1
Isaac K Elliott, Steven P Higgins, Andrew John Dugan, Jon Peterson, Robert L Hernandez, Rick D Steele, Bruce W Baker, Rich Terpstra, Jonathan S Mitchell, Jin Gen Wang, Harold Stearns, Eric Zimmerer, Ray Waibel, Kraig Owen, Shawn M Lewis: Voice over data telecommunications network architecture. Level 3 Communications, Merchant & Gould P C, September 2, 2003: US06614781 (677 worldwide citation)

The present invention describes a system and method for communicating voice and data over a packet-switched network that is adapted to coexist and communicate with a legacy PSTN. The system permits packet switching of voice calls and data calls through a data network from and to any of a LEC, a cust ...


2
David A Farber, Richard E Greer, Andrew D Swart, James A Balter: Controlling subscriber information rates in a content delivery network. Level 3 Communications, May 24, 2011: US07949779 (184 worldwide citation)

A plurality of content providers provide multiple resources to multiple clients. At least some of said resources are to be served to clients from a shared content delivery network (CDN) formed by a plurality of repeater servers. Each content provider provides at least some resources via one or more ...


3
Paul E Stolorz, John K Salmon, Michael S Warren, Jeffrey G Koller, Aric Hagberg, Maksim Yevmenkin, Mark Brady, David Pfitzner, Ted Middleton: Configurable adaptive global traffic control and management. Level 3 Communications, Brian Siritzky, October 26, 2010: US07822871 (154 worldwide citation)

A framework for delivery of Internet content includes a subscriber server network; and at least one domain name server constructed and adapted to provide policy-based domain name service, wherein, in response to a request to resolve a hostname, the domain name server resolves the hostname to at leas ...


4
Heidi Picher Dempsey: Secure network architecture with quality of service. Level 3 Communications, Hensley Kim & Holzer, October 16, 2007: US07283561 (150 worldwide citation)

In a wide area network arrangement composed of some number of secure local networks and an Internet service provider (ISP) back-bone, LAN hosts are able to indirectly access network routers, through an ISP quality of service (QoS) module, to request that information transmitted during certain specif ...


5
Martin F Roesch, Ronald J Gula: Intrusion and misuse deterrence system employing a virtual network. Verizon Corporate Services Group, Level 3 Communications, BBN Technologies, July 3, 2007: US07240368 (136 worldwide citation)

A method and apparatus is disclosed for increasing the security of computer networks through the use of an Intrusion and Misuse Deterrence System (IMDS) operating on the network. The IMDS is a system that creates a synthetic network complete with synthetic hosts and routers. It is comprised of a net ...


6
David A Farber, Richard E Greer, Andrew D Swart, James A Balter: Controlling subscriber information rates in a content delivery network. Level 3 Communications, May 17, 2011: US07945693 (135 worldwide citation)

A plurality of content providers provide multiple resources to multiple clients. At least some of the resources are to be served to clients from a shared content delivery network (CDN) formed by a plurality of repeater servers. Each content provider provides at least some resources via one or more c ...


7
James Patrick Boyle, Steven Craig White, Joseph Cajetan Lawrence: Transfer of SONET traffic over a packet-switched network. Level 3 Communications, Faegre & Benson, December 14, 2004: US06831932 (132 worldwide citation)

Synchronous Optical NETwork (SONET) traffic is sent across a packet network. A SONET transmission is decoded into a data structure. The data structure is then converted into one or more packets and sent across the packet network.


8
David A Farber, Richard E Greer, Andrew D Swart, James A Balter: Optimized network resource location. Level 3 Communications, October 2, 2012: US08281035 (127 worldwide citation)

A method for delivering resources in a distributed computing environment, wherein at least a first resource and a second resource are associated with a content provider, and wherein the first resource references the second resource via a first uniform resource locator (URL), the first URL having a f ...


9
Mark Brady, Maksim Yevmenkin, Paul E Stolorz, John K Salmon, Michael S Warren, Jeffrey Koller, Aric Hagberg, David Pfitzner, Ted Middleton: Policy-based content delivery network selection. Level 3 Communications, Davidson Berquist Jackson & Gowdy, Brian Siritzky, December 28, 2010: US07860964 (111 worldwide citation)

In a framework wherein resources of a content provider may be delivered to clients from different domains, a method distributes the requests based on content-provider policies. In some cases, the domains include at least two distinct content delivery network (CDN) domains. The domains may include a ...


10
Shawn M Lewis: System and method for bypassing data from egress facilities. Level 3 Communications, Sterne Kessler Goldstein & Fox P L L C, August 27, 2002: US06442169 (100 worldwide citation)

An open architecture platform bypasses data from the facilities of a telecommunications carrier, e.g. an incumbent local exchange carrier, by distinguishing between voice and data traffic, and handling voice and data traffic separately. An SS7 gateway receives and transmits SS7 signaling messages wi ...