Patent application number | Description | Published |
20090003349 | Network system having an extensible forwarding plane - A platform for seamlessly hosts a plurality of disparate types of packet processing applications. One or more applications are loaded onto a service card on the platform. A programmable path structure is included that maps a logical path for processing of the packets through one or more of the plurality of service cards according to characteristics of the packets. Multiple path structures may be programmed into the platform to offer different service paths for different types of packets. | 01-01-2009 |
20090003364 | Open platform architecture for integrating multiple heterogeneous network functions - A platform for seamlessly hosts a plurality of disparate types of packet processing applications. One or more applications are loaded onto a service card on the platform. A programmable path structure is included that maps a logical path for processing of the packets through one or more of the plurality of service cards according to characteristics of the packets. Multiple path structures may be programmed into the platform to offer different service paths for different types of packets. | 01-01-2009 |
20090003375 | Network system having an extensible control plane - A platform for seamlessly hosts a plurality of disparate types of packet processing applications. One or more applications are loaded onto a service card on the platform. A programmable path structure is included that maps a logical path for processing of the packets through one or more of the plurality of service cards according to characteristics of the packets. Multiple path structures may be programmed into the platform to offer different service paths for different types of packets. | 01-01-2009 |
20100161797 | BALANCING USER REGISTRATION LIFETIMES IN A NETWORK - A method of balancing user registration lifetimes in a network is disclosed for smoothing the load of the registration server. The method of balancing user registration lifetimes in a network includes providing an initial registration lifetime for a registration request that is calculated using the time of the request and the previous history of registration requests, and in a particular embodiment, using the cumulative distribution function of the history of registration requests. The method of balancing user registration lifetimes in a network is particularly useful for handling spikes in registration traffic, and can accommodate user-specified variable lifetimes, as well dynamic user arrivals and departures. It provides effective load balancing over time for a single server, at the expense of a constant factor additive load per user, which can be amortized to near zero over the long run. | 06-24-2010 |
20100226369 | Network system having an extensible forwarding plane - A platform for seamlessly hosts a plurality of disparate types of packet processing applications. One or more applications are loaded onto a service card on the platform. A programmable path structure is included that maps a logical path for processing of the packets through one or more of the plurality of service cards according to characteristics of the packets. Multiple path structures may be programmed into the platform to offer different service paths for different types of packets. | 09-09-2010 |
20110023028 | VIRTUALIZATION SOFTWARE WITH DYNAMIC RESOURCE ALLOCATION FOR VIRTUAL MACHINES - In one embodiment, a system has two or more working computers, each running one or more working virtual machines (VMs), and a protection computer running corresponding protection VMs. A management station can change the levels of computer resources specified in resource-configuration files for the protection VMs, and virtualization software can re-read the resource-configuration files and change the allocation of computer resources to the protection VMs without having to shut down and re-launch the protection VMs. By initially launching the protection VMs with reduced levels of computer resources, fast and cost-effective failover protection can be provided to the working computers, where the computer resources allocated to a protection VM are enhanced only after the detection of a failure of the corresponding working VM, without having to shut down and re-launch the protection VM. | 01-27-2011 |
20110075667 | LAYER 2 SEAMLESS SITE EXTENSION OF ENTERPRISES IN CLOUD COMPUTING - Various embodiments relate to a Cloud Data Center, a system comprising the Cloud Data Center, and a related method. The Cloud Data Center may include a logical customer edge router to send packets between addresses in a private enterprise network and addresses in a logical network within a cloud network using Layer 2 protocol and MAC addressing. The logical network may have resources, known as virtual machines, allocated to the private enterprise network and may share a common IP address space with the private enterprise network. A directory at the Cloud Data Center may correlate the enterprise IP addresses of virtual machines with a MAC address, cloud IP address, and a location IP address within the logical network. The Cloud Data Center may double encapsulate packets with MAC, cloudIP, and locIP headers, when sending a packet to a destination in the logical network. | 03-31-2011 |
20110075674 | SCALABLE ARCHITECTURE FOR ENTERPRISE EXTENSION IN A CLOUD TOPOLOGY - Various embodiments relate to a Cloud Data Center, a system comprising the Cloud Data Center, and a related method. The Cloud Data Center may include a logical customer edge router to send packets between addresses in a private enterprise network and addresses in a logical network within a cloud network. The logical network may have resources, known as virtual machines, allocated to the private enterprise network and may share a common IP address space with the private enterprise network. A directory at the Cloud Data Center may correlate the enterprise IP addresses of virtual machines with a cloud IP address and a location IP address within the logical network. The Cloud Data Center may double encapsulate packets with two specified headers, a cloudIP and locIP header, when sending a packet to a destination in the logical network. | 03-31-2011 |
20110078303 | DYNAMIC LOAD BALANCING AND SCALING OF ALLOCATED CLOUD RESOURCES IN AN ENTERPRISE NETWORK - Various exemplary embodiments relate to a workload distribution system for an enterprise network extended in to a cloud network and a related method. The enterprise network may include a series of servers in a private enterprise network and a scalable series of servers in a cloud network. The enterprise network may employ one or more load balancers in both a private enterprise network and cloud network that are connected to each series of servers to distribute work amongst the servers in both networks based on criteria such as overall system performance and costs. The enterprise network may also employ one or more controllers to scale the number of cloud servers allocated to the enterprise network based on the system workload and other user-defined criteria, such as revenue generated per work request. | 03-31-2011 |
20110299419 | OPEN PLATFORM ARCHITECTURE FOR INTEGRATING MULTIPLE HETEROGENEOUS NETWORK FUNCTIONS - A platform for seamlessly hosts a plurality of disparate types of packet processing applications. One or more applications are loaded onto a service card on the platform. A programmable path structure is included that maps a logical path for processing of the packets through one or more of the plurality of service cards according to characteristics of the packets. Multiple path structures may be programmed into the platform to offer different service paths for different types of packets. | 12-08-2011 |
20120124238 | PRIORITIZATION OF ROUTING INFORMATION UPDATES - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at the node, a network state update message; updating a first portion of a first set of routing information based on the network state update message; after updating the first portion of the first set of routing information, beginning an update of a second set of routing information; and after beginning the update of the second set of routing information, updating a second portion of the first set. In various alternative embodiments, the step of updating the first portion includes one or more of the following: determining at least one other node within the network for which routing information should be used to update the second set of routing information; and updating routing information associated with the at least one other node in the first set of routing information. | 05-17-2012 |
20120169835 | MULTI-PARTY AUDIO/VIDEO CONFERENCE SYSTEMS AND METHODS SUPPORTING HETEROGENEOUS ENDPOINTS AND PROGRESSIVE PERSONALIZATION - In a method and architecture for multimedia conferencing, each upstream and downstream traffic flow is processed in a custom manner. The custom processing is capable of handling diverse capabilities of end-user devices, diverse access networks over which each conference participant joins the multimedia conference, and/or customizing personalized conference experience for each conference participant. | 07-05-2012 |
20120173709 | SEAMLESS SCALING OF ENTERPRISE APPLICATIONS - Various exemplary embodiments relate to a method of scaling resources of a computing system, the method comprising. The method may include: setting a threshold value for a metric of system performance; determining an ideal resource load for at least one resource based on the threshold value for the metric; distributing a system work load among the computing system resources; and adjusting the number of resources based on the system work load, the ideal resource load, and a current number of resources. Various exemplary embodiments also relate to a computing system for scaling cloud resources. The computing system may include: internal resources; a load balancer; a performance monitor; a communication module; a job dispatching module; and a controller. Various exemplary embodiments also relate to a method of detecting dynamic bottlenecks during resource scaling using a resource performance metric and a method of detecting scaling choke points using historical system performance metric. | 07-05-2012 |
20140022918 | Method And Apparatus For Selecting A Wireless Access Point - Various embodiments provide a method and apparatus of providing wireless access point selection based on performance metric(s) and signal strength. In particular, a client selecting between one of a number of wireless access points bases the selection decision on performance metrics as well as signal strength. | 01-23-2014 |
20140181978 | DESIGN AND EVALUATION OF A FAST AND ROBUST WORM DETECTION ALGORITHM - A method and computer product are presented for identifying Internet worm propagation based upon changes in packet arrival rates at a network connection. First, unsolicited (i.e., packets that were not requested by the receiver) traffic is separated from solicited traffic at the network connection. The unsolicited traffic arrival patterns are monitored and analyzed for any changes. Once changes in the unsolicited traffic arrival patterns are detected, the changes are mathematically analyzed to detect growth trends. The presence of growth trends that follow certain key characteristics indicate whether the changes are due to worm propagation. | 06-26-2014 |
20140280870 | PROTECTION OF SENSITIVE DATA OF A USER FROM BEING UTILIZED BY WEB SERVICES - Systems and methods for preventing web services from using sensitive data in customizing web pages for a user. In one embodiment, a protection system is implemented between the user and the web service. The protection system identifies past interactions of the user with the web service, identifies text in the past interactions between the user and the web service, and identifies subjects discussed in the text. The protection system then communicates with the user to determine which of the subjects are sensitive to the user, and deletes a history stored by the web service for the user that relates to the sensitive subjects. | 09-18-2014 |
20150052593 | SECURE FILE TRANSFERS WITHIN NETWORK-BASED STORAGE - A capability is provided for securely transferring a file within network-based storage. A capability is provided for securely transferring a user file of a user from a first server to a second server. The first server may be associated with a first service provider and the second server may be associated with a second service provider. The secure transfer of a user file from the first server to the second server may be performed based on a One-Click File Transfer capability in which only a single click by the user is needed in order for the user file to be transferred. The secure transfer of a user file from the first server to the second server may be performed based on a Zero-Click File Transfer capability in which the user file may be transferred without any interaction by the user. | 02-19-2015 |