Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Similar
Filing Names

Ixia
Ixia_20131212

Ixia patents


Recent patent applications related to Ixia. Ixia is listed as an Agent/Assignee. Note: Ixia may have other listings under different names/spellings. We're not affiliated with Ixia, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | Ixia-related inventors


 new patent  Antenna arrays for testing wireless devices

A test system includes a radio frequency (RF) shielded chamber and an antenna array in the RF shielded chamber. The antenna array includes groups of antenna elements and power combiners. Each group of antenna elements is matched to a matching group of antenna elements by virtue of being coupled to... Ixia

Network tap with battery-assisted and programmable failover

A network tap with battery assisted and programmable failover is disclosed. The network tap includes a processing element, at least one optical-electrical transceiver, and at least one multiplexer/demultiplexer module. A backup battery provides power to the optical-electrical transceiver(s) and the multiplexer/demultiplexer module(s) but not the processing element when operating in... Ixia

Methods, systems, and computer readable media for network test configuration using virtual local area network (vlan) scanning

Methods, systems, and computer readable media for network test configuration using VLAN scanning are disclosed. One method for network test configuration using VLAN scanning occurs at a first port of a network equipment test device. The method includes sending a plurality of address resolution protocol (ARP) requests to a system... Ixia

Methods, systems and computer readable media for testing network devices using variable traffic burst profiles

A method for testing a network device using a variable traffic burst profile includes providing for user selection of at least one type of simulated traffic to be transmitted to a network device under test (DUT). The method further includes receiving user input regarding selection of the type of simulated... Ixia

Methods, systems, and computer readable media for providing high availability support at a bypass switch

Methods, systems, and computer readable media for providing high availability support at a bypass switch are disclosed. One method occurs at a bypass switch. The method includes determining that an inline tool associated with a bypass switch is unavailable. The method also includes determining whether the inline tool is required... Ixia

Distributed online wireless security test system

Systems and methods are disclosed herein to provide improved online security testing of security devices and networks, including but not limited to networks containing wireless access points. In accordance with one or more embodiments and aspects thereof, a distributed online test system is disclosed that combines an online test manager... Ixia

Network packet forwarding systems and methods to push packet pre-processing tasks to network tap devices

Network packet forwarding systems and methods are disclosed to push pre-processing tasks to network tap devices. In certain embodiments, packet flows from multiple monitoring points within a packet network communication system are monitored by a plurality of network tap devices to generate tapped packet flows associated with monitored network traffic... Ixia

Concurrent security processing of network packets by multiple in-line network security tools

Systems and methods provide concurrent security processing for multiple network security tools. An input packet is received at a network packet forwarding system from a network packet source, and the network packet forwarding system concurrently sends an output packet based upon the input packet to multiple security tools. Return packets... Ixia

Latency-based timeouts for concurrent security processing of network packets by multiple in-line network security tools

Latency-based timeouts are used for concurrent security processing by multiple in-line network security tools. A network system forwards secure network packets to the tools and uses latency-based timeouts with respect to the return of processed packets from the tools. Initially, the network system measures processing latencies for the tools and... Ixia

Methods, systems and computer readable media for simulating per user equipment (ue) slow and fast signal fading for testing air interface devices

A network equipment test device includes per-UE uplink signal generation processing chains for generating per-UE time domain uplink signals. Per-UE signal faders simulate per-UE signal fading for the per-UE time domain uplink signals. Different phases and amplitudes are used over time to simulate different signal fading. Fourier transformation units perform... Ixia

Methods, systems, and computer readable media for emulating network traffic patterns on a virtual machine

Methods, systems, and computer readable media for emulating network traffic patterns on a virtual machine are disclosed. In one example, the method includes generating a user specification based on a plurality of network traffic patterns and computer processing usage patterns and receiving, at a virtual machine hosted by a DUT,... Ixia

Methods, systems, and computer readable media for testing network equipment devices using connection-oriented protocols

The subject matter described herein relates to methods, systems, and computer readable media for testing network equipment devices using connection-oriented protocols. In some examples, a method for testing a network equipment device under test (DUT) includes executing, by a network equipment test device, a test script to test the network... Ixia

Methods, systems, and computer readable media for providing an anticipated data integrity check

Methods, systems, and computer readable media for providing an anticipated data integrity check are disclosed. According to one method, the method includes generating a test message including an anticipated data integrity check value (ADICV), wherein the ADICV is computed using at least one value based on at least one expected... Ixia

Methods, systems, and computer readable media for testing network equipment devices using connectionless protocols

The subject matter described herein relates to methods, systems, and computer readable media for testing network equipment devices using connectionless protocols. In some examples, a method for testing a network equipment device under test (DUT) includes transmitting a first message using a connectionless protocol for a network flow to the... Ixia

Wireless communication test system arrangement

Systems and methods are disclosed herein to provide improved data communication test systems for the testing of wireless data communication devices and systems. A flexible arrangement of physical layer interfaces, hardware traffic generator/analyzers and software traffic generator/analyzers is disclosed that partitions the data communication test system into interfacing and processing... Ixia

Methods, systems, and computer readable media for management of passive network taps using radio frequency identification (rfid)

According to one system, the system includes a chassis defining an enclosure and containing one or more slots. The system further includes a radio frequency identification (RFID) reader module comprising at least one processor and one or more RFID readers located within the enclosure, wherein the one or more RFID... Ixia

Methods, systems, and computer readable media for adaptively calibrating test systems for different interconnects

The subject matter described herein relates to methods, systems, and computer readable media for adaptive calibration of test systems to interconnects. In some examples, a control circuit performs a method for adaptive calibration including determining, for each configurable calibration parameter of a number of configurable calibration parameters for a receiver... Ixia

Methods, systems, and computer readable media for distributing monitored network traffic

The subject matter described herein relates to methods, systems, and computer readable media for test system connection resiliency. In some examples, a method for distributing monitored network traffic includes monitoring S1-MME traffic and S6a traffic in a core network of a telecommunications network. The method includes decrypting encrypted S1-MME traffic... Ixia

Tcp connections resiliency system for testing networks in unstable environments

The subject matter described herein relates to methods, systems, and computer readable media for test system connection resiliency. In some examples, a method for testing a network device under test (DUT) includes exchanging a sequence of data packages over a transmission control protocol (TCP) connection between a client and a... Ixia

Systems and methods for channel state information exchange

Systems and methods are disclosed herein to provide improved channel estimation and channel state information (CSI) transfer in a wireless data communication system, including but not limited to Multiple Input Multiple Output (MIMO) communication systems. In accordance with one or more embodiments and aspects thereof, a channel estimation and CSI... Ixia

Methods, systems, and computer readable media for assessing attack vulnerability of radio access network equipment

The subject matter described herein relates to methods, systems, and computer readable media for assessing attack vulnerability of radio access network equipment. One method for assessing the attack vulnerability of a radio access network device includes emulating at least one good UE. The method further includes emulating at least one... Ixia

Methods, systems, and computer readable media for network diagnostics

Methods, systems, and computer readable media for network diagnostics are disclosed. According to one method, the method occurs at a diagnostics controller implemented using at least one processor. The method includes configuring a plurality of diagnostics nodes to observe traffic behavior associated with a system under test (SUT). The method... Ixia

Methods, systems, and computer readable media for reducing the size of a cryptographic key in a test simulation environment

Methods, systems, and computer readable media for reducing the size of a cryptographic key in a test simulation environment are disclosed. In one example, a method includes determining a minimum key size value and maximum key size value for a private cryptographic key for each of a plurality of key... Ixia

Systems and methods to recreate real world application level test packets for network testing

Systems and methods are disclosed to recreate real world application level test packets for network testing. Live network traffic is monitored within a live network infrastructure, and live traffic meta-data is then collected for this live traffic. Application level meta-data is then extracted from the live traffic meta-data and stored... Ixia

Methods, systems, and computer readable media for packet monitoring in a virtual environment

Methods, systems, and computer readable media for packet monitoring in a virtual environment are disclosed. According to one method, the method occurs at a virtual tap controller implemented using at least one processor. The method includes sending, to a virtual tap in a virtual environment implemented using at least one... Ixia

Methods, systems, and computer readable media for testing network function virtualization (nfv)

Methods, systems, and computer readable media for testing network function virtualization (NFV) are disclosed. According to one method, the method occurs at a network test controller implemented using at least one processor. The method includes determining, using network configuration information, a first insertion point for inserting a first network function... Ixia

Trigger information exchange between wireless systems

Systems and methods are disclosed herein to provide efficient support for the exchange of trigger information between wireless data communication devices and systems, including Multi-User Multiple Input Multiple Output (MU-MIMO) devices and systems that may utilize Orthogonal Frequency Division Multiple Access (OFDMA). In accordance with one or more embodiments, a... Ixia

On demand packet traffic monitoring for network packet communications within virtual processing environments

Systems and methods are disclosed to provide on demand packet traffic monitoring for packet communications within virtual packet processing environments. Virtual TAPs (test access ports) within virtualization layers for VM (virtual machine) host hardware systems are controlled by external controllers to configure watch filters for VM platforms operating within the... Ixia

Methods, systems, and computer readable media for providing traffic generation or forwarding device that compensates for skew between electrical lanes in a manner that allows coherent detection of transmitted data

A method for transmitting and coherently detecting data transmitted over electrical lanes that experience different amounts of skew includes, at a traffic generation or forwarding device, self calibrating transmit and receive-side components of the traffic generation or forwarding device to account for skew between electrical lanes and setting per-electrical lane... Ixia

Direct network traffic monitoring within vm platforms in virtual processing environments

Systems and methods are disclosed that provide direct network traffic monitoring within virtual machine (VM) platforms operating in virtual processing environments. The disclosed embodiments in part provide direct network packet monitoring through client packet monitor applications that run within client VM platforms to obtain packet traffic and to forward this... Ixia

Network traffic pre-classification within vm platforms in virtual processing environments

Methods and systems are disclosed that pre-classify network traffic monitored within virtual machine (VM) platforms. Client packet monitor applications operate within client VM platforms to monitor network packets, generate monitored packets representing traffic of interest, determine packet classifications for the monitored packets based upon packet contents, identify tags associated with... Ixia

Egress port overload protection for network packet forwarding systems

Systems and methods are disclosed to provide egress port overload protection for network packet forwarding systems. Input packets are received at one or more ingress ports and load balanced among a plurality of egress ports for the packet forwarding system. Load balanced packets associated with each egress port are then... Ixia

Parallel match processing of network packets to identify packet data for masking or other actions

Systems and methods are disclosed for parallel match processing of network packets to identify data for masking or other actions. In part, the disclosed embodiments receive packets and identify packet data, such as sensitive data, by rapid parallel matching of packet data being communicated in multi-byte wide data paths to... Ixia

Methods, systems, and computer readable media for detecting physical link intrusions

The subject matter described herein relates to method, systems, and computer readable media for detecting physical link intrusions. A method for detecting physical link intrusions includes monitoring a link delay signature associated with a physical link based on one-way link delay measurements obtained using at least one network tap. The... Ixia

Methods, systems, and computer readable media for vendor-neutral testing and scoring of systems under test

The subject matter described herein relates to vendor-neutral testing and scoring of a system under test. One method for vendor-neutral scoring of a system under test includes generating a pre-testing snapshot of a system under test. The method further includes executing vendor-neutral testing of plural different subsystems of the system... Ixia

02/16/17 / #20170048116

Method and systems to reduce filter engine rules for network packet forwarding systems

Methods and systems to reduce filter engine rules for network packet forwarding systems are disclosed. In part, the disclosed embodiments process packet filters to identify certain properties which, if present, allow for techniques to be applied to avoid generating rules that do not contribute to the real-time operation of the... Ixia

02/09/17 / #20170041126

Modeling a clock

Methods, systems, and computer readable media for modeling a clock are disclosed. According to one exemplary method, the method occurs at a monitoring module associated with a first node. The method includes receiving packets from a second node, extracting timestamps from at least two of the packets, and generating, using... Ixia

02/09/17 / #20170041199

Methods and apparatuses for validating network packet brokers

A method for validating a network packet broker is disclosed. The method includes configuring in software at least one of a on filter and a load balancer, processing a packet capture file containing data packets using the at least one filter and the load balancer such that data packets processed... Ixia

01/26/17 / #20170026227

Methods and systems for switching network traffic in a communications network

A switching system includes memory and a switching circuit. The memory stores a port priority table and a trigger source and condition table. The switching circuit for switches network traffic between a number of ports based on the port priority table, the trigger source and condition table, and port health... Ixia








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Ixia in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Ixia with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###