-
公开(公告)号:US20210321325A1
公开(公告)日:2021-10-14
申请号:US16845877
申请日:2020-04-10
Applicant: Cisco Technology, Inc.
Inventor: Vimal Srivastava , Sri Gundavelli , Aeneas Sean Dodd-Noble , Irfan Ali , Ravi Kiran Guntupalli , Ian McDowell Campbell
IPC: H04W48/18 , H04W48/16 , H04W80/02 , H04W36/00 , H04W76/19 , H04L12/24 , H04L29/12 , H04W36/16 , H04L29/08
Abstract: A network slice controller obtains health information of an active network slice provided by a first vendor and health information of a set of backup network slices provided by a second vendor. The network slice controller evaluates, using a set of policies corresponding to management of the active network slice, the health information of the active network slice to determine whether the active network slice has failed. As a result of the failure of the active network slice, the network slice controller identifies one or more backup network slices of the set of backup network slices to serve as new active network slices. The network slice controller activates these one or more backup network slices to serve as the new active network slices for the network.
-
公开(公告)号:US11115808B2
公开(公告)日:2021-09-07
申请号:US16537217
申请日:2019-08-09
Applicant: Cisco Technology, Inc.
Inventor: Timothy P. Stammers , Suraj Sharad Mody , Aeneas Sean Dodd-Noble
Abstract: In one embodiment, a method comprises communicating with a plurality of network elements via a first communication protocol to obtain state information of the plurality of network elements; receiving a request via a second communication protocol for a communication session to be established for a client computing device; selecting one or more network elements, wherein the selection is based on at least a portion of the state information of the network elements; and communicating identification information of the one or more network elements selected for use in the communication session.
-
公开(公告)号:US10972463B2
公开(公告)日:2021-04-06
申请号:US16180678
申请日:2018-11-05
Applicant: Cisco Technology, Inc.
Inventor: Om Prakash Suthar , Mark Ammar Rayes , Aeneas Sean Dodd-Noble , Michael David Geller , Ian McDowell Campbell
IPC: H04M1/66 , H04M1/68 , H04M3/16 , H04L29/06 , H04W4/70 , H04W12/06 , H04W8/24 , H04W12/08 , G06F9/455
Abstract: Various implementations disclosed herein enable blockchain programming in NB-IoT devices. In various implementations, a method of blockchain authentication is performed by a computing device including one or more processors, and a non-transitory memory. In various implementations, the method includes maintaining a blockchain for a machine-to-machine network, wherein the machine-to-machine network is a narrowband internet of things network. In some implementations, the method includes receiving a request for a first set of data from the blockchain by a second device. In some implementations, the method includes determining based on the request, the first set of data from the blockchain by traversing a series of blocks from the blockchain. In some implementations, the method includes packaging the first set of data from the blockchain according to a protocol into a packaged data unit and transmitting the packaged data unit to the second device.
-
公开(公告)号:US10939308B2
公开(公告)日:2021-03-02
申请号:US16353777
申请日:2019-03-14
Applicant: Cisco Technology, Inc.
Inventor: Om Prakash Suthar , Arghya Mukherjee , Amarnath Sury Arvind , Aeneas Sean Dodd-Noble
IPC: G06F15/173 , G06F15/16 , H04W24/02 , H04L12/24 , H04W64/00
Abstract: A network device such as a network function (NF) entity or an application function (AF) entity in a communication network monitors network traffic for a plurality of peer-to-peer transactions associated with an application, where each peer-to-peer transaction includes communications between a user and a peer in the communication network. The network device also determines a set of geographic locations corresponding to one or more peer endpoints for the plurality of peer-to-peer transactions based on the network traffic, and determines an optimal midpoint between the set of geographic locations. The network device further deploys an edge node in the communication network to serve a subsequent peer-to-peer transaction for the application based on the optimal midpoint.
-
75.
公开(公告)号:US20210051437A1
公开(公告)日:2021-02-18
申请号:US16542591
申请日:2019-08-16
Applicant: Cisco Technology, Inc.
Inventor: Arghya Mukherjee , Om Prakash Suthar , Vivek Agarwal , Amarnath Sury Arvind , Rajiv Asati , Aeneas Sean Dodd-Noble
Abstract: Methods are provided to preemptively reconfigure a mobile network to respond to external emergencies. The method is performed at a network device of a service provider which provides access to a mobile network for wireless device. The method includes obtaining a message indicating an occurrence of a disaster. The message includes at least an emergency type and location information. The method further includes determining, based on the emergency type, a reconfiguration policy for reconfiguring the mobile network in an area indicated by the location information and reconfiguring the mobile network based on the reconfiguration policy. The method further includes authenticating a disaster application function and a notification message informing about an occurrence of a disaster.
-
公开(公告)号:US20210006626A1
公开(公告)日:2021-01-07
申请号:US17024465
申请日:2020-09-17
Applicant: Cisco Technology, Inc.
Inventor: Aeneas Sean Dodd-Noble , Om Prakash Suthar , Ianik Semco
Abstract: A network function (NF) entity in a communication network receives User Plane Function (UPF) registration information for a plurality of UPFs, the registration information including a respective network attribute for each UPF. The NF entity associates each UPF with a corresponding network based on the respective network attribute, and map one or more User Equipment (UE) to the corresponding network based on a security policy to create a UE-to-network table. The NF further receives a request to establish a session for a subsequent UE, the request including a subsequent UE identifier, and determine an access permission for the subsequent UE to access the corresponding network based on the subsequent UE identifier and the UE-to-network table. The NF selects one UPF from the plurality of UPF to service the session for the subsequent UE based on the access permission, and an association between the one UPF and the corresponding network.
-
公开(公告)号:US20200351717A1
公开(公告)日:2020-11-05
申请号:US16402548
申请日:2019-05-03
Applicant: Cisco Technology, Inc.
Inventor: Alon Shlomo Bernstein , Aeneas Sean Dodd-Noble , Alon Ben Ami
Abstract: A Centralized Self Organizing Network (C-SON) automation platform for managing a backhaul infrastructure in a telecommunication network. The C-SON automation platform monitors one or more backhaul utilization performance indicators corresponding to a backhaul infrastructure, which infrastructure transports data between one or more User Equipment (UE) connected to a small cell and a data network. The C-SON further receives subscriber data for at least one User Equipment (UE) and location data for the at least one UE from at least one Network Function (NF), and maps the at least one UE to a backhaul service flow and the small cell based on the subscriber data and the location data. The C-SON automation platform determines the backhaul utilization performance indicator exceeds a backhaul threshold limit for the backhaul service flow, and adjusts a bandwidth utilization of the backhaul infrastructure based on the backhaul utilization parameter exceeding the backhaul threshold limit.
-
78.
公开(公告)号:US20200296603A1
公开(公告)日:2020-09-17
申请号:US16353777
申请日:2019-03-14
Applicant: Cisco Technology, Inc.
Inventor: Om Prakash Suthar , Arghya Mukherjee , Amarnath Sury Arvind , Aeneas Sean Dodd-Noble
Abstract: A network device such as a network function (NF) entity or an application function (AF) entity in a communication network monitors network traffic for a plurality of peer-to-peer transactions associated with an application, where each peer-to-peer transaction includes communications between a user and a peer in the communication network. The network device also determines a set of geographic locations corresponding to one or more peer endpoints for the plurality of peer-to-peer transactions based on the network traffic, and determines an optimal midpoint between the set of geographic locations. The network device further deploys an edge node in the communication network to serve a subsequent peer-to-peer transaction for the application based on the optimal midpoint.
-
79.
公开(公告)号:US10673618B2
公开(公告)日:2020-06-02
申请号:US16159950
申请日:2018-10-15
Applicant: Cisco Technology, Inc.
Inventor: Om Prakash Suthar , Ammar Rayes , Michael David Geller , Ian McDowell Campbell , Aeneas Sean Dodd-Noble
IPC: H04L29/06 , H04L9/06 , H04W12/06 , H04W12/08 , G06Q20/40 , G06Q20/32 , H04W60/00 , G06Q20/36 , G06Q20/10 , G06Q20/38 , G06Q20/06 , H04L9/32 , G06F9/455 , H04L9/08 , H04L9/30 , H04L12/911 , H04W8/02 , H04W88/02 , H04W8/18 , H04W60/04
Abstract: A Network Function (NF) entity in a telecommunication network receives blockchain credentials associated with UE and selects a Blockchain Charging Function (BCF). The NF entity further generates a Charging Data Record (CDR) corresponding to network resources, and sends a charging request based on the CDR (and policy rules) to the BCF entity over a blockchain network interface. The BCF entity sends a confirmation of the charging request, and the NF entity, based on the confirmation, provisions the network resources to the UE.
-
公开(公告)号:US10660061B2
公开(公告)日:2020-05-19
申请号:US16403062
申请日:2019-05-03
Applicant: Cisco Technology, Inc.
Inventor: Aeneas Sean Dodd-Noble , Pablo Camarillo Garvia , Om Prakash Suthar
Abstract: Aspects of the disclosed technology provide ways to report User Equipment (UE) device locations in a 5G network for the purpose of redirecting application traffic from proximately located Data Networks (DNs). In one aspect, the disclosed technology encompasses a process for conveying User Equipment (UE) information to an Application Function (AF), the process includes steps for receiving, at an intermediate-User Plane Function (I-UPF) entity, User Equipment (UE) uplink data from a Radio Access Network (RAN), determining if sharing of location information or application information associated with the UE is restricted, and encapsulating first location metadata or application metadata in an SRv6 packet if the sharing of location information or application information is not restricted. Systems and machine-readable media are also provided.
-
-
-
-
-
-
-
-
-