-
公开(公告)号:US12267328B2
公开(公告)日:2025-04-01
申请号:US17695265
申请日:2022-03-15
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Carlos M. Pignataro , John Matthew Swartz , Paul Brian Giralt , David John Zacks , Gonzalo Salgueiro
IPC: H04L9/40
Abstract: Methods are provided in which a network device hosts distinct network access resources that are managed by different entities. The method includes obtaining a request for partitioning one or more network resources of an on-premise network device for connecting one or more endpoints to a first network managed by a first entity. The on-premise network device connects one or more endpoints to a second network managed by a different entity. The method further involves partitioning, based on the request, the one or more network resources and connecting the one or more endpoints to the first network using the one or more network resources. The one or more network resources are managed by the first entity while at least one other network resource of the on-premise network device is managed by the different entity and is associated with connecting the one or more endpoints to the second network.
-
公开(公告)号:US11716288B2
公开(公告)日:2023-08-01
申请号:US16730522
申请日:2019-12-30
Applicant: Cisco Technology, Inc.
Inventor: Charles Calvin Byers , Gonzalo Salgueiro , Joseph Michael Clarke , Chidambaram Arunachalam , Nagendra Kumar Nainar , Avraham Poupko
CPC classification number: H04L47/823 , G06F16/119 , H04L47/80
Abstract: Systems, methods, and computer-readable media for orchestrating data center resources and user access to data. In some examples, a system can determine, at a first time, that a user will need, at a second time, access to data stored at a first location, from a second location. The system can identify a node which is capable of storing the data and accessible by a device from the second location. The system can also determine a first service parameter associated with a network connection between the device and the first location and a second service parameter associated with a network connection between the device and the node. When the second service parameter has a higher quality than the first service parameter, the system can migrate the data from the first location to the node so the device has access to the data from the second location through the node.
-
公开(公告)号:US11595283B2
公开(公告)日:2023-02-28
申请号:US17385457
申请日:2021-07-26
Applicant: Cisco Technology, Inc.
Inventor: Derek Engi , Jorge Martin Garcia Rangel , Gonzalo Salgueiro
IPC: G06F15/173 , H04L43/0823 , H04L43/04 , H04L9/40 , H04L43/065
Abstract: In one embodiment, a device maintains a buffer of historical telemetry data of a particular type of telemetry. The device obtains new telemetry data of the particular type of telemetry. The device makes a state evaluation by comparing the new telemetry data to the buffer, to determine whether the new telemetry data is an outlier. The device sends a message indicative of the new telemetry data to a message bus for delivery to a recipient that is not subscribed to receive telemetry data of the particular type of telemetry, when the device determines that the new telemetry data is an outlier.
-
公开(公告)号:US20230036547A1
公开(公告)日:2023-02-02
申请号:US17390229
申请日:2021-07-30
Applicant: Cisco Technology, Inc.
Inventor: David M. Hanes , Gonzalo Salgueiro , Robert Edgar Barton , Sebastian Jeuk
IPC: H04L29/06
Abstract: Systems, methods, and computer-readable media are provided for dynamic allocation of network security resources and measures to network traffic between end terminals on a network and a network destination, based in part on an independently sourced reputation score of the network destination. In one aspect, a method includes receiving, at a cloud network controller, a request from an end terminal for information on a network destination; determining, at the cloud network controller, a reputation score for the network destination; determining, at the cloud network controller, one or more security measures to be applied when accessing the network destination, based on the reputation score; and communicating, by the cloud network controller, the one or more security measures to the end terminal, wherein the end terminal communicates the one or more security measures to a third-party security service provider for applying to communications between the end terminal and the network destination.
-
公开(公告)号:US20230032585A1
公开(公告)日:2023-02-02
申请号:US17390527
申请日:2021-07-30
Applicant: Cisco Technology, Inc.
Inventor: Sebastian Jeuk , Sridar Kandaswamy , Gonzalo Salgueiro
Abstract: Techniques are described herein for generating and deploying network topologies to implement machine learning systems. A topology deployment system may receive data representing a logical model corresponding to a machine learning system, and may analyze the machine learning system to determine various components and attributes of the machine learning system to be deployed. Based on the components and attributes of the machine learning system, the topology deployment system may select target resources and determine constraints for the deployment of the machine learning system. A corresponding network topology may be generated and deployed across one or a combination of workload resource domains. The topology deployment system also may monitor and update the deployed network topology, based on performance metrics of the machine learning system and/or the current status of the system in a machine learning pipeline.
-
公开(公告)号:US20220408217A1
公开(公告)日:2022-12-22
申请号:US17350567
申请日:2021-06-17
Applicant: Cisco Technology, Inc.
Inventor: Julie Allen , Fernando Molina Rodriguez , Andi Bridgett Cho , Matthew L. Sommer , Gonzalo Salgueiro , Pascale Delaunay
Abstract: Techniques are for provided located-based contextual services to users by automatically creating location-based contextually relevant communication sessions that may take on a variety of forms, including contextual chats and micro-local services that are ephemeral, curated by a location owner and personalized by a user. As a user's context shifts throughout the day (from work to shopping to entertainment, etc.) the presented techniques filter content differently based on what the user may care about at a particular moment when the user is at a particular venue. The automatic creation and deletion of an ephemeral space/channel provides a dynamic application that changes its content or behavior based on a user's location. The user may control the interactivity level based on an adaptive user identifier by which a user's identity may take on different versions depending on location and time of day.
-
公开(公告)号:US11516139B2
公开(公告)日:2022-11-29
申请号:US17110196
申请日:2020-12-02
Applicant: Cisco Technology, Inc.
IPC: H04L12/851 , H04L12/801 , H04L12/807 , H04L12/815 , H04L12/841 , H04L47/2441 , H04L47/22 , H04L47/27 , H04L47/12 , H04L47/283 , H04L47/10
Abstract: Systems and methods provide for generating traffic class-specific congestion signatures and other machine learning models for improving network performance. In some embodiments, a network controller can receive historical traffic data captured by a plurality of network devices within a first period of time that the network devices apply one or more traffic shaping policies for a predetermined traffic class and a predetermined congestion state. The controller can generate training data sets including flows of the historical traffic data labeled as corresponding to the predetermined traffic class and predetermined congestion state. The controller can generate, based on the training data sets, traffic class-specific congestion signatures that receive input traffic data determined to correspond to the predetermined traffic class and output an indication whether the input traffic data corresponds to the predetermined congestion state. The controller can adjust, based on the congestion signatures, traffic shaping operations of the plurality of network devices.
-
公开(公告)号:US11456917B2
公开(公告)日:2022-09-27
申请号:US16889306
申请日:2020-06-01
Applicant: Cisco Technology, Inc.
Inventor: Howard Steven Nelson , Derek William Engi , Gonzalo Salgueiro , Vijay Pillai
IPC: H04L41/0893 , G06N20/00 , H04L41/16 , H04L41/0813 , G06K9/62
Abstract: Techniques and architecture for determining compliance of a network with respect to a network design solution. The techniques may include determining a role for each network device of a network that comprises multiple network devices and determining one or more policies related to each network device with respect to other network devices of the network. The techniques may further include based at least in part on the roles for each network device and the one or more policies, determining a level of compliance of a configuration of the network with respect to a network design solution. Based at least in part on the level of compliance, a remedial action may be performed. In configurations, a machine learning model may be used.
-
公开(公告)号:US20220014444A1
公开(公告)日:2022-01-13
申请号:US17482408
申请日:2021-09-22
Applicant: Cisco Technology, Inc.
Inventor: Shankar Ramanathan , Muhilan Natarajan , Gonzalo Salgueiro , Jerome Henry , Robert Edgar Barton
Abstract: Aggregated health information for a managed network may be retrieved and processed in response to changes to the managed network topology, configuration, or software. In response to receiving notification that a change to a component of the managed network has occurred, a change audit analysis engine can retrieve performance indicator information from components along a traceroute including the component which underwent the change. The retrieved performance indicator information can be processed by a memory based neural network to predict an impact of the change on the aggregated health of the managed network. The predicted impact can be compared to network health information retrieved through an ongoing basis and issues can be determined based on a comparison of the predict impact and the retrieved health information.
-
公开(公告)号:US20210377114A1
公开(公告)日:2021-12-02
申请号:US16889306
申请日:2020-06-01
Applicant: Cisco Technology, Inc.
Inventor: Howard Steven Nelson , Derek William Engi , Gonzalo Salgueiro , Vijay Pillai
Abstract: Techniques and architecture for determining compliance of a network with respect to a network design solution. The techniques may include determining a role for each network device of a network that comprises multiple network devices and determining one or more policies related to each network device with respect to other network devices of the network. The techniques may further include based at least in part on the roles for each network device and the one or more policies, determining a level of compliance of a configuration of the network with respect to a network design solution. Based at least in part on the level of compliance, a remedial action may be performed. In configurations, a machine learning model may be used.
-
-
-
-
-
-
-
-
-