined, at least partly based on the color weights. These codewords are representations of at least two color values. The original colors of the image elements are represented by color representations derivable from combinations of the at least two color values weighted by the assigned color weights. | 10-31-2013 |
20130301521 | CALL ESTABLISHMENT OPTIMIZATION FOR IMS BASED MOBILE SATELLITE SYSTEM - IMS nodes and a satellite radio access node (RAN) are described herein which are operative to establish certain calls (e.g., voice calls) with reduced latency and selectively using a High Penetration Alert (HPA) page to reach a terminating satellite user equipment (UE). | 11-14-2013 |
20130318218 | Method and Apparatus for Associating Service Provider Network Identifiers with Access Network Identifiers - An access network sends allocation information to an external service provider network (SPN), responsive to a wireless device establishing a data session with the access network for communicating with the SPN. The allocation information indicates the Internet Protocol (IP) address assigned to the wireless device by the access network for the data session and an external identifier to be used by the SPN in identifying the wireless device to the access network. Subsequently, the SPN receives a service provider network identifier and point of contact information in signaling sent from the wireless device, and binds the service provider network identifier to the external identifier that is associated with the IP address indicated in the point of contact information. This binding enables the SPN to trigger communications targeting the service provider network identifier of the wireless device, by sending triggering signaling to the access network that includes the bound external identifier. | 11-28-2013 |
20130322403 | CELL UPDATE FOR OPTIMIZED SYSTEM ACCESS PROCEDURES BETWEEN BASE STATION SUBSYSTEMS AND MOBILE STATIONS - One embodiment is directed to a method implemented by a mobile station for establishing a downlink temporary block flow (TBF) from a base station subsystem (BSS). Cell re-selection is performed while a READY timer of the mobile station has not expired. A cell update message that includes a radio link control (RLC) data block containing a remaining ready timer value indicating a remaining time of the READY timer, which has not expired, is sent to the BSS for use in determining when a mobile station supports the assignment of a TOI, sending an assigned TOI to that mobile station and establishing subsequent downlink TBFs using the assigned TOI instead of a legacy mobile station identity. Another related embodiment is directed to a method implemented by a BSS for establishing downlink TBFs to a plurality of mobile stations. | 12-05-2013 |
20130336210 | Wholesale partner and video services enablement using a mobile virtual network enabler (MVNE) - A solution enabling subscribers of an enterprise, which itself is not a client of a Mobile Network Operator, MNO, but is a client of a Mobile Virtual Network Enabler, MVNE, to utilize a high speed data access at a guaranteed Quality of Service, or to access APIs, through a mobile network of the MNO. The MVNE includes a plurality of IP Multimedia Subsystem, IMS, core elements to facilitate delivery of high speed data associated with IMS services to the subscribers of the enterprise via the MNO mobile network. The MVNE is modeled as a roaming partner to the MNO allowing the MNO to leverage its existing roaming agreement with the MVNE. Allocation and utilization of an MNO's Subscriber Identification Module, SIM, cards by the MVNE minimizes the barrier to entry for the enterprises served by the MVNE. The MNO can provide monetizeable services to MVNE's subscribers as well. | 12-19-2013 |
20140031069 | NODE AND METHOD FOR PRIORITY OF APPLICATION BASED HANDLING OF A PAGING REQUEST - Example embodiments presented herein are directed towards a device, mobility management node and/or a serving gateway, and corresponding methods there, for providing application, service or priority based paging. According to some of the example embodiments, the decision whether or not to issue or accept a paging request may be made based on a priority, application or service (or type of service) associated with the paging request. | 01-30-2014 |
20140036716 | DEVICES AND METHOD FOR GUARANTEEING QUALITY OF SERVICE PER SERVICE DATA FLOW THROUGH THE BEARER LAYER - In scenarios where the quality of service is negotiated through a signalling layer whereas the services are actually carried through a bearer layer, application functions at the signalling layer are not always aware of how quality of service is individually accomplished at the bearer layer on a service basis. The invention provides a method and devices whereby events are detected on a service data flow basis at a detection device in the bearer layer and notified towards an application device in the signalling layer via a control device between the signalling and the bearer layer. The list of events to be notified is obtainable at the control device from the application device and is included in Quality of Service related rules, along with service data flow filters. This Quality of Service related rules are provided to the detection device for inspecting individual service data flows in order to detect and notify the indicated events. | 02-06-2014 |
20140038606 | Method and Apparatus to Postpone UE from Handover to an Overloaded Radio Network from Another Radio Network - A node of a secondary RAT that is in communication with a primary node of a primary RAT and UEs that, are able to communicate by way of the primary and secondary RATs. The node concludes a network interface unit of the node which receives a message from the primary node that indicates that the primary RAT is in an overload condition. The node includes a processing unit of the node which forms f IE messages for the UEs not to try to communicate with the primary RAT, the network interface unit of the node sending the messages to the UEs. A method of a node of a secondary RAT that is in communication with a primary node of a primary RAT and UEs that are able to communicate by way of the primary and secondary RATs. | 02-06-2014 |
20140078896 | LOAD SHARING IN MULTI-ACCESS SYSTEMS - In a multi-access system, an access selection principle is achieved by selecting a signal strength threshold level ( | 03-20-2014 |
20140094125 | USER EQUIPMENT, NETWORK NODE AND METHODS THEREIN - Embodiments herein relate to a method in a user equipment ( | 04-03-2014 |
20140101118 | SYSTEM AND METHOD FOR CREATING MULTIPLE VERSIONS OF A DESCRIPTOR FILE - A system (e.g., content management system, content delivery system) and method are described herein which are configured for receiving one or more source descriptor files (e.g., MPD files, HLS m3u8 files, HTTP manifest files) along with associated adaptive bit rate segments. The system and method are also configured for receiving rules (e.g., content ratings, timing information, user profiles, regional and demographic information) and then creating multiple descriptor files based on the received rules and the source descriptor file(s). The system and method are further configured for distributing the multiple descriptor files to one or more downstream systems (e.g., content to delivery systems, users). | 04-10-2014 |
20140107846 | METHOD FOR SYNERGISTIC OCCUPANCY SENSING IN COMMERCIAL REAL ESTATES - A method to synergistically sense occupancy inside a building. A coarse-grained sensor in the building generates a coarse data indicating a user is in a large area including a control zone. A fine-grained sensor in the building generates a fine data indicating the user is in a small area. The fine data is more accurate but less reliable than the coarse data. The method to improve energy efficiency by generating an actuation plan for the control zone. The method includes receiving the coarse data and the fine data, normalizing the coarse data and the fine data, checking for an overlap between the large area and the small area, calculating a change in occupancy in the control zone based on the normalized coarse data if there is no overlap and based on the normalized fine data if there is overlap, and generating the actuation plan based on the change in occupancy. | 04-17-2014 |
20140112164 | METHOD, APPARATUS, AND SYSTEM FOR INTERFERENCE AND NOISE ESTIMATION - Mobile broadband traffic has been exploding in wireless networks resulting in an increase of interferences and reduced operator control. Networks are also becoming more heterogeneous putting additional demand in interference management. Scheduler schedules uplink transmissions from UEs based on a load prediction algorithm that typically assumes worst case. However, UEs do not always use full power granted, and thus, much of granted radio resources are wasted. To address these and other issues, techniques to accurately predict/estimate other cell interferences and thermal noise separately and to accurately predict/estimate load utilization probabilities, rise-over-thermals, and load factor biases are described. The described techniques are applicable in a radio network node with any number of antenna branches. The techniques can be used to schedule UEs to more fully utilize available radio resources. Extended Kalman filtering can be adapted for use in estimation providing low order computational complexity. | 04-24-2014 |
20140135044 | Contacting a Group of Terminals Within a Wireless Communication Network - The present invention relates to the field of paging terminals within a communication network. In order to contact a group of terminals, a common group identification is allocated to each of the terminals within said group. Thereafter, a paging message is created comprising said common group identification. The paging message is then transmitted to all terminals within said group by a single paging operation. | 05-15-2014 |
20140140689 | CONFIGURABLE SINGLE-FIBER OR DUAL-FIBER OPTICAL TRANSCEIVER - An optical transceiver performs dual mode operations in an optical network. The dual mode operations include a single-fiber mode, in which a single fiber connecting the optical transceiver and another network node carries bi-directional optical signals, and a dual-fiber mode, in which two fibers connecting the optical transceiver and another network node carry respective uni-directional optical signals in opposite directions. A switching module coupled to the optical transceiver is set in accordance with a control signal such that a transmitter module transmits and a receiver module receives via a first optical connector receptacle to enable the single-fiber mode, or such that the transmitter module transmits via the first optical connector receptacle and the receiver module receives via a second optical connector receptacle to enable the dual-fiber mode. | 05-22-2014 |
20140145800 | ACOUSTIC WAVE BAND REJECT FILTER - A method and system for an acoustic wave band reject filter are disclosed. According to one aspect, an acoustic wave band reject filter includes a substrate and a plurality of acoustic wave band reject filter circuit blocks. The substrate includes bonding pads formed on the substrate. Each one of the plurality of acoustic wave band reject filter circuit blocks is fixed on a separate die. Each separate die has solder balls on a side of the die facing the substrate. The solder balls are positioned to electrically connect the bonding pads formed on the substrate to electrodes of the dies | 05-29-2014 |
20140146661 | METHOD AND APPARATUS FOR FACILITATING PROCESS RESTART IN AN IS-IS SYSTEM - A method and apparatus for facilitating process restart in an IS-IS router that includes an active router processor (RP) module for supporting an active IS-IS process instance and standby router processor (RP) module for supporting a standby IS-IS process instance. Routing database information maintained by the active IS-IS process is synchronized to a standby database associated with the standard IS-IS process instance, which is used for synchronizing a new database on the active RP module. When a new instance of the active IS-IS process is restarted on the active RP module, the new instance uses the contents of the new database for continuing to maintain routing functionality. | 05-29-2014 |
20140146821 | METHOD AND APPARATUS FOR PROTOCOL DATA UNIT SYNCHRONIZATION IN AN IS-IS SYSTEM - A method and apparatus for effectuating synchronization of local LSPs and remote LSPs in an IS-IS router that includes an inter-process communication module disposed between an active router processor (RP) module and standby router processor (RP) module. Both remote LSP update(s) received by an active IS-IS process and local LSP update(s) generated by the active IS-IS process running on the IS-IS router are synchronized to corresponding database portions associated with a standby IS-IS process of the IS-IS router using respective raw LSPs. | 05-29-2014 |
20140149782 | METHOD AND APPARATUS FOR FACILITATING PROCESS RESTART IN A MULTI-INSTANCE IS-IS SYSTEM - A method and apparatus for facilitating process restart in an IS-IS router that includes an active router processor (RP) module for supporting an active IS-IS process instance as well as one or more dormant instances of the active IS-IS process. Routing database information maintained by the active IS-IS process is synchronized to one or more corresponding databases associated with the dormant instances. Responsive to a control signal, one of the dormant instances may be activated as the new active IS-IS process instance on the active RP module, wherein the contents of the database corresponding to the newly activated instance are used for continuing to maintain routing functionality. | 05-29-2014 |
20140149819 | METHOD AND APPARATUS FOR PROTOCOL DATA UNIT RECOVERY IN AN IS-IS SYSTEM - A method and apparatus for effectuating LSP recovery in an IS-IS router. When a standby router processor (RP) module of the IS-IS router is activated, at least one CSNP packet is generated by the newly activated RP module based on its link state database. The CSNP packet is then transmitted on all point-to-point links and all broadcast links supported by the IS-IS router. | 05-29-2014 |
20140158754 | ITEM AUTHENTICITY - This disclosure relates to, among other things, a checking system for checking the authenticity of a product. In some embodiments, the system comprises: a tag, connectable to the product, that comprises an identity parameter of the product; a scanning unit configured for obtaining the identity parameter from the tag; and a database configured for storing a plurality of predetermined identity parameters, wherein the scanning unit sends the obtained identity parameter to the database, and the database compares the received identity parameter with the plurality of predetermined identity parameters stored and sends to the scanning unit information about the authenticity of the product. In this way, a user may obtain information about whether a product is authentic or fake. | 06-12-2014 |
20140160919 | METHOD AND NETWORK ELEMENT TO LIMIT SERVICE DISRUPTION DUE TO A FAILURE ON A LAYER 2 INTERFACE - A method in an active network element. The network element is coupled with a standby network element by an inter-chassis communication channel used to synchronize session state for sessions handled by the active network element from the active network element to the standby network element. The network element is deployed in a Layer 3 network that is used to transmit Layer 2 data. The method is one of limiting disruption in the handling of the sessions. The method includes monitoring a Layer 2 interface for failures and monitoring a Layer 3 interface for failures. A failure is detected on the Layer 2 interface. The network element communicates with the standby network element, over the inter-chassis communication channel, in response to detecting the failure on the Layer 2 interface, to have the standby network element at least assist with the handling of the sessions. | 06-12-2014 |
20140160958 | Method and Apparatus for Measuring Interference in a Telecommunications System - A receiving unit or a transmitting unit of a wireless network, for facilitating noise and interference measurements on an air interface. The receiving unit includes: a network interface which obtains information relating to a time-varying layout of a silent resource element (RE) grid; an electronic memory having code in communication with the network interface which stores the information; and a processing unit in communication with the electronic memory that takes a presence of a silent RE grid into account in the reception of a control or a data channel. | 06-12-2014 |
20140169183 | METHOD AND APPARATUS FOR AUGMENTING TWAMP - According to another embodiment of the invention, TWAMP path discovery is performed to determine a sequence of IP addresses of a forward direction TWAMP E2E path to be traversed by two different TWAMP test sessions between a Sender and a Reflector. Then, additional TWAMP test request packets are transmitted for the different TWAMP test sessions; and TWAMP test reply messages are received responsive to respective ones of the TWAMP test request packets. Responsive to the TWAMP test reply messages, a PM is determined that is specific to the different sequences of IP addresses of the forward direction TWAMP E2E paths traversed by the two different TWAMP test sessions. | 06-19-2014 |
20140169330 | Network Gateway Selection at Multipath Communication - This disclosure relates to a method in a source network gateway node ( | 06-19-2014 |
20140169500 | SYSTEM AND METHOD FOR COMMUNICATING INFORMATION IN A WIRLESS NETWORK - A method for receiving data transmitted wirelessly includes receiving information indicating a device type associated with a wireless communication device and, based on the device type associated with the wireless communication device, deciding to request information indicating a set of possible data values associated with transmissions from the wireless communication device. The method further includes receiving information indicating the set of possible data values and receiving a data transmission from the wireless communication device that comprises encoded data bits. Additionally, the method includes attempting to decode the data transmission using the set of possible data values. | 06-19-2014 |
20140172854 | Apparatus and Methods For Anonymizing a Data Set - Methods and systems are disclosed for anonymizing a dataset that correlates a set of entities with respective attributes. The method may include: for each entity included in a set of entities, transforming two or more attribute values associated with the entity using received preference information, thereby creating for the entity a set of two or more transformed attribute values; clustering the entities included in the set of entities using said transformed attribute values to form at least a first entity cluster consisting of a first subset of the entities and a second entity cluster consisting of a second subset of the entities, wherein no entity included in the first entity cluster is included in the second entity cluster; anonymizing the first subset of entities; and anonymizing the second subset of entities. | 06-19-2014 |
20140173133 | METHOD AND SYSTEM FOR EFFICIENT GRACEFUL RESTART IN AN OPEN SHORTEST PATH FIRST (OSPF) NETWORK - A method to enhance a graceful restart process in an open shortest path first (OSPF) network is disclosed. The method is implemented on an OSPF enabled router that is adjacent to a plurality of neighboring OSPF enabled routers within a network, where the OSPF enabled router and the plurality of neighboring OSPF enabled routers are within one area of the network. In preparation of a database synchronization process during a graceful restart (GR) session, the OSPF enabled router selects a first neighboring OSPF enabled router from the plurality of neighboring OSPF enabled routers, initiates a first database synchronization with the first neighboring OSPF enabled router. Then the OSPF enabled router initiates a set of database synchronizations with remaining neighboring OSPF enabled routers only after the first database synchronization with the first neighboring OSPF enabled router completes. | 06-19-2014 |
20140173612 | Energy Conservation and Hardware Usage Management for Data Centers - A power management and data center resource monitoring mechanism is provided for selecting new processing elements in a data center. When a condition is detected for selecting new processing elements, one or more processing elements are selected as the new processing elements based on at least a temperature parameter and a usage history parameter of at least some of the processing elements in the data center. Workload is consolidated onto the new processing elements to conserve energy. | 06-19-2014 |
20140181926 | METHOD AND MOBILE DEVICE FOR GENERATING A DATA AUTHENTICATION KEY - The invention relates to a method for generating a data authentication key for allowing data communication over a wireless channel between a first mobile device and a second mobile device, comprising: associating said mobile devices to each other by means of said key. The invention comprises: allowing a shared physical or mechanical condition to be applied generally simultaneously upon said devices; detecting, in said first mobile device, said condition; defining, in said first mobile device, said authentication key based on the detected condition; and transmitting said key to said second mobile device. The invention also relates to a mobile device configured for generating a data authentication key for allowing data communication over a wireless channel to a further mobile device. | 06-26-2014 |
20140185451 | LOW PASS FILTER FOR HIERARCHICAL PIPELINED DISTRIBUTED SCHEDULING TRAFFIC MANAGER - A method is implemented by a network element to provide scalable hierarchical traffic management (HTM) over a plurality of network layers for a network and eliminate priority leaking caused by quick loopback batch scheduling that analyzes a subset of network layers to shorten processing time and resource requirements when the scalable HTM selects data packets to be forwarded. The method and system function as a low pass filter over the selected data packets to prevent low priority data packets being forwarded where higher priority data packets are available to be forwarded. | 07-03-2014 |
20140186037 | OPTICAL PORT DISCOVERY IN A WDM OPTICAL NETWORK - A hub node in a wavelength division multiplexed optical network automatically discovers at least one of new client-side optical ports and new edge-side optical ports. The hub node comprises a wavelength switch network, port discovery equipment, and a controller. The wavelength switch network routes any wavelength channel that does not support a matching pair of client-side and edge-side ports to port discovery equipment at the hub node. The port discovery equipment searches for new ports, and, responsive to finding a new port, automatically discovers a predefined set of one or more attributes of the new port. The controller determines that a client-side port and an edge-side port are a matching pair of ports if discovered sets of attributes of those ports match according to one or more predefined rules. The controller then controls the wavelength switch network to re-route the wavelength channel supporting that matching pair between those ports. | 07-03-2014 |
20140189160 | METHODS AND SYSTEMS FOR SEAMLESS NETWORK COMMUNICATIONS BETWEEN DEVICES RUNNING INTERNET PROTOCOL VERSION 6 AND INTERNET PROTOCOL VERSION 4 - Systems are provided including at least one identifier locator network protocol (ILNP) enabled mobile node running Internet protocol version 6 (IPv6). The mobile node is attached to an IPv6 network in an IPv6 domain. The system includes a virtual root server configured to receive a binding identifiers create (BIC) message from a domain name system 64 (DNS64) server associated with the IPv6 network. The BIC message includes an ILNP address of the mobile node running IPv6, a fake ILNP address of a destination device running IPv4 assigned by the DNS64 server and an ILNP address of the DNS64 server. The fake ILNP address includes a full real address of the destination device. The virtual root server is further configures to create a binding between the ILNP address of the mobile node and the fake ILNP address of the destination device; store the binding; and send a binding identifier acknowledgement (BIA) message to the DNS64 server. | 07-03-2014 |
20140189327 | ACKNOWLEDGEMENT FORWARDING - A method for processing data packets in a pipeline and executed by a network processor. The pipeline includes a plurality of logical blocks, each logical block configured to process one stage of the pipeline. Each data packet includes a descriptor and a data. The network processor is coupled to a resource for storing the data. The method reduces latency and enables non-blocking processing of data packets by forwarding a unique identification of a write request from a first logical block to a subsequent second logical block in the pipeline, the write request to modify the data in the resource. The method includes receiving the descriptor for processing at the first logical block, generating the write request and the unique identification for the write request, transmitting the write request to the resource, and transmitting the unique identification towards the second logical block before an acknowledgement is returned by the resource. | 07-03-2014 |
20140189705 | JOB HOMING - A method executed by a controller of a plurality of processing elements to reduce processing time of a data packet in a network element. The processing elements are arranged in a matrix. Each processing element has a point to point connection with each adjacent processing element, known as a hop. Each processing element also includes a separate processing element storage. The data packet includes a data and a descriptor, the data being transmitted to a first processing element for storage before the descriptor is received by the controller, and the data being processed after the descriptor is received. The method includes receiving the descriptor at the controller, determining that the first processing element does not have an available resource for processing the data, determining a second processing element based on a least number of hops to the first processing element, and transmitting the descriptor to the second processing element. | 07-03-2014 |
20140194071 | TRANSMITTER NOISE SUPPRESSION IN RECEIVER - Systems and methods for suppressing transmitter noise in a receive band of a co-located receiver that are suitable for wideband applications are disclosed. In one embodiment, an analog radio frequency transmit signal output by a transmitter includes a desired signal in a transmit band of the transmitter and transmitter noise in a receive band of a main receiver. A secondary receiver obtains a secondary receiver input signal that is representative of at least the transmitter noise in the receive band of the main receiver and outputs a digital feedforward signal. A digital feedforward transmit noise cancellation subsystem generates a digital transmitter noise cancellation signal that is representative of the transmitter noise in the receive band based on the digital feedforward signal and subtracts the digital transmitter noise cancellation signal from a digital receive signal output by the main receiver to thereby provide a compensated digital receive signal. | 07-10-2014 |
20140195545 | HIGH PERFORMANCE HASH-BASED LOOKUP FOR PACKET PROCESSING IN A COMMUNICATION NETWORK - The present invention relates to methods and apparatus for performing a lookup on a hash table stored in external memory. An index table stored in local memory is used to perform an enhanced lookup on the hash table stored in external memory. The index table stores signature patterns that are derived from the hash keys stored in the hash entries. Using the stored signature patterns, the packet processing node predicts which hash key is likely to store the desired data. The prediction may yield a false positive, but will never yield a false negative. Thus, the hash table is accessed only once during a data lookup. | 07-10-2014 |
20140204762 | METHODS AND DEVICES FOR IMPLEMENTING SHORTEST PATH BRIDGING MAC MODE SUPPORT OVER A VIRTUAL PRIVATE LAN SERVICE NETWORK - Methods and devices for implementing Shortest Path Bridging over a VPLS network. The method includes determining, from IS-IS PDU information received by a PE switch, whether a DF configuration for the PE switch needs to be changed and, if so, the method further includes determining whether the PE switch remains a DF for one or more B-VIDs. If the PE switch is no longer a DF for one or more B-VIDs, the method further includes removing local DF associated information for the PE switch from each PW adjacency's LDP database, and removing, from a local IS-IS database, DF associated remote LDP information. The method also includes, if the PE switch has become a DF for one or more of the B-VIDs, adding, from the IS-IS database, local DF information for the PE switch to the LDP databases, and adding, from the LDB databases, DF associated remote information for the PE switch to the IS-IS database. | 07-24-2014 |
20140211800 | Accelerated MAC address resolution for IPv6 traffic with IS-IS Protocol - A method is executed by a router for improved Intermediate System to Intermediate System (IS-IS) protocol and Neighbor Discovery (ND) protocol execution to avoid dropped data traffic caused by Media Access Control (MAC) address resolution for next hops of routes determined by the IS-IS protocol. An IS-IS adjacency is established between the router and a neighbor router over a link, where a MAC address for the neighbor router is received from the neighbor router. A routing information base (RIB) is updated to include the neighbor router as a next hop for at least one destination address by the IS-IS process. The MAC address of the neighbor router is provided to an ND process to update the RIB, a forwarding information base (FIB) or L2 forwarding table of at least one line card of the router to include the MAC address of the neighbor router in response to the providing of the MAC address to the ND process. | 07-31-2014 |
20140215074 | METHOD AND APPARATUS FOR PLACING SERVICES IN A NETWORK - Embodiments of the present disclosure include a method and apparatus for placing services in a network. The network and a set of services to be placed within the network are defined. A set of requirements for a plurality of subscribers is determined. Each requirement is a sequence of services to traverse for each subscriber. The services are placed such that a total delay or total distance is minimized for all subscribers. | 07-31-2014 |
20140218133 | FLIP CHIP TYPE SAW BAND REJECT FILTER DESIGN - A method and system for providing a surface acoustic wave band reject filter are disclosed. According to one aspect, a surface acoustic wave band reject filter includes a substrate having electrode bars and bonding pads formed on the substrate. The filter further includes at least one die having a side facing the substrate. A plurality of surface acoustic wave resonators are formed on the at least one die formed on the substrate. Solder balls formed on a side of the at least one die facing the substrate are positioned to engage bonding pads on the substrate. The plurality of surface acoustic wave resonators collectively exhibit a band reject filter response. | 08-07-2014 |
20140223252 | REPORTING ERRORS ON SERIAL INTERFACES TO APPLICATION LAYERS FOR FLEXIBLE ERROR HANDLING APPROACH SELECTION - A method is performed in a requester device that is coupled with a responder device by a serial interface. The method is one of selecting an approach to handle an error in a request-response communication between the requester and responder devices over the serial interface. The method includes transmitting a request packet, of the request-response communication, over the serial interface, based on a request from an application that is executing on a logical processor. The method includes reporting the error in the request-response communication to an application-layer module. The method includes selecting an error handling approach, of a plurality of error handling approaches, which is to be used to handle the error, with the application-layer module. | 08-07-2014 |
20140233429 | METHOD AND SYSTEM OF ENHANCING MULTIPLE MAC REGISTRATION PROTOCOL (MMRP) FOR PROTOCOL INTERNETWORKING - A method is disclosed to forward Ethernet frames associated with a service instance at a node (a “forwarding node”) in a network supporting an implementation of a protocol for creating logical loop-free topologies. The method starts with receiving a number of MMRPDUs at the forwarding node from links in the first network (receiving links), where each MMRPDU of the first plurality of MMRPDUs contains a first interested node list including one or more interested nodes identified by MAC addresses. Then a service instance identifier (SID) is identified for the service instance and a first set of MAC addresses interested in the service instance is formed. Then a number of MMRPDUs are sent to links associated with the service instance, where each MMRPDU contains a second set of MAC addresses interested in the service instance. The sending may be accompanied by the node installing filtering at the forwarding node accordingly. | 08-21-2014 |
20140233738 | Mechanism for Co-Ordinated Authentication Key Transition for IS-IS Protocol - An automated key transition method is executed by a node in a network. The network includes a set of nodes utilizing a current key identifier provided by a group key management server or provisioned manually. A key identifier specifies an authentication protocol and an authentication key for use in the authentication of intermediate-system to intermediate-system (IS-IS) protocol data units. The method includes receiving a message from the group key management server that includes a most recent key field to replace the current key identifier, advertising the most recent key identifier to all reachable nodes, verifying whether all reachable nodes have advertised the most recent key identifier, continuing authentication using the current key identifier until all reachable nodes have been verified to advertise the most recent key identifier, and switching authentication to use the most recent key identifier upon verification that all reachable nodes have advertised the most recent key identifier. | 08-21-2014 |
20140236586 | METHOD AND APPARATUS FOR COMMUNICATING MESSAGES AMONGST A NODE, DEVICE AND A USER OF A DEVICE - An method and apparatus that modifies static media, such as music files being played to a user of the device, upon the generation or receipt of an alert, notification or message, so that information in the alert, notification or message can be incorporated into the media files then communicated to the user. In a further embodiment, a user's response to the communicated information can be sensed using one or more sensors and transducers so as to provide feedback to the device, and then optionally to a node in a system. | 08-21-2014 |
20140258999 | System Upgrade Under High Availability Constraints - An embedded step is executed to upgrade multiple layers of a system. The embedded step includes multiple nested steps, and each nested step includes a sequence of actions for upgrading one of the layers. A finite state machine defines the state transitions for each nested step. During the execution of the nested steps, an outer step of the nested steps is transitioned from an executing state into a waiting state after the outer step completes a tear-down. During the transitioning of the outer step, the outer step sends a trigger to an inner step of the nested steps to cause the inner step to transition into the executing state. When the inner step is completed, the outer step is transitioned out of the waiting state to execute a build-up phase. Execution of the embedded step is completed when an outermost step of the nested steps is completed. | 09-11-2014 |
20140260638 | AUTOMATED FAULT LOCALIZATION IN PIPELINES AND ELECTRICAL POWER TRANSMISSION LINES - Methods and apparatus for determining an estimated physical location of a fault in a pipeline or electrical transmission line using localization devices coupled thereto. In an embodiment, a first and second localization device each generate time values representing times when the respective localization device detected the fault. The estimated fault location is calculated, by one of the localization devices or a separate computing device, based upon the reported time values. In some embodiments, the calculation is further based upon characteristics of the pipeline or electrical transmission line, or based upon characteristics of matter transported through the pipeline. In some embodiments, the localization devices transmit time or sequence values to the other device, and the values received by the devices just before the detection of the fault may additionally be utilized to calculate the estimated physical location of the fault. | 09-18-2014 |
20140269409 | EXPLICIT SIGNALING OF NUMBER OF RECEIVER ANTENNAS - Systems and methods for explicitly signaling a number of receiver antennas of one node in a cellular communications network to another node in the cellular communications network are disclosed. In one embodiment, a first node in the cellular communications network sends a number of receiver antennas of the first node to a second node in the cellular communications network. In one embodiment, the first node broadcasts the number of receiver antennas of the first node. In another embodiment, the first node unicasts the number of receiver antennas of the first node to the second node. The second node then utilizes the number of receiver antennas of the first node to perform a desired action. | 09-18-2014 |
20140282810 | MEDIA DISTRIBUTION NETWORK WITH MEDIA BURST TRANSMISSION CAPABILITIES - A technique of operating a network node in a media distribution network in which media data are transmitted in media bursts to a buffer of a media client is described. Each media burst is followed by an idle period in which no media data are transmitted. A method aspect of this technique comprises determining a fill level of the media client buffer, and generating a media burst. Media burst generation includes adjusting at least one of a media data volume of the media burst and a duration of an idle period following the media burst dependent on the fill level of the media client buffer. | 09-18-2014 |
20140293801 | SYSTEM AND METHOD FOR PROCESSING RECEIVED DATA IN A WIRELESS NETWORK - A method for communicating data within a wireless network includes receiving an indication of a measurement type from a wireless communication device and receiving a first wireless transmission pertaining to a first measurement performed by the wireless communication device. The method also includes, in response to the received transmission, obtaining a value of a second measurement of the measurement type. The second measurement is performed by a sensor associated with the base station. In addition, the method includes determining a value of the first measurement based on the received transmission and a value of a second measurement performed by the sensor associated with the base station. | 10-02-2014 |
20140301549 | PROCESS FOR SELECTING COMPRESSED KEY BITS FOR COLLISION RESOLUTION IN HASH LOOKUP TABLE - A method and network element identify a set of bit indices for forming compressed keys, which are used to map a set of keys of corresponding input values to assigned lookup values in a hash table, where the keys of the input values have colliding hash values according to a hash function of the hash table. The method includes a set of steps including receiving the set of keys. The bits of the set of keys are traversed to find a best split bit index. The set of keys are split into two subsets according to the best split bit index. A check is made whether all of the set of keys have been split into separate subsets. A selected best split bit is added to a bit index. Alternate split bits are tallied and a bit is selected with a highest tally to add to bit index. | 10-09-2014 |
20140321265 | FAST TRAFFIC RECOVERY IN VRRP BASED ROUTERS - A method is implemented by a network device for a fast traffic recovery process for the virtual redundant router protocol (VRRP), where improved speed in a switchover from a master VRRP router to a backup VRRP router is obtained by synchronizing an address resolution protocol (ARP) cache between the master VRRP router and the backup VRRP router such that after the switchover the backup VRRP router functions as a new master VRRP router and does not need to relearn media access control (MAC) address to Internet Protocol (IP) mappings of hosts using the new master VRRP as a gateway. The process involves receiving an ARP entry on an interface of the network device and checking whether the network device is configured as the master VRRP router. The process then sends a gratuitous ARP message to the backup VRRP router in response to the network device being the master VRRP router. | 10-30-2014 |
20140323125 | Home Communication Network Determination - System, methods, nodes, and computer program for determining a home network of a UE roaming in a visited network are described. The UE sends a session invitation to a further UE. The method comprises receiving, by a control node in the home network, the session invitation. The method further comprises adding, by a control node in the home network, an indication of the home network identity and an indication for session invitation loopback routing, to the session invitation. The method further comprises sending, by a control node in the home network, the session invitation towards the visited network. The method further comprises receiving, by a control node in the visited network, a session invitation from the home network. The method further comprises determining, by the control node in the visited network, the home network based on the indication of the home network identity. | 10-30-2014 |
20140323146 | Apparatuses and Methods For Reducing Location Update Signaling Between Network Nodes of a Mobile Communication Network - This disclosure describes apparatuses, methods and computer program products for reducing location update signaling in a mobile communications network. In some embodiments, a method is provided in which a mobility management and control (MMC) rule is provided to a location aware network node (LANN) (e.g., an MME). The MMC rule includes location information that specifies a location and an action associated with the location. In response to receiving mobility information pertaining to a mobile communication device (MCD), the LANN uses the mobility information and the location information to determine whether or not to perform the action associated with the location information. | 10-30-2014 |
20140328161 | ENHANCING A MOBILE BACKUP CHANNEL TO ADDRESS A NODE FAILURE IN A WIRELINE NETWORK - A method performed by a slave network edge node (e.g., a Broadband Network Gateway BNG2) for enhancing a Long Term Evolution (LTE) backup channel in the event of a failure of a master network edge node (e.g., BNG1) in a wireline network. When BNG2 detects the failure of BNG1, BNG2 sends a failure update message to a Packet Data Network Gateway (PDN GW) of an LTE network. The PDN GW provides a backup channel for the CPE to reach the wide area network over a mobile tunnel. Before the failure the mobile tunnel has an end point at BNG1, and the failure update message notifies the PDN GW that the end point of the mobile tunnel has changed from BNG1 to BNG2. After BNG2 receives a failure acknowledgement message from the PDN GW, BNG2 routes the traffic from the PDN GW over the mobile tunnel to the wide area network. | 11-06-2014 |
20140334286 | INTER-DOMAIN FAST REROUTE METHODS AND NETWORK DEVICES - A network device, is to be deployed in a network between a first network domain and a second network domain, and is to be configured for fast reroute. The network device includes a first traffic forwarder control module, corresponding to the first network domain, which is to determine a primary next hop in the first network domain. The control plane includes a second traffic forwarder control module, corresponding to the second network domain, which is to determine a backup next hop in the second network domain. The backup next hop is to be used as a fast reroute for the primary next hop in response to a failure associated with the primary next hop. The control plane includes a controller module, in communication with the first and second traffic forwarder control modules, which is to configure a forwarding structure of the forwarding plane with the primary and backup next hops. | 11-13-2014 |
20140334579 | Method and Apparatus for Soft Symbol Generation in a Communication Receiver - A simplified but accurate soft-symbol determination process represents one of the advantages provided by the example embodiments disclosed herein. In this regard, a mapping function “maps” symbol estimates to corresponding soft symbol values, which may be used in interference mitigation, joint detection processing, etc. Whether the mapping function is implemented on-the-fly as a live calculation or is embodied in a look-up table, it advantageously operates on the symbol estimates directly, rather than requiring the derivation of corresponding soft bit values or the like, and it maps each symbol estimate to its “expected value,” i.e., the weighted sum of constellation point probabilities. Moreover, the mapping function may be changed dynamically—e.g., by using different look-up tables—to account for changing reception conditions and/or different modulation schemes or other signal parameters associated with the symbols being estimated and mapped to soft symbol values. | 11-13-2014 |
20140337507 | Method and Apparatus for Providing Network Applications Monitoring - A method and apparatus for providing network performance monitoring is disclosed. At least one application is run on a network controller. The at least one application running on the network controller sends a request for performance data information to a performance database manager (PDM). A response to the request for performance data information is received from the PDM. | 11-13-2014 |
20140337508 | Method and Apparatus for Providing Network Applications Monitoring - A method and apparatus for providing network performance monitoring using a switch running a service monitoring (SERMON) client is disclosed. A request for SERMON metrics is received from a performance database manager (PDM). The request is sent to the SERMON server designated in the request. The SERMON server is running in a service host. A reply is received from the SERMON server. The reply is sent to the PDM. | 11-13-2014 |
20140337509 | Method and Apparatus for Providing Network Applications Monitoring - A method for providing network performance monitoring using a performance database manager (PDM) is disclosed. A PDM has a PDM state manager, a communications server (COM server), a communications client (COM client), and an application database (AppDB). The PDM is configured to communicate with a network controller and a switch running a service monitoring (SERMON) client. A list of one or more switches, one or more hosted services, and one or more applications is determined. A request for service monitoring (SERMON) data is received from one or more applications running on a network controller. The request is sent to a SERMON client. A response is received from the SERMON client. | 11-13-2014 |
20140341181 | SYSTEM AND METHOD FOR CONFIGURING A RADIO ACCESS NETWORK - In accordance with one embodiment of the present disclosure, a method for managing communication in a wireless network includes determining a first value indicating a level of use for a scheduled data channel for one or more of a plurality of sectors served by a first base station and determining a second value indicating a level of use for a random access channel for one or more of the plurality of sectors served by the first base station. The method also includes selecting a respective subframe for random access transmissions for each of the sectors served by the first base station based on the first value and the second value. Additionally, the method includes transmitting configuration information to the first base station. The configuration information indicates a subframe selected for each of the sectors. | 11-20-2014 |
20140344879 | WEIGHTED INGEST POLICY MANAGEMENT IN A CONTENT DISTRIBUTION NETWORK - An ingestion controller, system, and method for managing ingestion of electronic content in a Content Distribution Network (CDN). The content is received from one or more content sources (CSs) through an inbound content pipe having a maximum bandwidth capacity. A database stores bandwidth weightings assigned to each CS by a network Policy Management System (PMS). The bandwidth weighting assigned to each CS corresponds to a fraction of the maximum bandwidth capacity of the inbound content pipe. An input buffer receives the content from the CSs in one or more input buffer queues associated with the CSs. A content retrieval mechanism retrieves the content from the input queues at an upload rate for each CS based at least on each CS's assigned bandwidth weighting, thereby causing a flow control mechanism to control the upload bitrate of each CS in proportion to the bandwidth weightings. | 11-20-2014 |
20140349660 | RESOURCE SCHEDULING IN A MOBILE COMMUNICATION NETWORK SUPPORTING MACHINE-TO-MACHINE (M2M) AND USER EQUIPMENT (UE) TRAFFIC - A system and method that differentiates between Machine-to-Machine (M2M) traffic and User Equipment (UE) traffic when scheduling radio Resource Units (RUs) to M2M terminals and UEs in a Long Term Evolution (LTE) network. Prior to allocation of RUs, the available RUs are divided into two disjoint sets—a UE-specific set (dedicated for UE users) and an M2M-specific set (dedicated for M2M terminals). A hybrid scheduler allocates RUs to M2M terminals from the M2M-specific set only. Any unallocated RUs from the M2M-specific set and the RUs assigned to the UE-specific set are then allocated to the UEs. New M2M-specific Quality of Service Class Indicators (QCIs) are defined as well for classifying M2M traffic only. These new QCIs are disjoint from the existing QCIs, which classify the UE traffic only. The M2M-specific QCIs separate M2M traffic classification from UE traffic classification so as not to impact UE human users' Quality of Experience (QoE). | 11-27-2014 |