-
公开(公告)号:US11811648B2
公开(公告)日:2023-11-07
申请号:US17903615
申请日:2022-09-06
Applicant: Cisco Technology, Inc.
Inventor: Li Zhao , Chuanwei Li , Lele Zhang , Haibo Dong , Akram Ismail Sheriff
IPC: H04L45/24 , H04L45/02 , H04L47/122 , H04W28/10 , H04W84/18
CPC classification number: H04L45/24 , H04L45/02 , H04L47/122 , H04W28/10 , H04W84/18
Abstract: Techniques for distributed sub-controller permission for control of data-traffic flow within software-defined networking (SDN) mesh networks to limit control plane traffic of the network are described herein. A technique described herein includes a network node of a data-traffic path of an SDN mesh network obtaining SDN sub-controller permission from a border controller of the SDN mesh network. Further, the technique includes suppression of data traffic from sibling and children nodes of data-traffic path allied nodes to the data-traffic path allied nodes. The data-traffic path allied nodes include network nodes that are part of the data-traffic path of the SDN mesh network. Further still, the technique includes the transmission of data across the data-traffic path.
-
公开(公告)号:US11706625B2
公开(公告)日:2023-07-18
申请号:US17011792
申请日:2020-09-03
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Yajun Xia , Chuanwei Li , Li Zhao
IPC: H04W12/122 , H04W4/70 , G16Y30/10 , H04L9/40 , H04W24/08 , H04W64/00 , H04L43/0829 , H04L43/16 , H04W84/18
CPC classification number: H04W12/122 , G16Y30/10 , H04L43/0829 , H04L43/16 , H04L63/1416 , H04W4/70 , H04W24/08 , H04W64/00 , H04L2463/143 , H04W84/18
Abstract: A method includes identifying a potentially malicious node using a rating assigned to nodes within the network and decrementing the rating based on detected dropped messages to identify a potentially malicious node. The malicious node is identified based on location information obtained from the nodes within the network and comparable distances from the potentially malicious node. The method further includes ending communications with the malicious node and selecting a new parent node based on a presumption that any of the plurality of nodes other than the malicious node are non-malicious.
-
公开(公告)号:US20220417135A1
公开(公告)日:2022-12-29
申请号:US17903615
申请日:2022-09-06
Applicant: Cisco Technology, Inc.
Inventor: Li Zhao , Chuanwei Li , Lele Zhang , Haibo Dong , Akram Sheriff
IPC: H04L45/24 , H04L45/02 , H04L47/122 , H04W28/10 , H04W84/18
Abstract: Techniques for distributed sub-controller permission for control of data-traffic flow within software-defined networking (SDN) mesh networks to limit control plane traffic of the network are described herein. A technique described herein includes a network node of a data-traffic path of an SDN mesh network obtaining SDN sub-controller permission from a border controller of the SDN mesh network. Further, the technique includes suppression of data traffic from sibling and children nodes of data-traffic path allied nodes to the data-traffic path allied nodes. The data-traffic path allied nodes include network nodes that are part of the data-traffic path of the SDN mesh network. Further still, the technique includes the transmission of data across the data-traffic path.
-
公开(公告)号:US11159430B2
公开(公告)日:2021-10-26
申请号:US16518130
申请日:2019-07-22
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Chuanwei Li , Li Zhao , Yajun Xia
IPC: H04L12/803 , H04L12/24 , G06N20/00 , H04L12/721 , H04L12/26 , H04L12/753
Abstract: In one embodiment, a technique for load balancing of throughput for multi-PHY networks using decision trees is provided. A first device of a mesh communication network may collect at least one transmission metric indicative of a primary link and a secondary link between the first device and a second device of the mesh communication network. The first device may provide the at least one transmission metric as input to one or more decision trees comprising one or more attributes that are each indicative of a threshold for a corresponding transmission metric. The first device may obtain an output from the decision tree comprising a selection of either the primary link or the secondary link. The first device may send, based on the output from the decision tree, one or more packets to the second device using the selected link.
-
公开(公告)号:US10938707B2
公开(公告)日:2021-03-02
申请号:US16274979
申请日:2019-02-13
Applicant: Cisco Technology, Inc.
Inventor: Huimin She , Feiliang Wang , Li Zhao , Chuanwei Li
IPC: H04L12/733 , H04L12/24 , H04L12/44 , H04L12/751 , H04L29/08 , H04L12/721
Abstract: In one embodiment, a method comprises determining, by a network device, a hop-by-hop path in a low-power and lossy network having a tree-based topology originated at a root network device, the hop-by-hop path comprising identified network devices for forwarding a data packet from a source network device to a destination device in the tree-based topology; and causing, by the network device, the destination device to initiate generation of a locally-optimized tree that bypasses the root network device and optimizes forwarding of the data packet from the source network device to the destination device, based on confined advertisements within the tree-based topology relative to the identified network devices.
-
16.
公开(公告)号:US10887851B1
公开(公告)日:2021-01-05
申请号:US16521184
申请日:2019-07-24
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Huimin She , Wenchuan Ji , Chuanwei Li
Abstract: In one embodiment, a technique for dynamic transmission power in wireless mesh networks using supervised and semi-supervised learning is provided. A first device of a mesh communication network may receive a set of transmission power metrics indicative of network conditions between a second device of the mesh communication network and a plurality of child nodes associated with the second device. The first device may provide the set of transmission power metrics as input to a supervised machine learning process that probabilistically determines one or more minimum transmission power thresholds for nodes of the mesh communication network. The first device may obtain an output from the supervised machine learning process comprising an indication of a particular minimum transmission power threshold for the second device. The first device may control the second device to exchange packets with the plurality of child nodes using the particular minimum transmission power threshold.
-
公开(公告)号:US20200322809A1
公开(公告)日:2020-10-08
申请号:US16375778
申请日:2019-04-04
Applicant: Cisco Technology, Inc.
Inventor: Li Zhao , Chuanwei Li , Lele Zhang , Huimin She
Abstract: Systems, methods, and computer-readable media for identifying a deployment scheme for forming a wireless mesh network based on environmental characteristics and an optimum deployment scheme. In some examples, a geographical area for deployment of a wireless mesh network is identified. Additionally, environmental information of the geographical area can be collected. Network characteristics of an optimum deployment scheme for forming the wireless mesh network can be defined. As follows, a deployment scheme for forming the wireless mesh network can be identified based on the network characteristics of the optimum deployment scheme and the environmental information of the geographical area.
-
公开(公告)号:US12267682B2
公开(公告)日:2025-04-01
申请号:US18353772
申请日:2023-07-17
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Yajun Xia , Chuanwei Li , Li Zhao
IPC: H04W12/122 , G16Y30/10 , H04L9/40 , H04L43/0829 , H04L43/16 , H04W4/70 , H04W24/08 , H04W64/00 , H04W84/18
Abstract: A method includes determining a number of drops of a plurality of messages sent to a first node of a plurality of nodes within a mesh network. Based at least in part on the number of drops of the plurality of messages exceeding a threshold number of drops for a time period, decrementing a first rating assigned to the first node to a second rating assigned to the first node. Based at least in part on the second rating being below a rating threshold, determining that the first node is a potentially malicious node. Based at least in part on a first distance to the first node being larger than a distance threshold, identifying that the first node is a malicious node. The method may further include ending communications with the first node.
-
公开(公告)号:US11799751B2
公开(公告)日:2023-10-24
申请号:US17409985
申请日:2021-08-24
Applicant: Cisco Technology, Inc.
Inventor: Pascal Thubert , Li Zhao , Huimin She , Chuanwei Li
IPC: H04L43/16 , H04L45/121 , H04L41/12 , H04L43/0882
CPC classification number: H04L43/16 , H04L41/12 , H04L43/0882 , H04L45/121
Abstract: In one embodiment, a method comprises: joining, by a network device, a network topology rooted by a root network device in a data network, and in response transmitting an advertisement indicating a position of the network device in the network topology; suppressing a second transmission based on initiating a deferred transmission operation in response to transmitting the advertisement; maintaining the deferred transmission operation to enable a prescribed minimum number of other network devices to join the network topology at respective identified lower positions than the position of the network device; and changing, by the network device, from the deferred transmission operation to an accelerated operation in response to expiration of a prescribed deferral interval or detecting the prescribed minimum number of other network devices having the respective identified lower positions, the accelerated operation enabling the network device to initiate transmission of a data packet before the other network devices.
-
公开(公告)号:US11463350B2
公开(公告)日:2022-10-04
申请号:US17102003
申请日:2020-11-23
Applicant: Cisco Technology, Inc.
Inventor: Ling Wei , Wenjia Wu , Nan Yi , Chuanwei Li
Abstract: In one embodiment, a method comprises: determining, by a network device that is configured for joining a local directed acyclic graph (DAG) instance in a data network, an unreachability by the network device to any member of the local DAG instance; generating and broadcasting, by the network device, a request message that identifies the network device requesting to join the local DAG instance, the request message causing a neighboring network device in a global DAG instance of the data network to rebroadcast the request message for reception by a member of the local DAG instance, the neighboring network device a non-member of the local DAG instance; and receiving, by the network device, a reply message indicating a member of the local DAG instance is reachable via the neighboring network device in the global DAG instance.
-
-
-
-
-
-
-
-
-