-
公开(公告)号:US11828832B2
公开(公告)日:2023-11-28
申请号:US17123904
申请日:2020-12-16
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert Edgar Barton , Matthew Aaron Silverman
CPC classification number: G01S13/0209 , G01S5/145 , G01S13/765 , H04W64/003 , H04W76/11 , H04W76/15
Abstract: Presented herein are infrastructure triggering techniques for secure Ultra-Wideband (UWB) ranging. In one example, a method may include providing UWB ranging parameters to a mobile device via a first radio communication, wherein the first radio communication is a non-UWB radio communication; and triggering the mobile device to perform UWB ranging with a UWB anchor, wherein the triggering is performed using a second radio communication. In another example, a method may include, obtaining, by a mobile device, UWB ranging parameters for a geographic area; obtaining a UWB ranging instruction for the geographic area; and performing UWB ranging with a target UWB anchor based on the UWB ranging parameters and the UWB ranging instruction.
-
142.
公开(公告)号:US20230353534A1
公开(公告)日:2023-11-02
申请号:US17731652
申请日:2022-04-28
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Jerome Henry , Stephen Michael Orr
IPC: H04L61/5076 , H04L61/5007 , H04L61/5061
CPC classification number: H04L61/5076 , H04L61/5007 , H04L61/5061
Abstract: A method is provided that is performed for a wireless network that includes one or more wireless client devices that may rotate their media access control (MAC) address used for wireless communication with one or more wireless access point devices in the wireless network. The method includes determining an impact of MAC address rotation by the one or more wireless client devices on operational resources of one or more networking devices or networking processes in a network infrastructure associated with the wireless network. The method further includes scheduling MAC address rotation by the one or more wireless client devices according to the impact on operational resources of the one or more networking devices or networking processes in the network infrastructure.
-
公开(公告)号:US20230236899A1
公开(公告)日:2023-07-27
申请号:US17582333
申请日:2022-01-24
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Jerome Henry , Indermeet Singh Gandhi , Thomas Szigeti
CPC classification number: G06F9/505 , G06F11/3433
Abstract: This disclosure describes dynamically placing workloads using cloud service energy efficiency. The techniques include obtaining energy efficiency metrics (EEMs) that indicate the carbon footprint for different data centers of cloud service providers. In some configurations, an Energy Efficiency Quotient (EEQ) may be generated by an Energy Telemetry Engine (ETE) that indicates the energy efficiency for each data center/Point of Presence (POP) where a workload may be migrated/hosted. The ETE can be used to rank the different host locations (e.g., different data according to their EEQ. In some examples, one or more other metrics (e.g., latency, bandwidth, . . . ) may be used to identify any POPs that do not meet specified conditions (e.g., latency constraints, bandwidth constraints, . . . ). When a suitable host location is determined (e.g. a POP meets both the performance and EEQ specifications), the workload may be placed onto one or more resources of the selected data center.
-
公开(公告)号:US11558779B2
公开(公告)日:2023-01-17
申请号:US17684263
申请日:2022-03-01
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Russell Paul Gyurek , Jerome Henry
IPC: H04L12/723 , H04W28/06 , H04L45/50 , H04W40/02
Abstract: Systems, methods, and computer-readable media for the secure creation of application containers for 5G slices. A MEC application in a MEC layer of a 5G network can be associated with a specific network slice of the 5G network. A backhaul routing policy for the MEC application can be defined based on the association of the MEC application with the specific network slice of the 5G network. Further, a SID for the MEC application that associates the MEC application with a segment routing tunnel through a backhaul of the 5G network can be generated. A MEC layer access policy for the MEC application can be defined based on the SID for the MEC application. As follows, access to the MEC application through the 5G network can be controlled based on both the backhaul routing policy for the MEC application and the MEC layer access policy for the application.
-
公开(公告)号:US11556384B2
公开(公告)日:2023-01-17
申请号:US16818955
申请日:2020-03-13
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert Edgar Barton
Abstract: This disclosure describes techniques for improving allocation of computing resources to computation of machine learning tasks, including on massive computing systems hosting machine learning models. A method includes a computing system, based on a computational metric trend and/or a predicted computational metric of a past task model, allocating a computing resource for computing of a machine learning task by a current task model prior to runtime of the current task model; computing the machine learning task by executing a copy of the current task model; quantifying a computational metric of the copy of the current task model; determining a computational metric trend based on the computational metric; deriving a predicted computational metric of the copy of the current task model based on the computational metric; and, based on the computational metric trend, changing allocation of a computing resource for computing of the machine learning task by the current task model.
-
146.
公开(公告)号:US11503452B2
公开(公告)日:2022-11-15
申请号:US17110036
申请日:2020-12-02
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Malcolm Muir Smith , Vishal Satyendra Desai , Robert Edgar Barton
Abstract: A method performed by a system which manages station transition from a Wi-Fi access point includes sending, based on the station roaming to an edge-of-domain access point, a request to neighboring access points to the edge-of-domain access point for neighbor reports. The method includes receiving a cellular signal value from the station, comparing a first signal grade associated with the edge-of-domain access point to a second signal grade associated with the cellular signal value to yield a comparison and generating a link usability rating associated with a link between the station and the edge-of-domain access point. Based at least in part on the comparison and the link usability rating, the method includes transmitting a message to the station suggesting that the station roam from the edge-of-domain access point to a cellular network. An edge of the domain can also be dynamic and vary based on station characteristics.
-
147.
公开(公告)号:US20220295423A1
公开(公告)日:2022-09-15
申请号:US17831009
申请日:2022-06-02
Applicant: Cisco Technology, Inc.
Inventor: Pascal Thubert , Robert Edgar Barton , Jerome Henry , Eric Michel Levy-Abegnoli
Abstract: In one embodiment, a method comprises: determining, by a constrained network device in a low power and lossy network (LLN), a self-estimated density value of neighboring LLN devices based on wirelessly receiving an identified number of beacon message transmissions within an identified time interval from neighboring transmitting LLN devices in the LLN; setting, by the constrained network device, a first wireless transmit power value based on the self-estimated density value; and transmitting a beacon message at the first wireless transmit power value, the beacon message specifying the self-estimated density value, a corresponding trust metric for the self-estimated density value, and the first wireless transmit power value used by the constrained network device for transmitting the beacon message.
-
公开(公告)号:US20220164918A1
公开(公告)日:2022-05-26
申请号:US17669647
申请日:2022-02-11
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Frank Brockners , Russell Paul Gyurek , Jerome Henry
Abstract: A server that includes a graphics processing unit (GPU) may receive, from a first application that is remote from the server, a first request to reserve a first number of cores of the GPU for a first amount of time. The server may also receive, from a second application that is also remote from the server, a second request to reserve a second number of cores of the GPU for a second amount of time that at least partly overlaps the first amount of time. The server may determine that the first request is associated with a higher priority than the second request and, in response, may reserve the first number of cores for the first amount of time for the first application. The server may send, to the first application, an indication that the first number of cores have been reserved as requested by the first application.
-
公开(公告)号:US20220159064A1
公开(公告)日:2022-05-19
申请号:US16950132
申请日:2020-11-17
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Jerome Henry , Maik Guenter Seewald
IPC: H04L29/08
Abstract: Cloud services are provided by a distributed network including a number of geographically distributed datacenters, to client devices in accordance with data sovereignty requirements. A server within the distributed network may receive a service request and determine whether it complies with the data sovereignty requirements of the client. When the geographic location of the server does not comply with the client's data sovereignty requirements, the server may determine and transmit back to the client device a set of alternative datacenters within the distributed network that comply with the client's data sovereignty requirements. The client device may use network probes to select an alternative datacenter, and the cloud service request of the client device may be migrated from the server to the selected datacenter.
-
公开(公告)号:US11246046B2
公开(公告)日:2022-02-08
申请号:US15904746
申请日:2018-02-26
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert Edgar Barton
Abstract: In one embodiment, a computing device determines one or more profiles of respective wireless network issues, each of the one or more profiles having a set of associated parameters. By monitoring wireless conditions in a particular wireless network, the computing device may then detect that the wireless conditions exhibit trigger conditions correlated to a particular set of associated parameters for a particular profile of a particular wireless network issue. In response to detecting that the wireless conditions exhibit trigger conditions, the computing device may then capture and store data regarding the wireless conditions, accordingly.
-
-
-
-
-
-
-
-
-