Patent application number | Description | Published |
20120310860 | Cloud-Based Demand Response - Methods, systems, and apparatus for implementing cloud-based demand response are provided. Cloud-based demand response may be performed by publishing a demand response request at a communications node, the published demand response request including at least a load reduction request and an incentive price; initiating a load reduction bidding process in response to the published demand response request, the load reduction bidding process being accessible to customer nodes; and determining an updated incentive price based on at least one load reduction bid received from the customer nodes. The updated incentive price may be determined by a bisection function, and the at least one load reduction bid may be autonomously generated based on a customer cost function. | 12-06-2012 |
20130094397 | METHOD AND APPARATUS FOR LOCALIZED AND SCALABLE PACKET FORWARDING - A packet forwarding determination capability is disclosed herein. The packet forwarding determination capability enables determination of handling of a packet at a current node of a network. A set of candidate neighbor nodes is determined for the current node from a representation of respective locations of the neighbor nodes. The set of candidate neighbor nodes includes each of the neighbor nodes located at least within a circle defined within the representation and having a diameter defined by a line between the current node and a destination node of the packet. The routing of the packet at the current node is determined using the set of candidate neighbor nodes. The routing of the packet may include forwarding the packet toward a next-hop node or identifying the current node as being the intended destination of the packet. | 04-18-2013 |
20130173747 | SYSTEM, METHOD AND APPARATUS PROVIDING ADDRESS INVISIBILITY TO CONTENT PROVIDER/SUBSCRIBER - A method and apparatus for scalably and securely providing address invisibility to a content provider over a network. In various embodiments, the content provider determines the closest geographic rendezvous point node to store content, such that each of the geographic regions may have associated with it one or more nodes, which provide content to a subscriber without directory service to thereby provide address invisibility to the content provider and also the content consumer. | 07-04-2013 |
20130259063 | METHODS AND APPARATUSES FOR ADAPTING BUFFER CAPACITY AT ROUTERS - In a method for dynamic buffer adjustment at a line card of router, a current buffer occupancy at the line card is compared with at least a first buffer occupancy threshold, the first buffer occupancy threshold being calculated based on a buffer occupancy threshold parameter and a capacity of at least a first buffer memory at the line card; and an active buffer capacity is adjusted by at least one of activating and deactivating buffer memory blocks at the line card based on the comparing step, the activating including switching on the buffer memory blocks, and the deactivating including causing the buffer memory blocks to enter a sleep state. | 10-03-2013 |
20140129838 | METHOD AND APPARATUS FOR RESILIENT END-TO-END MESSAGE PROTECTION FOR LARGE-SCALE CYBER-PHYSICAL SYSTEM COMMUNICATIONS - To address the security requirements for cyber-physical systems, embodiments of the present invention include a resilient end-to-end message protection framework, termed Resilient End-to End Message Protection or REMP, exploiting the notion of the long-term key that is given on per node basis. This long term key is assigned during the node authentication phase and is subsequently used to derive encryption keys from a random number per-message sent. Compared with conventional schemes, REMP improves privacy, message authentication, and key exposure, and without compromising scalability and end-to-end security. The tradeoff is a slight increase in computation time for message decryption and message authentication. | 05-08-2014 |
Patent application number | Description | Published |
20080267068 | Lightweight bandwidth-management scheme for elastic traffic - A lightweight probabilistic mechanism used to estimate the number of active flows, which estimate is used to determine the probability of admitting a new flow into the network. In one embodiment, a method for controlling admission of new flows at a node in a network of nodes interconnected by links includes: (a) for each of a plurality of incoming packets arriving at the node, each incoming packet corresponding to an active flow traversing the node: (a1) randomly selecting a packet from an output buffer of the node; (a2) determining whether the incoming packet is from the same active flow as the randomly-selected packet; and (a3) updating an estimate of the number of active flows traversing the node based on the determination of step (a2); and (b) determining whether to admit or drop part or all of a new flow at the node based on the estimated number of active flows traversing the node. | 10-30-2008 |
20100046527 | Latency Equalization for Interactive Network Applications - A network configuration that supports latency-equalization (LEQ) routing by effectively “storing” packets on communication links, rather than at end points. A suitable network configuration is found by (i) identifying a candidate pool of routers through which the participating client terminals and application servers can exchange packets intended for LEQ routing and (ii) analyzing the delay inventory corresponding to the network paths connecting the client terminals and application servers, through those routers. Based on the analysis, M routers from the candidate pool are selected to serve as hub nodes. Each participating client terminal is assigned m of these M hub nodes and, thereafter, directs and receives its packets intended for LEQ routing through one of these m hub nodes. | 02-25-2010 |
20110225476 | System And Method For Enabling A Buffer Less Or Substantially Buffer Less Core Network - The present invention relates to a system and method for enabling a buffer-less or substantially buffer-less core network using a packet-level forward error correction (FEC) coding scheme. The system includes an ingress edge router configured to receive data packets destined to at least one egress edge router via an access link from an end-host. The ingress edge router is connected to the at least one egress edge router via a core network, where the core network is buffer-less or substantially buffer-less. Also, the ingress edge router is configured to apply a forward error correction (FEC) encoding scheme to the data packets at a packet level and transmit the encoded data packets to the core network. | 09-15-2011 |
20130159724 | Method And Apparatus For A Scalable And Secure Transport Protocol For Sensor Data Collection - A new approach for a transport protocol for sensor data collection, such as a smart grid is described. In one embodiment of the invention, each server avoids keeping security and communication state per client through the notion of a secure “state-token”. The state token is issued with each server message and is subsequently attached to corresponding client messages delivered to the server. An implementation is provided in which the server encrypts and authenticates the associated session state, and then gives the resulting encryption for the client to temporarily store and return to the server with a next message. In this way, a server does not keep session state after sending the encryption back to a client and can quickly restore session state when the next message from the client arrives. | 06-20-2013 |
20140324240 | Method And System For Disaggregating Thermostatically Controlled Appliance Energy Usage From Other Energy Usage - An apparatus includes processor and a memory communicatively connected to the processor. The processor is configured to receive total energy usage information that is related to a thermostatically controlled appliance and receive ambient temperature information related to the thermostatically controlled appliance. The processor derives a physical model for the thermostatically controlled appliance and other than the thermostatically controlled appliance, the physical model dependent on ambient temperature. The processor solves a Hidden Markov Model based on the total energy usage information and the physical model to obtain an energy usage model for the thermostatically controlled appliance and other than the thermostatically controlled appliance. Based on the total energy usage information, ambient temperature information, and the energy usage model, the processor determines energy use by the thermostatically controlled appliance. | 10-30-2014 |