-
公开(公告)号:US12149548B2
公开(公告)日:2024-11-19
申请号:US17515014
申请日:2021-10-29
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Li Zhao , Chuanwei Li , Feiliang Wang
IPC: H04L9/40 , G06F18/214 , G06N20/00 , H04L45/00 , H04L45/02 , H04W12/121 , H04W12/00
Abstract: The present disclosure provides a hierarchical method of identifying unauthorized network traffic in a network by applying, at one of a first plurality of nodes of a network, a first level of network traffic analysis to identify received network traffic as one of authorized or suspicious network traffic, the one of the first plurality of nodes having a first path for traffic routing and a second path to one of a second plurality of nodes of the network, the second path being used for forwarding the suspicious network traffic to the one of the second plurality of nodes; tagging the received network traffic as the suspicious network traffic; and sending the suspicious network traffic to the one of the second plurality of nodes over the second path, the second network node applying a second level of network analysis to determine if the received network traffic is authorized, unauthorized or remains suspicious.
-
公开(公告)号:US11159409B2
公开(公告)日:2021-10-26
申请号:US16419124
申请日:2019-05-22
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Li Zhao , Chuanwei Li , Feiliang Wang
IPC: H04L12/26 , H04W84/18 , H04L12/751 , H04L12/24 , H04W4/06
Abstract: In one embodiment, a method comprises: determining, by a network device in a wireless data network, a past throughput of broadcast data packets transmitted at broadcast transmission intervals of a prescribed broadcast schedule over a selected measurement interval, the broadcast transmission intervals each adjacent to unicast transmission intervals allocated in the wireless data network, each of the broadcast transmission intervals in the prescribed broadcast schedule initially set at a prescribed duration; predicting, by the network device, a predicted throughput of a future broadcast transmission interval of the prescribed broadcast schedule, for transmission of at least a future broadcast data packet, based on executing a trendline prediction of the predicted throughput using the past throughput over the selected measurement interval; and adjusting the corresponding prescribed duration of the future broadcast transmission interval, relative to the corresponding adjacent unicast transmission interval following the future broadcast transmission interval, based on the predicted throughput.
-
公开(公告)号:US11128554B1
公开(公告)日:2021-09-21
申请号:US16265046
申请日:2019-02-01
Applicant: Cisco Technology, Inc.
Inventor: Yinfang Wang , Yajun Xia , Feiliang Wang , Chuanwei Li
Abstract: In one embodiment, a technique comprises monitoring data transfer over a radio frequency (RF) link between a first device and a second device in a mesh network where the second device is a descendent node and the first device is a parent node. The technique further transfers the data over a power link communication (PLC) when the RF link is inactive. The method also includes broadcasting, by the second device, RF link availability to at least a third device in the mesh network when the RF link with the first device is inactive where the third device has an active link with the second device and the third device is a descendent node of the second device. The method then includes communicating, between the second device and the third device, through the active RF link.
-
公开(公告)号:US20200259592A1
公开(公告)日:2020-08-13
申请号:US16273251
申请日:2019-02-12
Applicant: Cisco Technology, Inc.
Inventor: Wenjia Wu , Nan Yi , Huimin She , Chuanwei Li
Abstract: In one embodiment, a device in a network determines that a plurality of packets should be aggregated, each of the plurality of packets comprising a payload. The device generates, for each of the payloads, a sub-media access control (sub-MAC) header that comprises a sequence number and a frame check sequence (FCS). The device forms an aggregated packet that comprises a physical layer (PHY) header, a MAC header, the payloads, and the generated sub-MAC headers for the payloads. The device sends the aggregated packet to another device in the network.
-
公开(公告)号:US11811636B2
公开(公告)日:2023-11-07
申请号:US17410015
申请日:2021-08-24
Applicant: Cisco Technology, Inc.
Inventor: Yinfang Wang , Yajun Xia , Feiliang Wang , Chuanwei Li
IPC: H04L43/0888 , H04B3/54 , H04L12/18 , H04W72/12 , H04W84/18
CPC classification number: H04L43/0888 , H04B3/54 , H04L12/189 , H04W72/12 , H04W84/18
Abstract: In one embodiment, a technique comprises monitoring data transfer over a radio frequency (RF) link between a first device and a second device in a mesh network where the second device is a descendent node and the first device is a parent node. The technique further transfers the data over a power link communication (PLC) when the RF link is inactive. The method also includes broadcasting, by the second device, RF link availability to at least a third device in the mesh network when the RF link with the first device is inactive where the third device has an active link with the second device and the third device is a descendent node of the second device. The method then includes communicating, between the second device and the third device, through the active RF link.
-
公开(公告)号:US20210297342A1
公开(公告)日:2021-09-23
申请号:US16825171
申请日:2020-03-20
Applicant: Cisco Technology, Inc.
Inventor: Huimin She , Lele Zhang , Shiwei Gao , Xiaoguang Jason Chen , Chuanwei Li
IPC: H04L12/721 , H04L12/24 , H04L12/751
Abstract: Techniques for utilizing Software-Defined Field-Area Network (SD-FAN) controllers to receive a geographic location and transmission power of individual nodes and generate a geographic location topology of a Field-Area Network (FAN) to provide nodes with location-aware route paths for data transmission. One or more SD-FAN controller(s) may maintain a geographic location database to store the geographic location and transmission power of the individual nodes. Each node may utilize a Destination Address Object to advertise its geographic location and transmission power to the SD-FAN controller. The SD-FAN controller(s) may utilize the geographic location table to generate the geographic location topology of the FAN and determine a location-aware route path for optimized data transmission between nodes in the FAN.
-
公开(公告)号:US10904778B1
公开(公告)日:2021-01-26
申请号:US16808887
申请日:2020-03-04
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Akram Ismail Sheriff , Chuanwei Li , Wenjia Wu
IPC: H04M11/04 , H04W24/04 , H04W4/12 , H04W40/22 , G06F1/30 , G06N20/00 , H04W8/00 , H04W40/24 , H04W84/18 , G06Q50/06
Abstract: Techniques and mechanisms for detecting and deducing of urgent messages in low-power and lossy networks (LLNs) using a correlation analysis of the nodes within a network and machine learning (ML) models. Utilizing these techniques, a field network director (FND) of the network can determine neighboring devices within the network. ML models may be utilized to determine that based upon receipt of a power outage notification (PON) message and/or a power restoration notification (PRN) message from nodes, neighboring nodes of the nodes may also have suffered a power outage and/or a subsequent power restoration, even if the FND did not receive a corresponding PON message and/or a corresponding PRN message from the neighboring nodes of the network. Thus, loss of power and subsequent power restoration may be handled for large numbers of neighboring nodes within the network, even when only a few PON messages and/or subsequent PRN messages are received.
-
公开(公告)号:US10856170B1
公开(公告)日:2020-12-01
申请号:US16438669
申请日:2019-06-12
Applicant: Cisco Technology, Inc.
Inventor: Yajun Xia , Chuanwei Li , Lele Zhang , Yinfang Wang
Abstract: In one embodiment, a method comprises: forwarding, by a root network device in a low power and lossy network, an authentication message to a constrained child network device having attached to the root network device, the authentication message generated by an authenticator device and specifying a certificate associated with the authenticator device; receiving a second authentication message destined for a second constrained network device via the constrained child network device; removing, from the second authentication message, the certificate; and outputting, by the root network device, the modified second authentication message that does not include the certificate toward the second constrained network device via the constrained child network device, the modified second authentication message causing the constrained child network device to restore the second authentication message for delivery to the second constrained network device, based on insertion of the certificate back into the modified second authentication message.
-
公开(公告)号:US10462821B2
公开(公告)日:2019-10-29
申请号:US15905647
申请日:2018-02-26
Applicant: Cisco Technology, Inc.
Inventor: Nan Yi , Huimin She , Yong Zhang , Chuanwei Li
IPC: H04W74/08
Abstract: A computer-implemented method of determining backoff windows in a wireless computer network is disclosed. The method comprises defining, by an access point in the wireless computer network, a plurality of collision patterns related to message transmission via one or more communication channels in the wireless computer network; detecting, by the access point, occurrence of one of the plurality of collision patterns involving a group of sender nodes in the wireless computer network that have each transmitted a message to the access point and received no acknowledgement message from the access point indicating successful transmission; setting to a first length a length of a backoff window for avoiding collision in data transmission based on a size of the group of sender nodes; sending a first message to a first plurality of nodes in the wireless computer network, the first message instructing performance of backoff during the backoff window having the first length.
-
公开(公告)号:US20230362654A1
公开(公告)日:2023-11-09
申请号:US18353772
申请日:2023-07-17
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Yajun Xia , Chuanwei Li , Li Zhao
IPC: H04W12/122 , H04W4/70 , G16Y30/10 , H04L9/40 , H04W24/08 , H04W64/00 , H04L43/0829 , H04L43/16
CPC classification number: H04W12/122 , H04W4/70 , G16Y30/10 , H04L63/1416 , H04W24/08 , H04W64/00 , H04L43/0829 , H04L43/16 , H04W84/18
Abstract: A method includes determining a number of drops of a plurality of messages sent to a first node of a plurality of nodes within a mesh network. Based at least in part on the number of drops of the plurality of messages exceeding a threshold number of drops for a time period, decrementing a first rating assigned to the first node to a second rating assigned to the first node. Based at least in part on the second rating being below a rating threshold, determining that the first node is a potentially malicious node. Based at least in part on a first distance to the first node being larger than a distance threshold, identifying that the first node is a malicious node. The method may further include ending communications with the first node.
-
-
-
-
-
-
-
-
-