-
公开(公告)号:US11431518B2
公开(公告)日:2022-08-30
申请号:US16789862
申请日:2020-02-13
Applicant: Cisco Technology, Inc.
Inventor: Pascal Thubert , Huimin She , Chuanwei Li , Lele Zhang
Abstract: In one embodiment, a method comprises: identifying, by a low power and lossy network (LLN) device in a low power and lossy network, a minimum distance value and a distance limit value for limiting multicast propagation, initiated at the LLN device, of a multicast data message in the LLN; and multicast transmitting, by the LLN device, the multicast data message with a current distance field specifying the minimum distance value and a distance limit field specifying the distance limit value, the multicast transmitting causing a receiving LLN device having a corresponding rank in the LLN to respond to the multicast data message by: (1) determining an updated distance based on adding to the current distance field a rank difference between the receiving LLN device and the LLN device, and (2) selectively retransmitting the multicast data message if the updated distance is less than the distance limit value.
-
公开(公告)号:US11362937B2
公开(公告)日:2022-06-14
申请号:US16825171
申请日:2020-03-20
Applicant: Cisco Technology, Inc.
Inventor: Huimin She , Lele Zhang , Shiwei Gao , Xiaoguang Jason Chen , Chuanwei Li
IPC: G06F15/173 , H04L45/00 , H04L41/0816 , H04L45/02
Abstract: Techniques for utilizing Software-Defined Field-Area Network (SD-FAN) controllers to receive a geographic location and transmission power of individual nodes and generate a geographic location topology of a Field-Area Network (FAN) to provide nodes with location-aware route paths for data transmission. One or more SD-FAN controller(s) may maintain a geographic location database to store the geographic location and transmission power of the individual nodes. Each node may utilize a Destination Address Object to advertise its geographic location and transmission power to the SD-FAN controller. The SD-FAN controller(s) may utilize the geographic location table to generate the geographic location topology of the FAN and determine a location-aware route path for optimized data transmission between nodes in the FAN.
-
公开(公告)号:US20210377157A1
公开(公告)日:2021-12-02
申请号:US16890241
申请日:2020-06-02
Applicant: Cisco Technology, Inc.
Inventor: Li Zhao , Chuanwei Li , Lele Zhang , Haibo Dong , Akram Ismail Sheriff
IPC: H04L12/707 , H04L12/751 , H04W28/10 , H04L12/803
Abstract: Techniques for distributed sub-controller permission for control of data-traffic flow within software-defined networking (SDN) mesh networks to limit control plane traffic of the network are described herein. A technique described herein includes a network node of a data-traffic path of an SDN mesh network obtaining SDN sub-controller permission from a border controller of the SDN mesh network. Further, the technique includes suppression of data traffic from sibling and children nodes of data-traffic path allied nodes to the data-traffic path allied nodes. The data-traffic path allied nodes include network nodes that are part of the data-traffic path of the SDN mesh network. Further still, the technique includes the transmission of data across the data-traffic path.
-
公开(公告)号:US20210029038A1
公开(公告)日:2021-01-28
申请号:US16518130
申请日:2019-07-22
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Chuanwei Li , Li Zhao , Yajun Xia
IPC: H04L12/803 , H04L12/24 , H04L12/753 , H04L12/721 , H04L12/26 , G06N20/00
Abstract: In one embodiment, a technique for load balancing of throughput for multi-PHY networks using decision trees is provided. A first device of a mesh communication network may collect at least one transmission metric indicative of a primary link and a secondary link between the first device and a second device of the mesh communication network. The first device may provide the at least one transmission metric as input to one or more decision trees comprising one or more attributes that are each indicative of a threshold for a corresponding transmission metric. The first device may obtain an output from the decision tree comprising a selection of either the primary link or the secondary link. The first device may send, based on the output from the decision tree, one or more packets to the second device using the selected link.
-
25.
公开(公告)号:US10419293B1
公开(公告)日:2019-09-17
申请号:US16004245
申请日:2018-06-08
Applicant: Cisco Technology, Inc.
Inventor: Huimin She , Jianzhou Chen , Chuanwei Li , Pascal Thubert
IPC: H04L12/24 , H04L12/759 , H04L12/753
Abstract: A network device stores in its nonvolatile memory, in response to detecting a power outage in a tree-based network, an identifier for a preferred parent and a distance identifier for the network device within the network. In response to power restoration, the network device starts a trickle timer based on the ring identifier, for determining whether a beacon request from a transmitting node and destined for the preferred parent is detected during the waiting interval. In response to the network device detecting the beacon request during the waiting interval, the network device sets its channel hopping schedule to the corresponding channel hopping schedule of the transmitting node in response to determining the beacon request is destined for the preferred parent, enabling rejoining with the preferred parent in response to detecting a beacon from the preferred parent to the transmitting node via the corresponding channel hopping schedule of the transmitting node.
-
公开(公告)号:US11909545B2
公开(公告)日:2024-02-20
申请号:US17866768
申请日:2022-07-18
Applicant: Cisco Technology, Inc.
Inventor: Pascal Thubert , Huimin She , Chuanwei Li , Lele Zhang
CPC classification number: H04L12/1845 , H04L1/08 , H04L12/189 , H04L12/4633 , H04L45/32
Abstract: In one embodiment, a method comprises: identifying, by a low power and lossy network (LLN) device in a low power and lossy network, a minimum distance value and a distance limit value for limiting multicast propagation, initiated at the LLN device, of a multicast data message in the LLN; and multicast transmitting, by the LLN device, the multicast data message with a current distance field specifying the minimum distance value and a distance limit field specifying the distance limit value, the multicast transmitting causing a receiving LLN device having a corresponding rank in the LLN to respond to the multicast data message by: (1) determining an updated distance based on adding to the current distance field a rank difference between the receiving LLN device and the LLN device, and (2) selectively retransmitting the multicast data message if the updated distance is less than the distance limit value.
-
公开(公告)号:US11653220B2
公开(公告)日:2023-05-16
申请号:US16375778
申请日:2019-04-04
Applicant: Cisco Technology, Inc.
Inventor: Li Zhao , Chuanwei Li , Lele Zhang , Huimin She
Abstract: Systems, methods, and computer-readable media for identifying a deployment scheme for forming a wireless mesh network based on environmental characteristics and an optimum deployment scheme. In some examples, a geographical area for deployment of a wireless mesh network is identified. Additionally, environmental information of the geographical area can be collected. Network characteristics of an optimum deployment scheme for forming the wireless mesh network can be defined. As follows, a deployment scheme for forming the wireless mesh network can be identified based on the network characteristics of the optimum deployment scheme and the environmental information of the geographical area.
-
公开(公告)号:US20230139002A1
公开(公告)日:2023-05-04
申请号:US17515014
申请日:2021-10-29
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Li Zhao , Chuanwei Li , Feiliang Wang
IPC: H04L29/06 , H04L12/751 , H04L12/733 , G06K9/62 , G06N20/00
Abstract: The present disclosure provides a hierarchical method of identifying unauthorized network traffic in a network by applying, at one of a first plurality of nodes of a network, a first level of network traffic analysis to identify received network traffic as one of authorized or suspicious network traffic, the one of the first plurality of nodes having a first path for traffic routing and a second path to one of a second plurality of nodes of the network, the second path being used for forwarding the suspicious network traffic to the one of the second plurality of nodes; tagging the received network traffic as the suspicious network traffic; and sending the suspicious network traffic to the one of the second plurality of nodes over the second path, the second network node applying a second level of network analysis to determine if the received network traffic is authorized, unauthorized or remains suspicious.
-
公开(公告)号:US11489762B2
公开(公告)日:2022-11-01
申请号:US16890241
申请日:2020-06-02
Applicant: Cisco Technology, Inc.
Inventor: Li Zhao , Chuanwei Li , Lele Zhang , Haibo Dong , Akram Ismail Sheriff
IPC: H04L45/24 , H04L45/02 , H04L47/122 , H04W28/10 , H04W84/18
Abstract: Techniques for distributed sub-controller permission for control of data-traffic flow within software-defined networking (SDN) mesh networks to limit control plane traffic of the network are described herein. A technique described herein includes a network node of a data-traffic path of an SDN mesh network obtaining SDN sub-controller permission from a border controller of the SDN mesh network. Further, the technique includes suppression of data traffic from sibling and children nodes of data-traffic path allied nodes to the data-traffic path allied nodes. The data-traffic path allied nodes include network nodes that are part of the data-traffic path of the SDN mesh network. Further still, the technique includes the transmission of data across the data-traffic path.
-
公开(公告)号:US20220070672A1
公开(公告)日:2022-03-03
申请号:US17011792
申请日:2020-09-03
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Yajun Xia , Chuanwei Li , Li Zhao
Abstract: A method includes identifying a potentially malicious node using a rating assigned to nodes within the network and decrementing the rating based on detected dropped messages to identify a potentially malicious node. The malicious node is identified based on location information obtained from the nodes within the network and comparable distances from the potentially malicious node. The method further includes ending communications with the malicious node and selecting a new parent node based on a presumption that any of the plurality of nodes other than the malicious node are non-malicious.
-
-
-
-
-
-
-
-
-