-
公开(公告)号:US10056964B2
公开(公告)日:2018-08-21
申请号:US15160565
申请日:2016-05-20
Applicant: Cisco Technology, Inc.
Inventor: Joseph Michael Clarke , Gonzalo Salgueiro , Charles Calvin Byers , Ryan Steve D'Souza , Pascal Thubert , Andre Jean-Marie Surcouf , Jerome Henry
CPC classification number: H04B7/15 , H04B7/15507 , H04B7/2606 , H04W24/02 , H04W36/22 , H04W40/04 , H04W84/12 , H04W88/08
Abstract: Various implementations disclosed herein enable transforming mutable wireless coverage areas using network coverage vehicles (NVCs) that are orchestrated by a network coverage controller. In various implementations, the method includes receiving coverage area performance characterization values from NCVs configured to provide a plurality of mutable wireless coverage areas. In various implementations, an arrangement of the mutable wireless coverage areas mutably defines the service area, which changes in accordance with changes to the arrangement of the mutable wireless coverage areas. In various implementations, the method also includes determining NCV operation adjustments for some of the NCVs based on the received coverage area performance characterization values in accordance with a service performance metric; and, altering an arrangement of one or more of the plurality of mutable wireless coverage areas within the service area by providing the NCV operation adjustments to some of the NCVs.
-
公开(公告)号:US20180032383A1
公开(公告)日:2018-02-01
申请号:US15222890
申请日:2016-07-28
Applicant: Cisco Technology, Inc.
Inventor: Andre Jean-Marie Surcouf , Hugo Mike Latapie , Enzo Fenoglio , Joseph T. Friel
CPC classification number: G06F9/546 , G06F21/602
Abstract: Various implementations disclosed herein provide a method for performing one or more transactions between application containers. In various implementations, the method includes transmitting a key request to a first network node within a cluster of network nodes that are configured to generate and maintain a distributed ledger. In some implementations, the key request indicates that the requested key is for one or more transactions between a first application container and a second application container. In various implementations, the method includes receiving a key in response to transmitting the key request. In some implementations, the key is valid for the one or more transactions between the first application container and the second application container. In various implementations, the method includes synthesizing, at the first application container, transaction data with the key. In various implementations, the method includes transmitting, by the first application container, the transaction data to the second application container.
-
公开(公告)号:US20170374506A1
公开(公告)日:2017-12-28
申请号:US15194062
申请日:2016-06-27
Applicant: Cisco Technology, Inc.
Inventor: Pete Rai , Andre Jean-Marie Surcouf , Enzo Fenoglio , Joseph T. Friel , Hugo Mike Latapie , Toerless Tobias Eckert
Abstract: In some implementations a method includes receiving a first message from a computing device via a first network. The first message may indicate that the computing device is unable to communicate with a second network. The method also includes determining whether a beacon operator has requested tracking of the computing device. The method further includes transmitting a second message to the beacon operator when the beacon operator has requested tracking of the computing device. The second message may include a first geographical location identified by the first network.
-
公开(公告)号:US20170310583A1
公开(公告)日:2017-10-26
申请号:US15216259
申请日:2016-07-21
Applicant: Cisco Technology, Inc.
IPC: H04L12/721 , H04L12/803 , H04L12/911 , H04L29/12
CPC classification number: H04L45/34 , H04L47/125 , H04L47/728 , H04L61/6004 , H04L61/6059
Abstract: Disclosed is segment routing for load balancing. A network path identification device can receive a first service request identifying a first service. The first service request can originate from a first client device. The network path identification device can select, from a Source Routing (SR) list, a first service node to provide the first service and a first network path to reach the first service node. The SR list can include a set of service nodes that provide the service and one or more network paths to reach each service node from the set of service nodes. The network path identification device can then transmit a response message to the first service request. The response message can identify the first service node and the first network path so that the first client device can use the first network path to request the first service from the first service node.
-
-
-