-
公开(公告)号:US10572688B2
公开(公告)日:2020-02-25
申请号:US15482036
申请日:2017-04-07
Applicant: Cisco Technology, Inc.
Inventor: Rajiv Asati , Nagendra Kumar Nainar , Carlos M. Pignataro , Justin J. Muller
Abstract: A server compiles a software program with a randomly generated string to produce compiled code. The server also computes a hash of the compiled code to produce a unique identifier for the software program. Upon receiving a request from a user to download the software program, the server generates a transaction for a blockchain that has a transaction identifier and the transaction including a user identifier for the user and the unique identifier. The server embeds the transaction identifier and the unique identifier with the software program, and downloads the software program to a computing device associated with the user.
-
公开(公告)号:US10567441B2
公开(公告)日:2020-02-18
申请号:US15870957
申请日:2018-01-14
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Rajiv Asati , Carlos M. Pignataro
Abstract: In one embodiment, a system includes a first host computer including a host interface configured to receive traffic from a domain ingress node of a first domain, and processing machinery configured to instantiate worker nodes, instantiate a master node and a security gateway agent on the master node, instantiate a plurality of security clients on the worker nodes, wherein each worker node includes at least one security client, wherein each security client is configured to monitor at least part of the traffic being forwarded in the one worker node for malicious traffic, and report a first data item about the malicious traffic to the security gateway agent, and wherein the security gateway agent is configured to forward a second data item about the malicious traffic to a security server to determine at least one security policy to mitigate the malicious traffic, and to be enforced by a node.
-
公开(公告)号:US10555054B2
公开(公告)日:2020-02-04
申请号:US15096337
申请日:2016-04-12
Applicant: Cisco Technology, Inc.
Inventor: Charles Calvin Byers , Gonzalo Salgueiro , Joseph Michael Clarke , Carlos M. Pignataro , Nagendra Kumar Nainar
IPC: H04Q1/00
Abstract: In one embodiment, an autonomous carrier transports a fog computing module to an enclosure at a location determined to be in need of a particular fog computing resource, and aligns and anchors the fog computing module to the enclosure, where the aligning and anchoring is based on mating mechanical connectors on the fog computing module and enclosure. One or more electronic components of the fog computing module may then interface to the enclosure due to the anchoring, and the fog computing module activates at the location, accordingly. In one particular embodiment, the particular fog computing resource of the fog computing module is an additive resource to an existing fog computing resource module at the enclosure, and the existing fog computing resource module provides the mechanical connectors and interfaced electronic components of the enclosure.
-
44.
公开(公告)号:US20190356583A1
公开(公告)日:2019-11-21
申请号:US16202780
申请日:2018-11-28
Applicant: Cisco Technology, Inc.
Inventor: Pascal Thubert , Nagendra Kumar Nainar , Carlos M. Pignataro
IPC: H04L12/753 , H04L12/721 , H04L12/44 , H04W40/24 , H04L12/751
Abstract: In one embodiment, a method is performed. A spine node in communication with a network may determine a subtree of a shadow cone of the spine node. The subtree may comprise a plurality of nodes and a plurality of links connecting pairs of the nodes. The spine node may determine a disaggregated route to a first leaf node to which a disaggregated prefix may be attached. The disaggregated route may be propagated to the plurality of the nodes of the subtree.
-
公开(公告)号:US20190342213A1
公开(公告)日:2019-11-07
申请号:US16511730
申请日:2019-07-15
Applicant: Cisco Technology, Inc.
Inventor: Rajiv Asati , Nagendra Kumar Nainar , Carlos M. Pignataro
IPC: H04L12/741 , H04L29/08 , H04L29/06 , H04L12/715
Abstract: A method is provided in one example embodiment and may include receiving a packet by a forwarder in an Information-Centric Networking (ICN) network; determining Bit Index Explicit Replication (BIER) information associated with the packet; and forwarding the packet based, at least in part, on the BIER information associated with the packet. The packet can be an interest packet or a data packet received by the forwarder in the ICN network.
-
46.
公开(公告)号:US10447571B2
公开(公告)日:2019-10-15
申请号:US15869322
申请日:2018-01-12
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Carlos M. Pignataro
IPC: H04L12/26 , H04L12/741 , H04L12/721
Abstract: Dataplane-based Seamless Bidirectional Forwarding Detection (S-BFD) monitoring for network entities is provided. In one embodiment, a method of S-BFD monitoring includes assigning, by a network element, a unique segment identifier (ID) to each entity of a plurality of entities that are monitored by the network element. The method includes receiving an S-BFD control packet at the network element, including a first segment ID associated with a particular entity. The method also includes performing a lookup operation for the first segment ID in stored data of the network element. Based on the lookup operation, when a first action is designated in the stored data for the first segment ID, the method includes returning the S-BFD control packet to its source, and, when a second action is designated in the stored data for the first segment ID, the method includes forwarding the S-BFD control packet to an S-BFD reflector session.
-
公开(公告)号:US20190297005A1
公开(公告)日:2019-09-26
申请号:US15927334
申请日:2018-03-21
Applicant: Cisco Technology, Inc.
Inventor: Carlos M. Pignataro , Nagendra Kumar Nainar , Vengada Prasad Govindan , Pawel Piotr Sowinski
IPC: H04L12/761 , H04L12/707 , H04L12/749 , H04L12/703 , H04L12/723 , H04L1/00
Abstract: Multipoint seamless Bi-directional Forwarding Detection (BFD) may be provided. First, a discriminator and data identifying a headend device may be received by a node from the headend device. The discriminator may be received over a point-to-multipoint pseudowire between the node and the headend device. Next, the node may start a reflector session in response to receiving the discriminator. The reflector session may correspond to the discriminator and the data identifying the headend device. The reflector session may then receive a control packet from the headend device and determine that the control packet includes the discriminator. The control packet may be received over the point-to-multipoint pseudowire. Next, the reflector session on the node may send a reply packet to the headend device in response to determining that the control packet includes the discriminator. The reply packet may be sent over a unicast pseudowire between the node and the headend device.
-
公开(公告)号:US20190288923A1
公开(公告)日:2019-09-19
申请号:US16383956
申请日:2019-04-15
Applicant: Cisco Technology, Inc.
Inventor: Nobushige Akiya , Carlos M. Pignataro , Nagendra Kumar Nainar , Paul Quinn , James Guichard
IPC: H04L12/24
Abstract: In one embodiment, a system and method are disclosed for sending a request and receiving a reply. The request contains a network service header including a flow label field and a target index field. The flow label field contains a set of available flow labels. The target index field includes a value indicating a target node. The reply contains information indicating which of the flow labels can be used to route a packet to each of the next hop nodes downstream from the device that sent the reply. This process can be repeated for other nodes on a path, and other paths in a service topology layer. The information determined by this process can be used to perform other necessary functionalities at the service topology layer.
-
公开(公告)号:US20190281078A1
公开(公告)日:2019-09-12
申请号:US15915335
申请日:2018-03-08
Applicant: Cisco Technology, Inc.
Inventor: Alejandro Alberto Eguiarte Salazar , Nagendra Kumar Nainar , Richard Furr , Yogesh Thoppae Ramdoss
Abstract: In one embodiment, a server may receive both layer-2 topology information and layer-2 telemetry information from a plurality of layer-2 switches. The server may then apply behavioral learning to both the layer-2 topology information and the layer-2 telemetry information to detect layer-2 patterns that are indicative of one or more problematic layer-2 behaviors. As such, based on the behavioral learning, the server then creates predictive rules to be applied within layer-2 networks to predict the one or more problematic layer-2 behaviors. The predictive rules may then be used within a particular layer-2 network to cause i) prediction of one or more particular problematic layer-2 behaviors within the particular layer-2 network based on data from a plurality of switches within the particular layer-2 network, and ii) mitigation against the predicted one or more particular problematic layer-2 behaviors within the particular layer-2 network.
-
公开(公告)号:US20190215176A1
公开(公告)日:2019-07-11
申请号:US16237575
申请日:2018-12-31
Applicant: Cisco Technology, Inc.
Inventor: Ijsbrand Wijnands , Gregory J. Shepherd , Nagendra Kumar Nainar
IPC: H04L12/18 , H04L12/761 , H04L12/721 , H04L12/741
Abstract: Functionality for creating a bit routing table for use in a bit-indexed explicit replication (“BIER”) environment in disclosed herein. In one embodiment, this functionality includes receiving information from a host, and determining whether the information comprises a MAC address that is a bit-indexed explicit replication (“BIER”) MAC address. In response to determining that the information comprises a BIER MAC address, this functionality creates an entry corresponding to the MAC address in a bit routing table. This functionality also analyzes the information to determine a bit position that is associated with the host, and also determines a port via which the host is reachable. The functionality updates the bit routing table by storing information identifying the bit position and the port in the entry, such that the bit position and the port both correspond to the MAC address. This functionality can be used to route packets in a BIER environment.
-
-
-
-
-
-
-
-
-