Patent application number | Description | Published |
20090305594 | Fibers Formed from Aromatic Polyester and Polyether Copolymer - A method for forming a fiber is provided. The method comprises supplying at least one aromatic polyester to a melt processing device and modifying the aromatic polyester with at least one polyether copolymer within the device to form a thermoplastic composition having a melt flow rate that is greater than the melt flow rate of the aromatic polyester. The polyether copolymer contains a repeating unit (A) having the following formula: | 12-10-2009 |
20090320422 | Air filter with integral inter-filter gap filler - A disposable air filter that includes: (a) air filtration media; (b) a substantially planar air filter frame providing three-dimensional support for the air filtration media; and (c) an inter-filter gap filler disposed along substantially the entire length of at least one side of an opposed pair of the first or second sides and integrated into the air filter frame is disclosed. The integral inter-filter gap filler reduces gaps between adjacent air filters disposed in a filter track of an air filter bank. | 12-31-2009 |
20100048081 | BIODEGRADABLE POLYESTERS FOR USE IN FORMING FIBERS - A method for forming a biodegradable polyester suitable for use in fibers is provided. Specifically, a biodegradable polyester is melt processed at a controlled water content to initiate a hydrolysis reaction. Without intending to be limited by theory, it is believed that the hydroxyl groups present in water are capable of attacking the ester linkage of the polyester, thereby leading to chain scission or “depolymerization” of the polyester molecule into one or more shorter ester chains. By selectively controlling the reaction conditions (e.g., water content, temperature, shear rate, etc.), a hydrolytically degraded polyester may be achieved that has a molecular weight lower than the starting polymer. Such lower molecular weight polymers have a higher melt flow rate and lower apparent viscosity, which are useful in a wide variety of fiber forming applications, such as in the meltblowing of nonwoven webs. | 02-25-2010 |
20100048082 | BIODEGRADABLE POLYLACTIC ACIDS FOR USE IN FORMING FIBERS - A method for forming a biodegradable polylactic acid suitable for use in fibers is provided. Specifically, a polylactic acid is melt processed at a controlled water content to initiate a hydrolysis reaction. Without intending to be limited by theory, it is believed that the hydroxyl groups present in water are capable of attacking the ester linkage of polylactic acids, thereby leading to chain scission or “depolymerization” of the polylactic acid molecule into one or more shorter ester chains. The shorter chains may include polylactic acids, as well as minor portions of lactic acid monomers or oligomers, and combinations of any of the foregoing. By selectively controlling the hydrolysis conditions (e.g., moisture and polymer concentrations, temperature, shear rate, etc.), a hydrolytically degraded polylactic acid may be achieved that has a molecular weight lower than the starting polymer. Such lower molecular weight polymers have a higher melt flow rate and lower apparent viscosity, which are useful in a wide variety of fiber forming applications, such as in the meltblowing of nonwoven webs. | 02-25-2010 |
20140315462 | Fibers Formed from Aromatic Polyester and Polyether Copolymer - A method for forming a fiber is provided. The method comprises supplying at least one aromatic polyester to a melt processing device and modifying the aromatic polyester with at least one polyether copolymer within the device to form a thermoplastic composition having a melt flow rate that is greater than the melt flow rate of the aromatic polyester. The polyether copolymer contains a repeating unit (A) having the following formula: | 10-23-2014 |
Patent application number | Description | Published |
20090092704 | Granular feed supplement - A ruminant feed composition, having a granulated core having at least one active substance and at least one layer of a coating material surrounding the core. | 04-09-2009 |
20100272852 | Granular feed supplement - A ruminant feed composition, having a granulated core having at least one active substance and at least one layer of a coating material surrounding the core, the coating material comprising a vegetable oil and a modifying agent. Modifying agents include stearic acid, oleic acid, lecithin, and palm oil. Also disclosed are methods for making a ruminant feed composition. | 10-28-2010 |
20120090367 | COATED FERTILIZER PARTICLES - A composition has a core of at least one fertilizer substance and at least one layer of a coating material surrounding the core. The core may contain nitrogen and the coating material may include one or more linear, saturated aliphatic monocarboxylic acids. | 04-19-2012 |
20120093974 | GRANULAR FEED SUPPLEMENT - A ruminant feed composition, having a granulated core having at least one active substance and at least one layer of a coating material surrounding the core, the coating material comprising one or more linear, saturated aliphatic monocarboxylic acids in an amount of at least 60 wt % of the total weight of the coating material. | 04-19-2012 |
20120244248 | GRANULAR FEED SUPPLEMENT - A ruminant feed composition having a granulated core of L-lysine sulfate having a granular size of about 0.3 mm to about 3.0 mm, and two or more layers of a coating material surrounding the core, the coating material including a vegetable oil that is at least partially hydrogenated, and a modifying agent present in an amount of from about 0.5 wt % to about 10 wt % of a final product weight, the modifying agent containing at least one of stearic acid, oleic acid, lecithin, and palm oil. The coating material has a melting temperature in a range of from about 50° C. to about 80° C. The weight % ratio of core material to coating material is from 50:50 to 90:10. The composition exhibits a rumen bypass rate of at least 50% and an intestinal digestibility rate of at least 70%. | 09-27-2012 |
Patent application number | Description | Published |
20110219106 | Data Deletion in a Distributed Data Storage System - In one embodiment, a method for removing unused storage units is provided. One or more storage units are referenced by multiple client addresses. The method includes constructing, on a metadata server, a filter on at least a portion of block identifiers that identify storage units currently being referenced by client addresses. The metadata server stores information on which storage unit identifiers are referenced by which client addresses. The filter is transmitted from the metadata server to a block server. The filter is used by the block server to test whether storage unit identifiers that exist on the block server are present in the filter. The block server stores information on where a storage unit is stored on the block server for a storage unit identifier. Storage unit identifiers not present in the filter and associated storage units are deleted from the block server. | 09-08-2011 |
20110219205 | Distributed Data Storage System Providing De-duplication of Data Using Block Identifiers - An access request including a client address for data is received. A metadata server determines a mapping between the client address and storage unit identifiers for the data. Each of the one or more storage unit identifiers uniquely identifies content of a storage unit and the metadata server stores mappings on storage unit identifiers that are referenced by client addresses. The one or more storage unit identifiers are sent to one or more block servers. The one or more block servers service the request using the one or more storage unit identifiers where the one or more block servers store information on where a storage unit is stored on a block server for a storage unit identifier. Also, multiple client addresses associated with a storage unit with a same storage unit identifier are mapped to a single storage unit stored in a storage medium for a block server. | 09-08-2011 |
20140351363 | WRITING DATA IN A DISTRIBUTED DATA STORAGE SYSTEM - Methods, systems, and apparatuses, including computer programs encoded on computer-readable media, for receiving a write request that includes data and a client address at which to store the data. The data is segmented into the one or more storage units. A storage unit identifier for each of the one or more storage units is computed that uniquely identifies content of a storage unit. A mapping between each storage unit identifier to a block server is determined. For each of the one or more storage units, the storage unit and the corresponding storage unit identifier is sent to a block server. The block server stores the storage unit and information on where the storage unit is stored on the block server for the storage unit identifier. Multiple client addresses associated with a storage unit with the same storage unit identifier are mapped to a single storage unit. | 11-27-2014 |
20150220284 | WRITING DATA IN A DISTRIBUTED DATA STORAGE SYSTEM - Methods, systems, and apparatuses, including computer programs encoded on computer-readable media, for receiving a write request that includes data and a client address at which to store the data. The data is segmented into the one or more storage units. A storage unit identifier for each of the one or more storage units is computed that uniquely identifies content of a storage unit. A mapping between each storage unit identifier to a block server is determined. For each of the one or more storage units, the storage unit and the corresponding storage unit identifier is sent to a block server. The block server stores the storage unit and information on where the storage unit is stored on the block server for the storage unit identifier. Multiple client addresses associated with a storage unit with the same storage unit identifier are mapped to a single storage unit. | 08-06-2015 |
Patent application number | Description | Published |
20080318914 | METHODS FOR THE TREATMENT OF A TRAUMATIC CENTRAL NERVOUS SYSTEM INJURY - Methods of treating a subject with a traumatic central nervous system injury, more particularly, a traumatic brain injury, are provided. The methods comprise a therapy comprising a constant or a two-level dosing regime of progesterone. In one method, a subject in need thereof is administered at least one cycle of therapy, wherein the cycle of therapy comprises administering a therapeutically effective two-level intravenous dosing regime of progesterone. The two-level dosing regime comprises a first time period, wherein a higher hourly dose of progesterone is administered to the subject, followed by a second time period, wherein a lower hourly dose of progesterone is administered to the subject. | 12-25-2008 |
20110224181 | METHODS FOR THE TREATMENT OF A TRAUMATIC CENTRAL NERVOUS SYSTEM INJURY - Methods of treating a subject with a traumatic central nervous system injury, more particularly, a traumatic brain injury, are provided. The methods comprise a therapy comprising a constant or a two-level dosing regime of progesterone. In one method, a subject in need thereof is administered at least one cycle of therapy, wherein the cycle of therapy comprises administering a therapeutically effective two-level intravenous dosing regime of progesterone. The two-level dosing regime comprises a first time period, wherein a higher hourly dose of progesterone is administered to the subject, followed by a second time period, wherein a lower hourly dose of progesterone is administered to the subject. | 09-15-2011 |
20140349984 | METHODS FOR THE TREATMENT OF A TRAUMATIC CENTRAL NERVOUS SYSTEM INJURY - Methods of treating a subject with a traumatic central nervous system injury, more particularly, a traumatic brain injury, are provided. The methods comprise a therapy comprising a constant or a two-level dosing regime of progesterone. In one method, a subject in need thereof is administered at least one cycle of therapy, wherein the cycle of therapy comprises administering a therapeutically effective two-level intravenous dosing regime of progesterone. The two-level dosing regime comprises a first time period, wherein a higher hourly dose of progesterone is administered to the subject, followed by a second time period, wherein a lower hourly dose of progesterone is administered to the subject. | 11-27-2014 |
Patent application number | Description | Published |
20100294725 | AZETIDINIUM-FUNCTIONAL POLYSACCHARIDES AND USES THEREOF - The present invention relates to polysaccharides that have been modified by providing azetidinium functionality thereto. Such functionality can be provided by crosslinking a polysaccharide with a resin having azetidinium functional groups. In one or more aspects, the polysaccharide can comprise one or more of starch, guar gum, alginate or derivatives thereof. Polysaccharides having azetidinium functionality according to the present invention are suitable for multiple uses. Such uses include, but are not limited to, removal of one or more solid materials from a liquid, beneficiation of an ore, removal of metallic ions from a liquid; providing oil from bitumen; and removal of mercury from synthetic gypsum. Other uses of the functionalized polysaccharides of the present invention include hydroseeding, dust control and corosion control. | 11-25-2010 |
20140301921 | AMINE-ALDEHYDE RESINS AND USES THEREOF IN SEPARATION PROCESSES - Amine-aldehyde resins are disclosed for removing a wide variety of solids and/or ionic species from the liquids in which they are suspended and/or dissolved. These resins are especially useful as froth flotation depressants, for example in the beneficiation of value materials (e.g., bitumen, coal, or kaolin clay) to remove impurities such as sand. The resins are also useful for treating aqueous liquid suspensions to remove solid particulates, as well as for removing metallic ions in the purification of water. | 10-09-2014 |
Patent application number | Description | Published |
20120071138 | Systems and Methods for Providing Context-Based Voicemail - Voicemail systems and methods for managing voicemail systems are provided herein. The subject voicemail systems provide a plurality voicemail greeting, each of which are associated with a context tag. The context tag can be, for example, a location, a device parameter, an account parameter, a network parameter, or any other contextual information. Upon receipt of a change in a context tag, the voicemail system determines a new voicemail greeting associated with the new context tag and sets the new voicemail greeting to the active voicemail greeting. | 03-22-2012 |
20130150003 | Systems and Methods for Providing Context-Based Voicemail - Voicemail systems and methods for managing voicemail systems are provided herein. The subject voicemail systems provide a plurality voicemail greeting, each of which are associated with a context tag. The context tag can be, for example, a location, a device parameter, an account parameter, a network parameter, or any other contextual information. Upon receipt of a change in a context tag, the voicemail system determines a new voicemail greeting associated with the new context tag and sets the new voicemail greeting to the active voicemail greeting. | 06-13-2013 |
Patent application number | Description | Published |
20080260112 | Background Noise Effects - Mechanisms are disclosed that allow for the use of a false background, or background tone, in voice input in a telephonic call. A voice input may have both voice from a user talking and a background noise input which may be every other noise received at the user's phone. A trigger to use a background tone is received, the background tone is selected and the associated background tone file is retrieved. Then, a combiner combines the voice input with the background tone file. A filter may be used to filter the actual background noise from the voice input. Additionally, background tones may be used in various telephonic networks, including traditional land-line and wireless cellular networks. | 10-23-2008 |
20120263288 | BACKGROUND NOISE EFFECTS - Mechanisms are disclosed that allow for the use of a false background, or background tone, in voice input in a telephonic call. A voice input may have both voice from a user talking and a background noise input which may be every other noise received at the user's phone. A trigger to use a background tone is received, the background tone is selected and the associated background tone file is retrieved. Then, a combiner combines the voice input with the background tone file. A filter may be used to filter the actual background noise from the voice input. Additionally, background tones may be used in various telephonic networks, including traditional land-line and wireless cellular networks. | 10-18-2012 |
Patent application number | Description | Published |
20140032351 | Systems and Methods for Live Auctioneer Led Sales - Systems and methods for providing live auctioneer led sales of products, such as vehicles, between remotely located buyers, sellers, and auctioneers are provided herein. In certain aspects, systems and methods may facilitate one or more auctions led by a remotely located live auctioneer who receives bids from one or more remotely located buyers. Accordingly, in some examples, the auctioneer may accept bids from the buyers, encourage bidding from the buyers, and/or declare (or not declare) a product sold in real-time. In this manner, in certain aspects, the systems and methods enable an auction to be conduct by a live auctioneer. | 01-30-2014 |
20140032352 | Systems and Methods for Live Auctioneer Led Sales - Systems and methods for providing live auctioneer led sales of products, such as vehicles, between remotely located buyers, sellers, and auctioneers are provided herein. In certain aspects, systems and methods may facilitate one or more auctions led by a remotely located live auctioneer who receives bids from one or more remotely located buyers. Accordingly, in some examples, the auctioneer may accept bids from the buyers, encourage bidding from the buyers, and/or declare (or not declare) a product sold in real-time. In this manner, in certain aspects, the systems and methods enable an auction to be conduct by a live auctioneer. | 01-30-2014 |
20140032353 | Systems and Methods for Live Auctioneer Led Sales - Systems and methods for providing live auctioneer led sales of products, such as vehicles, between remotely located buyers, sellers, and auctioneers are provided herein. In certain aspects, systems and methods may facilitate one or more auctions led by a remotely located live auctioneer who receives bids from one or more remotely located buyers. Accordingly, in some examples, the auctioneer may accept bids from the buyers, encourage bidding from the buyers, and/or declare (or not declare) a product sold in real-time. In this manner, in certain aspects, the systems and methods enable an auction to be conduct by a live auctioneer. | 01-30-2014 |
Patent application number | Description | Published |
20090092142 | METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR DYNAMIC COMMUNICATION DATA ROUTING BY A MULTI-NETWORK REMOTE COMMUNICATION TERMINAL - Methods, systems and computer program products of dynamic communication data routing by a multi-network remote communication terminal across a plurality of networks are provided. The multi-network remote communication terminal is delivered to a locality to receive communication services. The terminal is communicatively connected to a first network, a second network, the second network having a communication characteristic different from the first network, and to a user endpoint device positioned in the locality. Communication data directed to a target device from the user endpoint device is received at the terminal. A characteristic of the received communication data is determined. Routing of received communication data to the target device is allocated across the first network and/or the second network based on the determined characteristic of the received communication data and the communication characteristics of the first and second network. Routing of the received communication data is dynamically re-allocated based on a detected change in the characteristic of the communication data. | 04-09-2009 |
20090210545 | SELECTION OF PEERS TO CLUSTER WITHIN A PEER-TO-PEER NETWORK - Peer-to-peer networks may be established by considering various characteristics of the peers when clustering the peers within the network. The characteristics may include operational criteria such as the cost of data transfer by each peer, the type and status of power being supplied to each peer, and the bandwidth available to each peer. The peer-to-peer networks may be established by requiring credentials to gain access to the peer-to-peer network, where those credentials may be a network access identifier that has previously been used to gain access to an underlying data network of the peer-to-peer network. The operational criteria used to select peers for clustering may be stored and accessed through association to the credentials used to gain access to the peer-to-peer network. | 08-20-2009 |
20110072093 | FORWARDING SELECTED DOCUMENT PASSAGES FROM AN ELECTRONIC READER - A process for forwarding selected passages from an electronic document being presented on a portable electronic reader, where the electronic document has been previously downloaded into a memory of the electronic reader. The process permits a user of the electronic reader to electronically identify and select the passages from an electronic document being presented on the portable electronic reader. The process also includes the automatic association of metadata with a selected passage, where the metadata includes citation information identifying the presented electronic document as the source document. The selected passages and associated metadata are stored in the portable electronic reader, for subsequent transmission over the communications network to a designated recipient. | 03-24-2011 |
20110134755 | Methods, Systems, and Products for a Metering Application - Methods, systems, and products are disclosed for enforcing a rate limit for data traffic. One method identifies a unidirectional stream of data packets flowing through a server to a downstream end user. The unidirectional stream is classified according to a rate class, with each rate class having an associated rate limit. Each rate limit specifies a maximum bit rate at which the unidirectional stream may flow. When the actual bit rate of the unidirectional stream exceeds the maximum bit rate permitted for the associated rate class, packets of data are discarded to reduce the bit rate. | 06-09-2011 |
20120302231 | COMPUTATIONAL SYNDROME DETECTOR - Example methods disclosed herein to monitor wireless system operation include processing a plurality of session records describing characteristics of wireless sessions in a coverage area of a wireless system to determine a first time interval for a first wireless device to propagate from a first access point in the coverage area to a second access point in the coverage area, determining a coverage area traversal rate for the first wireless device based on the first time interval, the coverage area traversal rate corresponding to a rate at which the first wireless device is traversing the coverage area, and providing a wireless service advisory for the coverage area to a second wireless device based on the coverage area traversal rate for the first wireless device. | 11-29-2012 |
20130013188 | PERSONAL WIRELESS COVERAGE MAP - Methods and systems respectively provide for receiving a wireless signal coverage map request from a wireless device. A map is generated in accordance with the request and provided to the wireless device. The map includes symbology keyed to wireless signal services within a particular geographic area. Such symbology can be indicative of recommended areas and travel routes having particular types of wireless signal coverage, regions of poor or non-existent wireless signal service, areas presently experiencing heavy wireless signal usage, and so on. In this way, a wireless device user can seek to access specific wireless services and/or avoid suspect trouble regions within a geographic area. | 01-10-2013 |
20130204530 | PERSONAL WIRELESS COVERAGE MAP - Methods and systems respectively provide for receiving a wireless signal coverage map request from a wireless device. A map is generated in accordance with the request and provided to the wireless device. The map includes symbology keyed to wireless signal services within a particular geographic area. Such symbology can be indicative of recommended areas and travel routes having particular types of wireless signal coverage, regions of poor or non-existent wireless signal service, areas presently experiencing heavy wireless signal usage, and so on. In this way, a wireless device user can seek to access specific wireless services and/or avoid suspect trouble regions within a geographic area. | 08-08-2013 |
Patent application number | Description | Published |
20100046401 | SIP-Based Session Control - These exemplary embodiments utilize Sessions Initiation Protocol (SIP) for admission control. The use of the SIP allows a SIP server itself to perform the admission control function. The use of RSVP linkages is reduced. The use of SIP for admission control allows an application to communicate, or “talk,” to a network and to request that resources within the network be reserved. Any communications device that uses sessions may utilize the SIP protocol for admission control. The SIP protocol may be used for unicast and multicast media sessions including video-on-demand and/or multicast video access control. | 02-25-2010 |
20100046536 | METHODS AND SYSTEMS FOR AGGREGATING ETHERNET COMMUNICATIONS - Methods and systems for aggregating Ethernet communications are disclosed. A disclosed apparatus includes a first Ethernet port to communicate with a second Ethernet port of a first device, a third Ethernet port to communicate with a fourth Ethernet port of a second device, a fifth Ethernet port to receive Ethernet frames, and a switching portion to direct nth ones of the frames to a first queue associated with the second port, direct n−1 frames preceding each of the nth ones of the frames to a second queue associated with the fourth port, and select a value of n based on a ratio of a first non-zero data rate of the first device for a first communication link in a first direction and a second non-zero data rate of the second device for a second communication link in the first direction, and based on a remaining capacity of the first queue. | 02-25-2010 |
20100049856 | SIP-Based Session Control Among A Plurality OF Multimedia Devices - These exemplary embodiments utilize Sessions Initiation Protocol (SIP) for admission control among a plurality of multimedia devices. The use of the SIP allows a SIP server to perform admission control functions. The use of RSVP linkages is reduced. The use of SIP for admission control allows an application to communicate, or “talk,” to a network and other multimedia devices and to request that resources within the network be reserved. Any communications device that uses sessions may utilize the SIP protocol for admission control. The SIP protocol may be used for unicast and multicast media sessions including video-on-demand and/or multicast video access control. | 02-25-2010 |
20100272165 | METHODS AND SYSTEMS FOR PROVIDING AN ASYMMETRIC ETHERNET SERVICE - Methods and systems for providing asymmetric Ethernet service are disclosed. An example method to provide asymmetric Ethernet service to a subscriber includes communicating at least a first portion of a subscriber data communication via a first asymmetric Ethernet connection between a first asymmetric Ethernet modem at a point of service and a second asymmetric Ethernet modem at a service provider location, communicating at least a second portion of the subscriber data communication via a second asymmetric Ethernet connection between a third asymmetric Ethernet modem at the point of service and a fourth asymmetric Ethernet modem at the service provider location, wherein the first and second asymmetric Ethernet connections provide a faster aggregated download bandwidth than an aggregated upload bandwidth to provide an asymmetric Ethernet connection between the point of service and the service provider location, and aggregating the first and second portions of the subscriber data communication for transmission to an Ethernet data network. | 10-28-2010 |
20120295678 | Integrating Real Time Data into Virtual Settings - Data from live events is incorporated into virtual simulations and games. The data may be obtained from various sensors and transferred over a network. However, should one of the participants be a threat, then portions of the virtual simulations and games may be disabled to protect the other participants. | 11-22-2012 |
20130084997 | Integrating Real Time Data into Virtual Settings - Data from live events is incorporated into virtual simulations and games. The data may be obtained from various sensors and transferred over a network. However, should one of the participants be a threat, then portions of the virtual simulations and games may be disabled to protect the other participants. | 04-04-2013 |
20130263005 | Adaptation of Gaming Applications to Participants - Methods, systems, and products adapt gaming applications to participants. Should one of the participants be a minor, for example, the gaming application may adapt to scenarios that are appropriate for minors. Similarly, the gaming application may adapt to customs associated with a country of a participant. | 10-03-2013 |
Patent application number | Description | Published |
20090029777 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR ALLOCATING DIFFERENT QUALITY OF SERVICE/BANDWIDTH ALLOCATION TO SUBSCRIBERS HAVING DIFFERENT LEVELS OF SUBSCRIPTION SERVICE FOR INTERACTIVE GAMING - Quality of Service (QoS) and/or bandwidth allocation can be provided for interactive gaming via a Regional/Access Network (RAN). The RAN can provide end-to-end transport between a Gaming Application Service Provider (GASP) and a Customer Premises Network (CPN) that includes a Routing Gateway (RG). Quality of Service (QoS) and/or bandwidth allocation can be provided by determining different levels of subscription service for different subscribers to an interactive game between a plurality of participants. Different QoS and/or bandwidth allocations can be provided to different gaming traffic flows associated with the different subscribers to the interactive game based on the different levels of subscription service of the different subscribers. | 01-29-2009 |
20090076936 | Dynamic Media Rights - Included are embodiments for providing dynamic media rights. At least one embodiment includes receiving content from at least one uploading user and determining at least one attribute associated with the content. Some embodiments include determining at least one compensation schedule for providing the content to at least one content consumer and providing an option to compensate the at least one uploading user, according to the compensation schedule, for providing the content to the at least one content consumer, wherein the compensation schedule is determined from the at least one attribute. | 03-19-2009 |
20090285218 | Managing quality of service in a communication network for applications - Quality of Service (QoS) in a communication network is managed. A service provider requests a level of QoS for communication in the communication network using a QoS request. The requested level of QoS may be allocated to the service provider based on the QoS request. The service provider may make the QoS request on its own initiative and/or in response to a request from an application that is hosted by the service provider. A QoS level may then be allocated to the service provider and/or to particular applications that are hosted by the service provider. | 11-19-2009 |
20100046525 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR PROVIDING ETHERNET VLAN CAPACITY REQUIREMENT ESTIMATION - A method, system, and computer program product for providing VLAN capacity requirement estimation is provided. The method includes receiving at a computing system a VLAN configuration file that specifies VLAN access ports, VLAN switches and VLAN trunks in a VLAN. A target access port identifier is received at the computing system from a requestor. A target trunk and target switch corresponding to the target access port are determined at the computing system. A bandwidth contribution of the target access port to the VLAN is calculated at the computing system. The calculating is based on a least contribution algorithm that reflects an impact of provisioning the target access port with respect to trunk capacity, and is responsive to the target bandwidth requirement, the target class of service and placement of the target port in the VLAN. The bandwidth contribution is then transmitted to the requestor. | 02-25-2010 |
20100085876 | METHOD FOR TRAFFIC ENGINEERING OF CONNECTIONLESS VIRTUAL PRIVATE NETWORK SERVICES - A method for traffic engineering of connectionless virtual private network (VPN) services that includes receiving physical connectivity data for a connectionless VPN. The data includes service nodes and links between the service nodes. One or more of the service nodes are also edge nodes. Logical connectivity data for the edge nodes is received. A restricted topology is created in response to the physical connectivity data and to the logical connectivity data. The restricted topology includes a single path between each pair of the edge nodes and each path includes a plurality of the service nodes and one or more of the links A bandwidth requirement for each link in the restricted topology is calculated. The bandwidth requirement is reserved on each link in the restricted topology. The method further comprises directing routing software to force a packet received from an edge node through one of the paths in the restricted topology. | 04-08-2010 |
20110116461 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR ALLOCATING DIFFERENT QUALITY OF SERVICE/BANDWIDTH ALLOCATION TO SUBSCRIBERS HAVING DIFFERENT LEVELS OF SUBSCRIPTION SERVICE FOR INTERACTIVE GAMING - Quality of Service (QoS) and/or bandwidth allocation can be provided for interactive gaming via a Regional/Access Network (RAN). The RAN can provide end-to-end transport between a Gaming Application Service Provider (GASP) and a Customer Premises Network (CPN) that includes a Routing Gateway (RG). Quality of Service (QoS) and/or bandwidth allocation can be provided by determining different levels of subscription service for different subscribers to an interactive game between a plurality of participants. Different QoS and/or bandwidth allocations can be provided to different gaming traffic flows associated with the different subscribers to the interactive game based on the different levels of subscription service of the different subscribers. | 05-19-2011 |
20110271338 | Authentication Tokens For Use In Voice Over Internet Protocol Methods - Setup of a Voice over Internet Protocol (VoIP) call is initiated and an authentication token is received for the VoIP call that is set up, that indicates that the VoIP call is authorized. The authentication token is inserted into packets for the VoIP call. The packets, including the authentication token therein, are transmitted into an IP network. The authentication token may be placed in an IP version 6 (IPv6) flowID field. | 11-03-2011 |
20120250693 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR PROVIDING ETHERNET VLAN CAPACITY REQUIREMENT ESTIMATION - A method, system, and computer program product for providing VLAN capacity requirement estimation is provided. The method includes receiving at a computing system a VLAN configuration file that specifies VLAN access ports, VLAN switches and VLAN trunks in a VLAN. A target access port identifier is received at the computing system from a requestor. A target trunk and target switch corresponding to the target access port are determined at the computing system. A bandwidth contribution of the target access port to the VLAN is calculated at the computing system. The calculating is based on a least contribution algorithm that reflects an impact of provisioning the target access port with respect to trunk capacity, and is responsive to the target bandwidth requirement, the target class of service and placement of the target port in the VLAN. The bandwidth contribution is then transmitted to the requestor. | 10-04-2012 |
20130250939 | Authentication Tokens for Use in Voice Over Internet Protocol Methods - Setup of a Voice over Internet Protocol (VoIP) call is initiated and an authentication token is received for the VoIP call that is set up, that indicates that the VoIP call is authorized. The authentication token is inserted into packets for the VoIP call. The packets, including the authentication token therein, are transmitted into an IP network. The authentication token may be placed in an IP version 6 (IPv6) flowID field. | 09-26-2013 |
20150078164 | METHODS OF IMPLEMENTING DYNAMIC QUALITY OF SERVICE OR BANDWIDTH PROVISIONING - A method of operating a data network may include establishing a data path through the data network between a routing gateway and service provider equipment providing a data service. Moreover, the data service may be provided for use at the routing gateway over the data path during a data session. A request may be received from the service provider equipment where the request defines a data flow characteristic for the data path between the routing gateway and the service provider equipment providing the data service. The data flow characteristic may then be transmitted to a network element along the data path between the routing gateway and the service provider equipment. A request from service provider equipment can include an allowed bandwidth or prioritization. Related methods, data networks, data service providers, routing gateways, and computer program products are also discussed. | 03-19-2015 |