-
公开(公告)号:US11451468B2
公开(公告)日:2022-09-20
申请号:US17160508
申请日:2021-01-28
Applicant: Cisco Technology, Inc.
Inventor: Mankamana Prasad Mishra , Rajiv Asati , IJsbrand Wijnands , Stephane Litkowski , Nitin Kumar
Abstract: A method is performed at a router configured to perform Bit Index Explicit Replication (BIER) for forwarding of multicast packets in a network. The method includes, upon receiving a multicast packet of a multicast flow, accessing flow mappings in which multicast flows are mapped to fixed accounting values corresponding to the multicast flows. The method further comprises generating a BIER header for the multicast packet by encoding a multi-segment entropy field of the BIER header with (i) a variable entropy value for equal-cost multi-path (ECMP) load balancing, and (ii) a fixed accounting value among the fixed accounting values that is mapped to the multicast flow in the flow mappings. The method also includes encapsulating the multicast packet with the BIER header to produce an encapsulated multicast packet, and forwarding the encapsulated multicast packet.
-
公开(公告)号:US20220222102A1
公开(公告)日:2022-07-14
申请号:US17521381
申请日:2021-11-08
Applicant: Cisco Technology, Inc.
Inventor: Santanu Dasgupta , Chandragupta Ganguly , Ian Wells , Rajiv Asati , Om Prakash Suthar , Vinod Pandarinathan , Ajay Kalambur , Yichen Wang , John Wei-I Wu
IPC: G06F9/455 , H04W76/10 , H04L41/046 , H04L41/04 , H04W28/00
Abstract: A system is provided that includes one management cluster to manage network function virtualization infrastructure (NFVI) resources lifecycle in more than one edge POD locations, where resources include hardware and/or software, and where software resources lifecycle includes software development, upgrades, downgrades, logging, monitoring etc. Methods are provided for decoupling storage from compute and network functions in each virtual machine (VM)-based NFVI deployment location and moving it to a centralized location. Centralized storage could simultaneously interact with more than one edge PODs, and the security is built-in with periodic key rotation. Methods are provided for increasing NFVI system viability by dedicating (fencing) CPU core pairs for specific controller operations and workload operations, and sharing the CPU cores for specific tasks.
-
113.
公开(公告)号:US11368353B2
公开(公告)日:2022-06-21
申请号:US16172754
申请日:2018-10-27
Applicant: Cisco Technology, Inc.
Inventor: Anil Bhikuayya Jangam , Om Prakash Suthar , Rajiv Asati
IPC: G06F16/00 , H04L41/02 , H04L41/0893 , G06F16/28 , G06F16/2455
Abstract: Techniques for policy management and enforcement using semantic data modeling are provided. A first declarative policy is received at a network node from a controller. A first semantic data query protocol (SDQP) transaction is generated by retrieving a first semantic data model associated with the network node, where the first semantic data model describes a configuration domain of the network node, and parsing the first declarative policy based on the first semantic data model to generate the first SDQP transaction. The first declarative policy is then implemented by executing the first SDQP transaction against a semantic database.
-
114.
公开(公告)号:US11258656B2
公开(公告)日:2022-02-22
申请号:US16278787
申请日:2019-02-19
Applicant: Cisco Technology, Inc.
Inventor: Raghavendra Suryanarayanarao , Om Prakash Suthar , Aeneas Sean Dodd-Noble , Vivek Agarwal , Rajiv Asati , Carlos M. Pignataro
IPC: H04L12/24 , H04W76/10 , H04L12/803 , H04W72/10 , H04W88/08 , H04W88/16 , H04L41/0668 , H04L47/125 , H04L41/0893
Abstract: Techniques are presented in which a new information element signaling priority of a management entity is included in a setup (e.g., S1-Setup) response or configuration update message sent by a management entity to a base station entity. The base station entity interprets this priority information along with the relative capacity information in an appropriate way to load-distribute the traffic/calls to highly preferable management entity instances (at a local site) when they are available, and switchover/failover to lower preference management entity instances (at a remote site) when there is a local site outage/failure or insufficient capacity in a geo-resilient pooled network.
-
公开(公告)号:US11122491B2
公开(公告)日:2021-09-14
申请号:US16561634
申请日:2019-09-05
Applicant: Cisco Technology, Inc.
Inventor: Carlos M. Pignataro , Om Prakash Suthar , Nagendra Kumar Nainar , Rajiv Asati
IPC: H04W40/12 , H04L12/26 , H04L12/721 , H04L12/707 , H04L12/841 , H04W24/08 , H04W40/28 , H04L12/833 , H04L12/801 , H04L12/803 , H04W40/24
Abstract: Techniques are provided that leverage inband metadata techniques for use in a mobile core network in order to create relevant third generation 3rd Generation Partnership Project (3GPP) control plane interfaces between virtual control plane and virtual user plane elements that can be used to instruct the virtual entities to perform various functions, collect telemetry and other data from the virtual entities and signal maintenance messages between control plane and user plane entities. One control plane interface can be used to perform holistic performance analysis functionalities and identify the better performing path and accordingly use primary path and warm paths for control plane exchanges.
-
公开(公告)号:US20210226944A1
公开(公告)日:2021-07-22
申请号:US16749182
申请日:2020-01-22
Applicant: Cisco Technology, Inc.
Inventor: Frank Michaud , Alan Robert Lynn , Carlos M. Pignataro , Rajiv Asati
IPC: H04L29/06
Abstract: The present technology pertains to a system that authenticates the identity of a user trying to access a service. The system comprises an authentication provider configured to communicate authentication requirements to a continuous multifactor authentication device and the continuous multifactor authentication device configured to receive authentication requirements, to fuse multiple identification factors into an identification credential for a user according to the authentication requirements, and to send the authentication credential to the authentication provider. After receiving the identification credential meeting the authentication requirements, the authentication provider is configured to instruct a service provider to initiate a session.
-
117.
公开(公告)号:US10944646B2
公开(公告)日:2021-03-09
申请号:US16172757
申请日:2018-10-27
Applicant: Cisco Technology, Inc.
Inventor: Anil Bhikuayya Jangam , Om Prakash Suthar , Rajiv Asati
IPC: G06F15/177 , H04L12/24 , H04L9/06 , H04L12/715 , H04L12/66 , G06Q20/38 , G06F16/27
Abstract: The disclosure provides a secure and scalable approach for (a) exchanging, between a first network and a second network, provisioning requirements of a user device, (b) executing a smart contract that includes the provisioning requirements, and (c) connecting the user device to one of the networks. The method comprises connecting the user device to a first network, and connecting the first and second networks through a scalable blockchain network. The method further comprises sending a smart contract, by the first network to the second network, through the blockchain network. The second network either accepts or rejects the contract. If the second network accepts, then the user device connects to the second network and the second network provides network services to the user device. The provided network services comply with the conditions or parameters of the smart contract.
-
公开(公告)号:US10904149B2
公开(公告)日:2021-01-26
申请号:US16555149
申请日:2019-08-29
Applicant: Cisco Technology, Inc.
Inventor: Carlos M. Pignataro , Nagendra Kumar Nainar , Rajiv Asati , K. Tirumaleswar Reddy
IPC: H04L12/24 , H04L12/707 , H04L12/801 , H04L12/911 , H04L29/06 , H04L12/26
Abstract: In one embodiment, a device in a network receives in-situ operations administration and management (iOAM) data regarding a plurality of traffic flows in the network. The iOAM data comprises entropy values for the plurality of traffic flows. The device receives network topology information indicative of network paths available in the network. The device generates a machine learning-based entropy topology model for the network based on the received iOAM data and the received network topology information. The entropy topology model maps path selection predictions for the network paths with entropy values. The device uses the entropy topology model to cause a particular traffic flow to use a particular network path.
-
公开(公告)号:US20200153927A1
公开(公告)日:2020-05-14
申请号:US16184220
申请日:2018-11-08
Applicant: Cisco Technology, Inc.
Inventor: Rajiv Asati , Humberto Jose La Roche , Eric C. Friedrich
Abstract: A method is performed at a mobile core, including assigning a first cache servicing a client device in response to a first request for a media content item based at least in part on a first IP address of the client device associated with a first edge location. The method further includes providing a first portion of the media content item from the first cache. The method additionally includes triggering a plurality of caches at edge locations proximate to the first edge location to retrieve a second portion of the media content item. The method also includes receiving a continuation request from the client device with a second IP address associated with a second edge location. The method further includes selecting a second cache from the plurality of caches based at least in part on the second IP address and continuing providing the media content item from the second cache.
-
公开(公告)号:US10536324B2
公开(公告)日:2020-01-14
申请号:US15993050
申请日:2018-05-30
Applicant: Cisco Technology, Inc.
Inventor: Ijsbrand Wijnands , Gregory J. Shepherd , Christian J. Martin , Rajiv Asati
IPC: H04L12/18 , H04L12/24 , H04L12/761 , H04L12/707 , H04L12/703 , H04L12/741
Abstract: Methods, devices and program instructions are disclosed for performing bit indexed explicit replication (BIER) including fast reroute capability. One embodiment of a method includes receiving, from an egress node of a BIER network, an advertisement at a forwarding node, where the advertisement identifies a mapping of the egress node to a bit position of a packet bit string to be carried by a packet through the network. The embodiment further includes generating or updating a primary entry for the egress node in a bit indexed routing table (BIRT) for the forwarding node, and determining whether a backup entry for the egress node is to be included in the BIRT. In response to a determination that a backup entry is to be included, the embodiment further includes generating or updating the backup entry in the BIRT.
-
-
-
-
-
-
-
-
-