-
公开(公告)号:US20250062994A1
公开(公告)日:2025-02-20
申请号:US18388351
申请日:2023-11-09
Applicant: Cisco Technology, Inc.
Inventor: Laxmikantha Reddy Ponnuru , Arul Murugan Manickam , Sanjay Sreenath , Hongbo Xia , Yajun Chen
IPC: H04L47/2408 , H04L41/5009 , H04L47/11
Abstract: Techniques described herein can perform per-queue network performance measurement mapping, in which per-queue network performance measurements are determined and then mapped back to service level agreement (SLA) classes assigned to use the queues. Network traffic associated with an SLA class can be processed through an assigned router queue. Wide area network (WAN) as well as local performance measurements from the assigned queue can be combined to determine a combined performance measurement associated with the assigned queue. The combined performance measurement can then be mapped or otherwise associated with the SLA class. Similarly, combined performance measurements can be determined for other router queues and mapped or otherwise associated with other SLA classes.
-
102.
公开(公告)号:US20250062986A1
公开(公告)日:2025-02-20
申请号:US18386203
申请日:2023-11-01
Applicant: Cisco Technology, Inc.
Inventor: Syed Arslan Ahmed , Raj Venkatesan , Ashish Sood , Balaji Sundararajan , Mahalakshmi Rajaram , Yogesh Mittal , Ankur Bhargava
IPC: H04L45/302 , H04L45/00 , H04L45/02
Abstract: This disclosure describes techniques for improving routing policy awareness in a network. The method includes detecting, by a controller, an application initiated for use at an edge node of a network. Then, generating, by an analytics engine coupled to the controller, analytical data of traffic flow at the edge node of the network wherein the traffic flow is in accordance with a routing policy for routing traffic associated with the application. Further, routing of the traffic through a path from one or more paths configured at the edge node that is in accordance with at least a Service Level Agreement (SLA) for traffic flow. Also, in response to an SLA violation during routing of the traffic, causing an action, by the controller, of routing traffic flow through another path that is in accordance with at least the SLA for traffic flow based on analytical data received of the traffic flow.
-
公开(公告)号:US20250062984A1
公开(公告)日:2025-02-20
申请号:US18934224
申请日:2024-10-31
Applicant: Cisco Technology, Inc.
Inventor: Clarence Filsfils , Ahmed Mohamed Ahmed Abdelsalam , Rakesh Gandhi , Jisu Bhattacharya , Pablo Camarillo Garvia
Abstract: This disclosure describes techniques for detecting and monitoring paths in a network. The techniques include causing a source node to generate probe packets to traverse a multi-protocol label switching (MPLS) network, for instance. In some examples, the probe packets include entropy values that correspond to individual equal-cost multi-path (ECMP) paths of the network. The probe packets may be received at an SDN controller from a sink node after traversing the network. Analysis of the probe packets allow path discovery and mapping of the entropy values to ECMP paths. The mapping of discovered paths may be used for optimization of network monitoring activities, including second subsequent probe packets over particular ECMP paths based on the mapped entropy values.
-
公开(公告)号:US20250062853A1
公开(公告)日:2025-02-20
申请号:US18452435
申请日:2023-08-18
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Pascal Thubert , JP Vasseur , Indermeet Gandhi , Robert Barton
Abstract: Described herein are devices, systems, methods, and processes for improving retransmissions in wireless communication networks by distinguishing between temporal interference and longer-term radio frequency (RF) condition issues. The fact that the access point (AP) does not usually move may be leveraged, and a machine learning process can be utilized to learn and adapt to the RF conditions in the cell. The AP records various parameters for each frame received from client devices and uses this data to build a pairwise temporal matrix. Machine learning models are trained using these parameters, enabling the AP to compute the likely efficient set of modulation and coding schemes (MCSs) at each static position and along moving positions. The AP can then adapt its MCS accordingly for the downlink traffic and provide the client device with recommended MCSs for upcoming uplink transmissions. Accordingly, the retry count at the client devices can be reduced.
-
公开(公告)号:US12231444B2
公开(公告)日:2025-02-18
申请号:US18415423
申请日:2024-01-17
Applicant: Cisco Technology, Inc.
Inventor: Balaji Sundararajan , Gaurang Rajeev Mokashi , Preety Mordani , Vivek Agarwal
Abstract: Systems, methods, and computer-readable media for performing threat remediation through a switch fabric of a virtualized network environment. Data traffic passing into a virtualized network environment including a plurality of virtual machines running on a switch fabric is monitored. A network threat introduced through at a least a portion of the data traffic is identified at the switch fabric. One or more remedial measures are performed in the network environment based on the identification of the network threat in the virtualized network environment.
-
公开(公告)号:US12231312B2
公开(公告)日:2025-02-18
申请号:US17328205
申请日:2021-05-24
Applicant: Cisco Technology, Inc.
Inventor: Jean-Philippe Vasseur , Vinay Kumar Kolar , Grégory Mermoud , Pierre-André Savalle
IPC: H04L43/045 , G06F16/901 , H04L43/08 , H04L43/12 , H04L69/326
Abstract: In one embodiment, a supervisory service for a network obtains quality of experience metrics for application sessions of an online application. The supervisory service maps the application sessions to paths that traverse a plurality of autonomous systems. The supervisory service identifies, based in part on the quality of experience metrics, a particular autonomous system from the plurality of autonomous systems associated with a decreased quality of experience for the online application. The supervisory service causes application traffic for the online application to avoid the particular autonomous system.
-
公开(公告)号:US12229575B2
公开(公告)日:2025-02-18
申请号:US17166145
申请日:2021-02-03
Applicant: Cisco Technology, Inc.
Inventor: Alan Robert Lynn
IPC: G06F9/455
Abstract: The present disclosure is directed to systems and methods for container security using a hopping mechanism. Methods include the steps of selecting a first virtual container associated with one or more software processes; replicating the first virtual container to create a plurality of replicated virtual containers, each of the plurality of replicated virtual containers a duplicate of the first virtual container, and the plurality of replicated virtual containers configured to run synchronously; generating a randomized hopping set that defines a set of replicated virtual containers from the plurality of replicated virtual containers, the randomized hopping set establishing a sequence of the set of replicated virtual containers in which to run the one or more software processes; and running the one or more software processes across the set of replicated virtual containers based on the sequence of the randomized hopping set.
-
公开(公告)号:US20250056711A1
公开(公告)日:2025-02-13
申请号:US18447406
申请日:2023-08-10
Applicant: Cisco Technology, Inc.
Inventor: D. Brice Achkir , Hanqin Ye , Michael J. Umina
Abstract: In some aspects, the techniques described herein relate to an apparatus including: a printed circuit board connector structure, comprising: an outer ground defining a receiving area; and a pair of traces located in the receiving area, the pair of traces collectively having a first side, a second side, a third side, and a fourth side, wherein the outer ground extends around each of the first side, the second side, and the third side of the pair of traces.
-
公开(公告)号:US20250055854A1
公开(公告)日:2025-02-13
申请号:US18366924
申请日:2023-08-08
Applicant: Cisco Technology, Inc.
Inventor: Andre Jean Marie Surcouf , Trevor Adam Whinmill , Benjamin William Ryder , Pablo Garcia del Valle
IPC: H04L9/40
Abstract: In one embodiment, a method may access a first description of a plurality of edge applications and a cluster level security policy on an edge site of an Internet of Things (IoT) network. The method may receive a second description of a storage related operation associated with an edge application to be deployed on the edge site. The method may determine a permission level for the storage related operation based on the first and second descriptions. The method may determine, using the cluster level security policy and the permission level, an updated cluster level security policy. In response to determining the permission level is privileged, the method may perform, using a first secure agent, an edge cluster, and the updated clustered level security policy, the storage related operation associated with the edge application on the edge site of the IoT network.
-
公开(公告)号:US20250055753A1
公开(公告)日:2025-02-13
申请号:US18732182
申请日:2024-06-03
Applicant: Cisco Technology, Inc.
Inventor: Pablo Garcia del Valle , Frank Brockners , Tal Maoz , Benjamin William Ryder , Aviad Rom
IPC: H04L41/0816 , H04L41/0894
Abstract: A method for providing a symbiotic network orchestrator utilized to automatically commission edge computing devices on corporate computing networks and edge site computing networks is presented. The method includes receiving an indication of a potential connection of an edge computing device to one or more computing networks associated with the orchestrator. The one or more computing networks includes a corporate computing network and an edge site computing network. The method further includes determining, based on the corporate computing network, the edge site computing network, and a predetermined set of rules, an intent for commissioning the edge computing device, reconfiguring, based on the intent, the corporate computing network and the edge site computing network, and commissioning the edge computing device on one or more of the corporate computing network or the edge site computing network in accordance with the reconfiguring.
-
-
-
-
-
-
-
-
-