-
1.
公开(公告)号:US20200028920A1
公开(公告)日:2020-01-23
申请号:US16042828
申请日:2018-07-23
Applicant: Cisco Technology, Inc.
Inventor: KONSTANTIN LIVANOS , ROBERT GLENN SMITH , IAN MCDOWELL CAMPBELL
Abstract: A network function (NF) profile repository function (NPRF) is provided to receive, for each one of a plurality of NF instances of a plurality of different NF types, information associated with the NF instance and store the information in memory. The NPRF may then also receive, from an NF repository function (NRF), a message which indicates a request for information associated with one or more NF instances of an indicated NF type. In response, the NPRF may retrieve, from the memory based on the indicated NF type, information associated with the one or more NF instances. The NPRF may send, to the NRF, a message which indicates a response to the request, where the response includes retrieved information associated with the one or more NF instances.
-
公开(公告)号:US20250150348A1
公开(公告)日:2025-05-08
申请号:US18501771
申请日:2023-11-03
Applicant: Cisco Technology, Inc.
Inventor: Sanjay Kumar Hooda , MASSIMILIANO ARDICA , DARRIN JOSEPH MILLER , ELANGO GANESAN , IAN MCDOWELL CAMPBELL , SARAVANAN RADHAKRISHNAN
IPC: H04L41/0894 , H04L12/46 , H04L41/0893
Abstract: A method of cross-domain policy orchestration may include executing, with a cross-domain automation (CDA) controller, a macro-segmentation of a plurality of domains based at least in part on metadata defining a mapping to a corresponding plurality of domain controllers, and executing, with the CDA controller, a micro-segmentation of policies within a group based at least in part on a merged policy matrix obtained from policies of the domain controllers.
-
3.
公开(公告)号:US20200029249A1
公开(公告)日:2020-01-23
申请号:US16042630
申请日:2018-07-23
Applicant: Cisco Technology, Inc.
Inventor: KONSTANTIN LIVANOS , IAN MCDOWELL CAMPBELL
Abstract: A policy enforcement technique may be performed at a network node configured for exposure of services and capabilities, such as a service and capability exposure function (SCEF) or a network exposure function (NEF). In one illustrative example, the network node may receive a message which includes a request for background data transfer from an application server (AS) to a plurality of UEs of a group. The message may include mobile-terminated (MT) data to be delivered, a group ID associated with the group, a total bandwidth for the background data transfer for the group, and a transfer policy ID associated with a transfer policy. The network node may verify whether the total bandwidth for the background data transfer for the group is within a predefined aggregate bandwidth limit indicated in the transfer policy data. The network node may cause the background data to be sent to each one of the plurality of UEs via the mobile network, if the total bandwidth is within the predefined aggregate bandwidth limit. In some implementations, the network node may be configured to facilitate background data transfers and perform policy enforcement for transfers involving both IP data delivery and non-IP data delivery (NIDD).
-
-