-
公开(公告)号:US11489762B2
公开(公告)日:2022-11-01
申请号:US16890241
申请日:2020-06-02
Applicant: Cisco Technology, Inc.
Inventor: Li Zhao , Chuanwei Li , Lele Zhang , Haibo Dong , Akram Ismail Sheriff
IPC: H04L45/24 , H04L45/02 , H04L47/122 , H04W28/10 , H04W84/18
Abstract: Techniques for distributed sub-controller permission for control of data-traffic flow within software-defined networking (SDN) mesh networks to limit control plane traffic of the network are described herein. A technique described herein includes a network node of a data-traffic path of an SDN mesh network obtaining SDN sub-controller permission from a border controller of the SDN mesh network. Further, the technique includes suppression of data traffic from sibling and children nodes of data-traffic path allied nodes to the data-traffic path allied nodes. The data-traffic path allied nodes include network nodes that are part of the data-traffic path of the SDN mesh network. Further still, the technique includes the transmission of data across the data-traffic path.
-
公开(公告)号:US20220070672A1
公开(公告)日:2022-03-03
申请号:US17011792
申请日:2020-09-03
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Yajun Xia , Chuanwei Li , Li Zhao
Abstract: A method includes identifying a potentially malicious node using a rating assigned to nodes within the network and decrementing the rating based on detected dropped messages to identify a potentially malicious node. The malicious node is identified based on location information obtained from the nodes within the network and comparable distances from the potentially malicious node. The method further includes ending communications with the malicious node and selecting a new parent node based on a presumption that any of the plurality of nodes other than the malicious node are non-malicious.
-
公开(公告)号:US11245678B2
公开(公告)日:2022-02-08
申请号:US16432661
申请日:2019-06-05
Applicant: Cisco Technology, Inc.
Inventor: Li Zhao , Pascal Thubert , Huimin She , Haibo Dong
IPC: H04L29/06 , H04W40/02 , H04W28/02 , H04W12/033
Abstract: In one embodiment, a method comprises: registering, by a root network device in a low power and lossy network, a constrained network device that is reachable within the low power and lossy network; obtaining, by the root network device, executable code associated with execution of a network service operation by the constrained network device; receiving a data packet from a source device and destined for the constrained network device; and causing execution on the data packet, by the root network device, of the network service operation on behalf of the constrained network device in response to reception of the data packet.
-
24.
公开(公告)号:US20200259736A1
公开(公告)日:2020-08-13
申请号:US16274979
申请日:2019-02-13
Applicant: Cisco Technology, Inc.
Inventor: Huimin She , Feiliang Wang , Li Zhao , Chuanwei Li
IPC: H04L12/733 , H04L12/751 , H04L12/44 , H04L29/08 , H04L12/24
Abstract: In one embodiment, a method comprises determining, by a network device, a hop-by-hop path in a low-power and lossy network having a tree-based topology originated at a root network device, the hop-by-hop path comprising identified network devices for forwarding a data packet from a source network device to a destination device in the tree-based topology; and causing, by the network device, the destination device to initiate generation of a locally-optimized tree that bypasses the root network device and optimizes forwarding of the data packet from the source network device to the destination device, based on confined advertisements within the tree-based topology relative to the identified network devices.
-
公开(公告)号:US12149548B2
公开(公告)日:2024-11-19
申请号:US17515014
申请日:2021-10-29
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Li Zhao , Chuanwei Li , Feiliang Wang
IPC: H04L9/40 , G06F18/214 , G06N20/00 , H04L45/00 , H04L45/02 , H04W12/121 , H04W12/00
Abstract: The present disclosure provides a hierarchical method of identifying unauthorized network traffic in a network by applying, at one of a first plurality of nodes of a network, a first level of network traffic analysis to identify received network traffic as one of authorized or suspicious network traffic, the one of the first plurality of nodes having a first path for traffic routing and a second path to one of a second plurality of nodes of the network, the second path being used for forwarding the suspicious network traffic to the one of the second plurality of nodes; tagging the received network traffic as the suspicious network traffic; and sending the suspicious network traffic to the one of the second plurality of nodes over the second path, the second network node applying a second level of network analysis to determine if the received network traffic is authorized, unauthorized or remains suspicious.
-
26.
公开(公告)号:US11159409B2
公开(公告)日:2021-10-26
申请号:US16419124
申请日:2019-05-22
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Li Zhao , Chuanwei Li , Feiliang Wang
IPC: H04L12/26 , H04W84/18 , H04L12/751 , H04L12/24 , H04W4/06
Abstract: In one embodiment, a method comprises: determining, by a network device in a wireless data network, a past throughput of broadcast data packets transmitted at broadcast transmission intervals of a prescribed broadcast schedule over a selected measurement interval, the broadcast transmission intervals each adjacent to unicast transmission intervals allocated in the wireless data network, each of the broadcast transmission intervals in the prescribed broadcast schedule initially set at a prescribed duration; predicting, by the network device, a predicted throughput of a future broadcast transmission interval of the prescribed broadcast schedule, for transmission of at least a future broadcast data packet, based on executing a trendline prediction of the predicted throughput using the past throughput over the selected measurement interval; and adjusting the corresponding prescribed duration of the future broadcast transmission interval, relative to the corresponding adjacent unicast transmission interval following the future broadcast transmission interval, based on the predicted throughput.
-
-
-
-
-