-
公开(公告)号:US20230292123A1
公开(公告)日:2023-09-14
申请号:US18321133
申请日:2023-05-22
Applicant: Cisco Technology, Inc.
Inventor: Om Prakash Suthar , Rajiv Asati , Santanu Dasgupta
IPC: H04W12/06 , G06F16/182 , H04W76/25 , H04L9/40 , H04W60/00 , H04W12/041
CPC classification number: H04W12/06 , G06F16/1824 , H04W76/25 , H04L63/101 , H04W60/00 , H04W12/041
Abstract: Blockchain technology is used to provide distributed authentication, entitlements and trust among different virtual Radio Access Network (vRAN) elements. An enterprise blockchain with interfaces enables multi-vendor vRAN deployment across multiple service providers. In another embodiment, a method is provided for authenticating entities in a virtualized radio access network to ensure various entitles are in fact entitled to participate in various radio access network operations.
-
公开(公告)号:US20230208855A1
公开(公告)日:2023-06-29
申请号:US17559164
申请日:2021-12-22
Applicant: Cisco Technology, Inc.
Inventor: Akram Ismail Sheriff , Rajiv Asati , Nagendra Kumar Nainar , Ariel Shuper , Hendrikus G.P. Bosch
CPC classification number: H04L63/1416 , H04L41/22 , H04L63/1425 , H04L63/1466
Abstract: In one embodiment, a method comprises: receiving, by a process, an executed function flow of a daisy chained serverless function-as-a-service (FaaS) function, the executed function flow having been injected with a particular trace identifier in response to an initial event trigger and span identifiers having been injected by each service that was executed; generating, by the process, a serverless flow graph associated with the particular trace identifier based on linking a path of serverless functions according to correlation of the span identifiers between the serverless functions; performing, by the process, a trace-based analysis of the serverless flow graph through comparison to a baseline of expectation; detecting, by the process, one or more anomalies in the serverless flow graph according to the trace-based analysis; and mitigating, by the process, the one or more anomalies in the serverless flow graph.
-
公开(公告)号:US20230145237A1
公开(公告)日:2023-05-11
申请号:US17522515
申请日:2021-11-09
Applicant: Cisco Technology, Inc.
Inventor: Atahar Khan , Ankush Ganpatrai Arora , Amit Dhamija , Naveen Eranoor , Chandrashekar Vasudevan , Rajiv Asati
IPC: H04L12/707 , H04L12/717 , H04L12/721 , H04L12/751 , G06N20/00
CPC classification number: H04L45/24 , G06N20/00 , H04L45/02 , H04L45/42 , H04L45/123
Abstract: This disclosure describes techniques for policy validation techniques relating to data traffic routing among network devices. The techniques may include processing a validation request from a controller. A validation request may include information related to a computed path for routing data traffic in a computing network. The processing may include sending one or more path requests to one or more redundant controllers, and comparing computed paths from the redundant controller(s) to the originally computed path. The techniques may include generating a validation response based on comparing the computed paths. In some examples, the techniques may further include determining a health score for the controller. Policy validation techniques may improve data traffic routing among network devices by helping to ensure valid policies are produced.
-
公开(公告)号:US11451474B2
公开(公告)日:2022-09-20
申请号:US14603501
申请日:2015-01-23
Applicant: Cisco Technology, Inc.
Inventor: Ijsbrand Wijnands , Gregory J. Shepherd , Christian J. Martin , Rajiv Asati
IPC: H04L45/7453 , H04L45/00 , H04L45/24 , H04L12/18 , H04L45/16
Abstract: Various systems and methods for performing bit indexed explicit replication (BIER). For example, one method involves receiving a packet at a node. The packet includes a bit string. The node selects forwarding information based on a flow value associated with the packet. The forwarding information includes a forwarding bit mask. The node then forwards the packet based on the bit string and the forwarding information.
-
公开(公告)号:US20210352157A1
公开(公告)日:2021-11-11
申请号:US17339298
申请日:2021-06-04
Applicant: Cisco Technology, Inc.
Inventor: Rajiv Asati , Humberto Jose La Roche , Eric C. Friedrich
Abstract: A method is performed at a mobile core, including assigning a first cache servicing a client device in response to a first request for a media content item based at least in part on a first IP address of the client device associated with a first edge location. The method further includes providing a first portion of the media content item from the first cache. The method additionally includes triggering a plurality of caches at edge locations proximate to the first edge location to retrieve a second portion of the media content item. The method also includes receiving a continuation request from the client device with a second IP address associated with a second edge location. The method further includes selecting a second cache from the plurality of caches based at least in part on the second IP address and continuing providing the media content item from the second cache.
-
公开(公告)号:US20210351954A1
公开(公告)日:2021-11-11
申请号:US16871827
申请日:2020-05-11
Applicant: Cisco Technology, Inc.
Inventor: Mankamana Prasad Mishra , Jean-Philippe Vasseur , Nitin Kumar , Rajiv Asati , Luc De Ghein
IPC: H04L12/44 , H04L12/18 , H04L12/801 , H04L12/931 , G06N20/00
Abstract: In one embodiment, a device deploys a first machine learning model to an inference location in a network. The first machine learning model is used at the inference location to make inferences about the network. The device receives, from the inference location, an indication that the first machine learning model is exhibiting poor performance. The device identifies a corrective measure for the poor performance that minimizes resource consumption by a model training pipeline of the device. The device deploys, based on the corrective measure, a second machine learning model to the inference location. The second machine learning model is used in lieu of the first machine learning model to make the inferences about the network.
-
公开(公告)号:US10951578B1
公开(公告)日:2021-03-16
申请号:US16743073
申请日:2020-01-15
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Carlos M. Pignataro , Rajiv Asati
IPC: H04L12/741 , H04L29/12 , H04L29/06 , H04L12/70
Abstract: Presented herein are techniques that provide for a way to associate a policy, or signal the policy for a user equipment (UE), directly from the UE traffic, inband or, in other words, within the data plane. The policies are effectively embedded in the address of the UE traffic. When the Neutral Host Network (NHN) receives the UE traffic, the policy can be determined directly from the address associated with the UE traffic. This provides for a unique way of integrating a service chain identifier in the Internet Protocol address of the UE to identify the services/policies to be applied to UE traffic in a stateless manner.
-
公开(公告)号:US10541893B2
公开(公告)日:2020-01-21
申请号:US15793557
申请日:2017-10-25
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Rajiv Asati , Carlos M. Pignataro
IPC: G06F15/173 , H04L12/26
Abstract: Systems, methods, and computer-readable media are disclosed for use of an overlay network termination endpoint as a proxy to collect telemetry data for micro-services or specific applications provided by containers in overlay data centers. In one aspect of the present disclosure, a method includes receiving, at a controller, a probe for flow statistics associated with a service path, the probe including corresponding flow identification information, extracting the corresponding flow identification information from the probe, obtaining the flow statistics from an agent based on the flow identification information, the agent being configured to manage a plurality of containers, generating a response packet including the flow statistics obtained from the agent and sending the response packet to an initiator from which the query is received.
-
公开(公告)号:US10313153B2
公开(公告)日:2019-06-04
申请号:US15443593
申请日:2017-02-27
Applicant: Cisco Technology, Inc.
Abstract: In one embodiment, a device in a network monitors Ethernet virtual private network (EVPN) traffic in the network for a plurality of media access control (MAC) addresses. The device generates a machine learning-based traffic model for the MAC addresses based on the monitored EVPN traffic. The device determines a timeout for a particular one of the MAC addresses based on traffic predicted by the machine learning-based traffic model for the particular MAC address. The device causes the particular MAC address to be timed out from one or more forwarding tables in the network based on the determined timeout.
-
公开(公告)号:US20180309689A1
公开(公告)日:2018-10-25
申请号:US15491352
申请日:2017-04-19
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Nagendra Kumar Nainar , Carlos M. Pignataro , Rajiv Asati
IPC: H04L12/841 , H04L29/06 , H04L12/851 , H04L29/08
CPC classification number: H04L47/283 , H04L45/123 , H04L45/306 , H04L45/42 , H04L67/2814 , H04L67/325 , H04L69/22
Abstract: In some aspects, a method of the technology can include steps for sending a packet along a service function chain (SFC) to an egress node, the SFC comprising a plurality of service function forwarders (SFFs), wherein each SFF is associated with at least one service function (SF), and receiving the packet at a first SFF in the SFC, wherein the first SFF is associated with a first SF. In some aspects, the first SFF can also be configured to perform operations including: reading an option flag of the packet, and determining whether to forward the packet to the first based on the option flag. Systems and machine-readable media are also provided.
-
-
-
-
-
-
-
-
-