Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

36results about How to "Consume bandwidth" patented technology

Methods and apparatus for establishing a computerized device tunnel connection

A client device establishes a first tunnel connection or tunnel, through a public network, with a first gateway of a private network and establishes, through the tunnel connection, a data connection with a destination device within the private network. The first gateway monitors or analyzes the geographic locations of the gateways associated with the private network relative to geographic location of the destination device associated with the data connection. Based upon such the monitoring, the first gateway transmits information to the client device relating to establishment of a second tunnel connection or tunnel with a second gateway of the private network. The client device establishes the second tunnel connection with the second gateway and establishes a data connection with the destination device through the second gateway. By establishing the second tunnel connection with the second gateway, the client device utilizes the bandwidth of the public network to exchange data with the destination device, thereby decreasing data transmission costs to the private network and decreasing private network latency.
Owner:CISCO TECH INC

Methods and systems for rate-based flow control between a sender and a receiver

InactiveUS7304951B2Excessive rateFluctuation in rateError preventionTransmission systemsTransmitterReal-time computing
Methods and systems for rate-based flow control between a sender and a receiver are disclosed. A receiver performs TCP-like flow control calculations based on packets received from a sender. The receiver calculates a transmission rate and forwards the transmission rate to the sender. The sender sends packets to the receiver at the rate calculated by the receiver. Thus, rather than having sender-based flow control as in TCP, the receiver controls the rate at which packets are delivered.
Owner:NORTH CAROLINA STATE UNIV

System and Methods for User-Centric Mobile Device-Based Data Communications Cost Monitoring and Control

ActiveUS20110276442A1Improve data communication usageImprove cost monitoring operationComplete banking machinesAccounting/billing servicesComputer networkControl data
Systems and methods for providing user-centric device-based data communications cost monitoring and controls. In an embodiment, the method operates by sending a registration request associated with a subscriber session, determining current data usage associated with the subscriber, and sending data usage thresholds. The method further comprises sending quotas associated with the subscriber session after collecting data usage information associated with the subscriber session. The method receives a notification at the subscriber's mobile device when a pre-determined quota is exceeded during the subscriber session to control data usage. The system communicates with a usage policy server and a usage policy application. The usage policy application allows a subscriber to alter terms and service tiers of a subscription. The usage policy application displays current data usage information on a per-network and per-application basis using subscriber profile information, subscriber session information, and prior subscriber usage history received from the usage policy server.
Owner:AMDOCS DEV LTD +1

Distributed adaptive network memory engine

Memory demands of large-memory applications continue to remain one step ahead of the improvements in DRAM capacities of commodity systems. Performance of such applications degrades rapidly once the system hits the physical memory limit and starts paging to the local disk. A distributed network-based virtual memory scheme is provided which treats remote memory as another level in the memory hierarchy between very fast local memory and very slow local disks. Performance over gigabit Ethernet shows significant performance gains over local disk. Large memory applications may access potentially unlimited network memory resources without requiring any application or operating system code modifications, relinkling or recompilation. A preferred embodiment employs kernel-level driver software.
Owner:THE RES FOUND OF STATE UNIV OF NEW YORK

Managing L3 VPN virtual routing tables

A method of managing virtual routing forwarding (VRF) tables at a provider edge PE router of a L3 virtual private network (VPN) is provided. An import route target (ImpRT) tree is maintained at the PE router, which keeps the association between all ImpRT attributes currently configured on said PE router and the virtual routing table VRF at that router. When an ImpRT attribute is configured on a VRF table, the PE router first searches the tree to identify a local VRF table that contains a route(s) with that ImpRT attribute. If this information is available locally, the VRF is updated by copying the route information, and there is no need to do a route refresh. When an ImpRT is deleted from a VRF, a route refresh is avoided by parsing all the routes in the VRF and removing the routes that no longer have a matching route target. In an alternative implementation, the local source is the master RIB (routing information base) which includes all routes in all VRFs at the router, and optionally even rejected routes that were filtered out using ImpRTs. In this variant, even routes associated with ImpRTs that are new to the router would be available to update the VRF without requiring a route refresh.
Owner:WSOU INVESTMENTS LLC

Techniques for Feed-Based Automatic Transmission of Content to a Mobile Terminal

For improving feed-based automatic distribution of content to a mobile terminal via a mobile network, a network component (150) comprises a network-side agent (160). The network-side agent (160) manages the feed-based automatic transmission of content to the mobile terminal and is configured to periodically generate a feed request to a feed server, to receive a requested feed from the feed server in response to the feed request, and to transmit the received feed to the mobile terminal. The network component (150) may also comprise a cache memory (164) for storing copies of feeds and contents and a proxy for processing feed requests and content requests received from the mobile terminal (110).
Owner:TELEFON AB LM ERICSSON (PUBL)

Display node for use in an audiovisual signal routing and distribution system

InactiveUS20060242669A1Exceeding bandwidthMinimize excessive use of bandwidthTelevision system detailsAnalogue secracy/subscription systemsSignal routingComputer network
An audiovisual signal is converted from a native format to a digital, packetized interchange format and transported between a capture node and a display node through a switch. The display node converts the audiovisual signal from the interchange format to a displayable format and causes display of the audiovisual signal. The use of a switch for video routing and distribution allows one-to-one, one-to-many, many-to-one, and many-to-many distribution. The use of a device-independent interchange format allows concurrent distribution of multiple heterogeneous audiovisual signals.
Owner:WOGSBERG ERIC

System and Method for Performing Error Correction at a Memory Device Level that is Transparent to a Memory Channel

A memory system is provided that performs error correction at a memory device level that is transparent to a memory channel. The memory system comprises a memory hub device integrated in the memory module and a set of memory devices coupled to the memory hub device. The memory hub device comprises first error correction logic provided in write logic integrated in the memory hub device. The memory hub device comprises second error correction logic provided in read logic integrated in the memory hub device. The first error correction logic and the second error correction logic performs error correction operations on data transferred between a link interface and the set of memory devices. The memory hub device transmits and receives data via a memory channel between the external memory controller and the link interface without any error correction code.
Owner:IBM CORP

Audiovisual signal routing and distribution system

An audiovisual signal is converted from a native format to a digital, packetized interchange format and transported between a capture node and a display node through a switch. The display node converts the audiovisual signal from the interchange format to a displayable format and causes display of the audiovisual signal. The use of a switch for video routing and distribution allows one-to-one, one-to-many, many-to-one, and many-to-many distribution. The use of a device-independent interchange format allows concurrent distribution of multiple heterogeneous audiovisual signals.
Owner:JUPITER SYST LLC +1

Data processing system providing hardware acceleration of input/output (I/O) communication

An integrated circuit, such as a processing unit, includes a substrate and integrated circuitry formed in the substrate. The integrated circuitry includes a processor core that executes instructions, an interconnect interface, coupled to the processor core, that supports communication between the processor core and a system interconnect external to the integrated circuit, and at least a portion of an external communication adapter, coupled to the processor core, that supports input / output communication via an input / output communication link.
Owner:IBM CORP

Method for supporting partial cache line read and write operations to a memory module to reduce read and write data traffic on a memory channel

A method is provided that supports partial cache line read and write operations to a memory module to reduce read and write data traffic on a memory channel. In a memory hub controller integrated in the memory module determines an amount of data to be transmitted to or from a set of memory devices of the memory module, in responsive to an access request. The memory hub controller generates a burst length field corresponding to the amount of data. The memory controller controls the amount of data that is transmitted to or from the memory devices using the burst length field. The amount of data is equal to or less than a standard data burst amount of data for the set of memory devices.
Owner:IBM CORP

Method for Performing Error Correction Operations in a Memory Hub Device of a Memory Module

A method is provided for performing error correction operations in a memory module. A memory hub device, which is integrated in the memory module, receives an access request for accessing a set of memory devices of the memory module coupled to the memory hub device. Data is transferred between a link interface of the memory hub device and the set of memory devices. Error correction logic, which is integrated in the memory hub device, performs one or more error correction operations on the data transferred between the link interface and the set of memory devices. The memory hub device transmits and receives data, via a memory channel between an external memory controller and the link interface, without any error correction code, thereby reducing an amount of bandwidth used on the memory channel.
Owner:IBM CORP

Prefix caching assisted quality of service aware peer-to-peer video on-demand

A multimedia-on-demand peer-to-peer device acting as a receiving peer includes a local cache memory device adapted to store a multimedia prefix. Local storage of the multimedia prefix allows rapid commencement of playback of the requested multimedia program without substantially loading the streaming capacity of an associated server device. The storage of multimedia prefixes in local cache memory of the receiving peer device can take place during periods of relatively low network loading so as to optimize network and server scheduling. Included is a method and apparatus for performing admission control in a peer-to-peer multimedia-on-demand system. The admission control system determines if there is sufficient system capacity to support a new request from a peer-to-peer device acting as a client in light of the presence of stored multimedia prefixes at the peer-to-peer device acting as a receiving peer device, among other factors.
Owner:THOMSON LICENSING SA

Method for authentication and key establishment in a mobile communication system and method of operating a mobile station and a visitor location register

The present invention relates to a method whereby the mobile station and a visitor location register create and share a ciphering key and an integrity key in order to directly authenticate each other. The communication method in a mobile communication system such as this includes registering the mobile station with the home location register; and having the mobile station and the visitor location register directly authenticate each other and mutually share a ciphering key and an integrity when the mobile station moves to the visitor location register.
Owner:IND ACADEMIC CORP FOUND YONSEI UNIV

Target and initiator mode configuration of tape drives for data transfer between source and destination tape drives

Systems and methods that substantially or fully remove a commanding server from a data path (e.g., as part of a data migration, disaster recovery, and / or the like) to improve data movement performance and make additional bandwidth available for other system processes and the like. Broadly, a network interface card (e.g., host bus adapter (HBA)) of a tape drive may be configured in both a target mode to allow the tape drive to be a recipient of control commands from a server to request and / or otherwise obtain data from one or more source tape drives, and in an initiator mode to allow the tape drive to send commands to the one or more tape drives specified in the commands received from the server to request / read data from and / or write data to such one or more tape drives.
Owner:ORACLE INT CORP

Function and memory mapping registry with reactive management events

A system for managing data content and data content relationships through resource efficient process structures for cloud and network environments includes a Clode core. The Clode core provides a means to create a resulting object / display / process based on a defined order of processes determined by the object's tags and / or relationships to a function map and / or other objects in the system. This is used in Clode tag modules such as ‘clode:autopublish’ to create a data publication on the server, by ‘clode:autosubscribe’ to make client's automatically subscribe to data related to the tagged object, and by ‘clode:surface’ to manage an object on a display; just to name a few use cases. Tags can then be used to manage third party environments such as a docker container that would be classified as having the tag ‘on’, but when removed could cause the container to shut off. Tag management functions could also change the classifications as to say in the previous example to cause a tag to be added called ‘off’.
Owner:OMEGA SUNRISE GRP SPENDTHRIFT TRUST

Storing multi-stream non-linear access patterns in a flash based file-system

InactiveUS9164676B2Improve performanceWithout consuming extra storage space and bandwidth overheadMemory architecture accessing/allocationInput/output to record carriersMemory addressFile system
Accesses to logical pages of memory are monitored. Each logical page corresponds to a logical memory address and the accesses defining an access pattern. The logical memory addresses are logged in ordered pairs of consecutive logical pages in the access pattern. Upon receipt of a request to write data to a given logical page, a given ordered pair of consecutive logical pages containing the logical memory address of the given logical page as a first logical memory address in the ordered pair of logical memory addresses associated with that consecutive pair is obtained. A first physical memory address mapping to the first logical memory address is identified, and a second logical memory address from that identified consecutive pair. A second physical memory address mapping to the second logical memory address is identified, and the data and the second physical memory address are written to the first physical memory address.
Owner:IBM CORP

Method for transmitting video surveillance images

A method of transmission by a surveillance device to a control room, via a telecommunications network, of a series of images, includes steps, implemented by the surveillance device, of acquisition of a series of images, of coding of the series of images acquired into a series of base video frames including a first quantity of information and into at least one series of enhancement video frames of the series of base video frames, the series of enhancement video frames including a second quantity of information making it possible to enhance the quality of the series of images coded into the series of base video frames, of transmission in real time via the telecommunications network of at least the series of base video frames to the control room, and of storage of at least the series of enhancement video frames.
Owner:AIRBUS DS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products