-
31.
公开(公告)号:US09801127B2
公开(公告)日:2017-10-24
申请号:US15051387
申请日:2016-02-23
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Santosh Ramrao Patil , Swaminathan A. Anantha , Srinivasa Reddy Irigi , Hema Shankar Bontha
CPC classification number: H04W52/0206 , H04W8/005 , H04W84/042 , H04W84/12 , H04W88/10 , Y02D70/00 , Y02D70/1222 , Y02D70/1224 , Y02D70/1226 , Y02D70/1242 , Y02D70/1262 , Y02D70/1264 , Y02D70/142 , Y02D70/144 , Y02D70/146 , Y02D70/164
Abstract: An example method is provided in one example embodiment and may include determining whether at least one user equipment (UE) is present within a combined WiFi coverage area that overlaps a small cell coverage area of a multimode access point (AP), wherein the multimode AP comprises a WiFi AP portion and a small cell AP portion; and controlling a power saving mode for the small cell AP portion of the multimode AP based on whether at least one UE is determined to be present within the combined WiFi coverage area that overlaps the small cell coverage area of the multimode AP.
-
公开(公告)号:US20240113967A1
公开(公告)日:2024-04-04
申请号:US17936534
申请日:2022-09-29
Applicant: Cisco Technology, Inc.
Inventor: Ryan William Shoemaker , Shikha Jain , Meghana Mukund Amble , Jay Ponce , Santosh Ramrao Patil
CPC classification number: H04L45/70 , H04L43/08 , H04L63/1408 , H04L67/535
Abstract: A system and method for improved application path selection for cloud-based applications from a client device. In one embodiment, a method includes collecting metrics of a remote user's use of one or more cloud-based applications, categorizing the one or more cloud-based applications based at least in part on the collected metrics, determining one or more secure network paths based at least in part on the categorizing of the one or more cloud-based applications, establishing the one or more secure network paths between the remote user and one or more network points-of-presence, and routing data traffic for the one or more cloud-based applications through the one or more established secure network paths.
-
33.
公开(公告)号:US11658912B2
公开(公告)日:2023-05-23
申请号:US17324910
申请日:2021-05-19
Applicant: Cisco Technology, Inc.
Inventor: Gangadharan Byju Pularikkal , Santosh Ramrao Patil , Mark Grayson , Swaminathan Anantha , Sourav Chakraborty
IPC: H04L69/22 , H04L43/0852 , H04L43/0888 , H04L43/0894 , H04L47/2491 , H04L45/302 , H04L47/80
CPC classification number: H04L47/2491 , H04L45/306 , H04L47/805 , H04L69/22 , H04L43/0852 , H04L43/0888 , H04L43/0894
Abstract: Systems, methods, and devices are disclosed for providing a quality of service between nodes. A service provider can receive, from a first node of a customer network to an ingress node of a service provider network, packets bound for a second node on the customer network that is remote from the first node. The packets are mapped to a network segment according to a traffic type based on an identifier associated with the packets that identifies the traffic type of the packets. The packets are sent via their mapped network segment to an egress node with connectivity to the second node of the customer network according to a quality of service associated with the traffic type identified by the identifier.
-
34.
公开(公告)号:US11546262B2
公开(公告)日:2023-01-03
申请号:US17153817
申请日:2021-01-20
Applicant: Cisco Technology, Inc.
IPC: H04L12/26 , H04L47/125 , H04L47/11 , H04L47/20 , H04L47/27 , H04L47/283 , H04L69/16
Abstract: Systems and methods provide for Selective Tracking of Acknowledgments (STACKing) to improve buffer utilization and traffic shaping for one or more network devices. A network device can identify a first flow that corresponds to a predetermined traffic class and a predetermined congestion state. The device can determine a current window size and congestion threshold of the first flow. In response to a determination to selectively track a portion of acknowledgments of the first flow, the device can track, in main memory, information of a first portion of acknowledgments of the first flow. The device can exclude, from one or more buffers, a second portion of acknowledgments of the first flow. The device can re-generate and transmit segments corresponding to the second portion of acknowledgments at a target transmission rate based on traffic shaping policies for the predetermined traffic class and congestion state.
-
公开(公告)号:US11238148B2
公开(公告)日:2022-02-01
申请号:US16273947
申请日:2019-02-12
Applicant: Cisco Technology, Inc.
Inventor: Abhishek Bhattacharyya , Abhishek Mukherji , Vinay S. Raghuram , Santosh Ramrao Patil
Abstract: Location-based, context-aware challenge-response authentication may be provided. First, a challenge may be provided to a user. The challenge may be based on a context corresponding to the user. The context corresponding to the user may comprise a location of a device associated with the user within an environment. Next, in response to providing the challenge, a response to the challenge may be received from the user. Then, in response to receiving the response to the challenge, it may be determined that the response is a correct answer to the challenge. In response to determining the response is the correct answer, a privilege may be provided to the user.
-
36.
公开(公告)号:US20210144095A1
公开(公告)日:2021-05-13
申请号:US17153817
申请日:2021-01-20
Applicant: Cisco Technology, Inc.
IPC: H04L12/803 , H04L12/813 , H04L12/841 , H04L12/801 , H04L29/06 , H04L12/807
Abstract: Systems and methods provide for Selective Tracking of Acknowledgments (STACKing) to improve buffer utilization and traffic shaping for one or more network devices. A network device can identify a first flow that corresponds to a predetermined traffic class and a predetermined congestion state. The device can determine a current window size and congestion threshold of the first flow. In response to a determination to selectively track a portion of acknowledgments of the first flow, the device can track, in main memory, information of a first portion of acknowledgments of the first flow. The device can exclude, from one or more buffers, a second portion of acknowledgments of the first flow. The device can re-generate and transmit segments corresponding to the second portion of acknowledgments at a target transmission rate based on traffic shaping policies for the predetermined traffic class and congestion state.
-
公开(公告)号:US20210120000A1
公开(公告)日:2021-04-22
申请号:US17136426
申请日:2020-12-29
Applicant: Cisco Technology, Inc.
Inventor: Gangadharan Byju Pularikkal , Mark Grayson , Santosh Ramrao Patil , Jerome Henry , Bart Brinckman , Mark Allen Webb
Abstract: Various implementations disclosed herein enable controlling access to networks. In various implementations, a method of controlling access to a network is performed by a computing device including one or more processors, and a non-transitory memory. In various implementations, the method includes obtaining an indication that a mobile device having access to a first network utilizing a first radio access technology (RAT) has requested access to a second network utilizing a second RAT. In some implementations, the method includes determining whether the access to the first network satisfies an authentication criterion associated with the second network. In some implementations, the method includes granting the mobile device access to the second network in response to determining that the access to the first network satisfies the authentication criterion associated with the second network. In some implementations, accessing the second network via the authentication criterion satisfies an operating threshold associated with the mobile device.
-
公开(公告)号:US20210075799A1
公开(公告)日:2021-03-11
申请号:US16562017
申请日:2019-09-05
Applicant: Cisco Technology, Inc.
Inventor: Gangadharan Byju Pularikkal , Santosh Ramrao Patil , Paul Wayne Bigbee , Darrin Joseph Miller , Madhusudan Nanjanagud
IPC: H04L29/06 , H04L12/721 , G06K9/62 , G06N20/00
Abstract: The present technology pertains to a system that routes application flows. The system can receive an application flow from a device by an active threat detection agent; analyze the application flow for user context, device context, and application context; classify the application flow based on the analysis of the application flow; and direct the application flow according to the classification of the application flow and an application access policy.
-
公开(公告)号:US10911453B2
公开(公告)日:2021-02-02
申请号:US15854155
申请日:2017-12-26
Applicant: Cisco Technology, Inc.
Inventor: Gangadharan Byju Pularikkal , Mark Grayson , Santosh Ramrao Patil , Jerome Henry , Bart Brinckman , Mark Allen Webb
Abstract: Various implementations disclosed herein enable controlling access to networks. In various implementations, a method of controlling access to a network is performed by a computing device including one or more processors, and a non-transitory memory. In various implementations, the method includes obtaining an indication that a mobile device having access to a first network utilizing a first radio access technology (RAT) has requested access to a second network utilizing a second RAT. In some implementations, the method includes determining whether the access to the first network satisfies an authentication criterion associated with the second network. In some implementations, the method includes granting the mobile device access to the second network in response to determining that the access to the first network satisfies the authentication criterion associated with the second network. In some implementations, accessing the second network via the authentication criterion satisfies an operating threshold associated with the mobile device.
-
公开(公告)号:US10904322B2
公开(公告)日:2021-01-26
申请号:US16009485
申请日:2018-06-15
Applicant: Cisco Technology, Inc.
Inventor: Santosh Ramrao Patil , Swaminathan Anantha , Sourav Chakraborty , Shyam Sundar Vaidyanathan , Gangadharan Byju Pularikkal
Abstract: The disclosed technology relates to systems and methods for automatically scaling down network resources, such as servers or gateway instances, based on predetermined thresholds. A system is configured to detect a reduction in one or more network metrics related to a first server, and instruct the first server to issue a rekey request to a plurality of devices connected to the first server. The system is further configured to instruct a load balancer to route to at least one other server responses from the plurality of devices to the rekey request, and determine a number of connections remaining between the first server and the plurality of devices. The system may be further configured to instruct the load balancer to terminate the first server based on the detected number of connections remaining between the first server and the plurality of devices.
-
-
-
-
-
-
-
-
-