-
公开(公告)号:US20230370886A1
公开(公告)日:2023-11-16
申请号:US18359392
申请日:2023-07-26
Applicant: Cisco Technology, Inc.
Inventor: Prakash C. JAIN , Sanjay K. HOODA , Vinay SAINI
CPC classification number: H04W28/0226 , H04L12/4633 , H04W84/12 , H04W88/08
Abstract: An enterprise network may receive a WiFi packet associated with a 5G service (or other type of service) at an access point (AP) in the enterprise network. The enterprise network determines whether the WiFi packet satisfies a first-packet policy associated with the 5G service, where the first-packet policy controls access to a tunnel for traversing the enterprise network to reach the 5G service. If the packet satisfies the policy, the enterprise network queries a map server to identify a location of a 5G border in the enterprise network that is connected to the 5G service. The enterprise network can transmit the WiFi packet on the tunnel with priority to meet SLA using the location of the 5G border.
-
公开(公告)号:US20220158869A1
公开(公告)日:2022-05-19
申请号:US17649955
申请日:2022-02-04
Applicant: Cisco Technology, Inc.
Inventor: Anand OSWAL , Muninder S. SAMBI , Sanjay K. HOODA , Gangadharan Byju PULARIKKAL , Kedar KARMARKAR
IPC: H04L12/46 , H04L12/18 , H04L61/5014 , H04L61/58 , H04L101/668
Abstract: Secure network segmentation using logical subnet segments is described. A single network segment or subnet provided by a third party is mapped into multiple layer-3 virtual or logical segments without requiring separate subnets. This mapping is accomplished by using virtual routing functions (VRFs) per logical subnet segment while retaining a single subnet across the segments. The logical subnet segments interact with the single network segment provided by the third party (ISP). The layer-3 VRF instances are created without the need for separate IP subnet pools per layer-3 segment. Each VRF instance for the various logical subnet segments is mapped to an identifier and tag.
-
公开(公告)号:US20210314249A1
公开(公告)日:2021-10-07
申请号:US17304672
申请日:2021-06-24
Applicant: Cisco Technology, Inc.
Inventor: Prakash JAIN , Sanjay K. HOODA , Victor MORENO
IPC: H04L12/751 , H04L12/66 , H04L12/707 , H04L29/06
Abstract: Techniques for network routing border convergence are described. Backup paths for external connections for a network are established and provide for a temporary path for network traffic during network routing convergence, preventing traffic loss at network border nodes.
-
公开(公告)号:US20210226817A1
公开(公告)日:2021-07-22
申请号:US16746903
申请日:2020-01-19
Applicant: Cisco Technology, Inc.
Inventor: Anand OSWAL , Muninder S. SAMBI , Sanjay K. HOODA , Gangadharan Byju PULARIKKAL , Kedar KARMARKAR
Abstract: Secure network segmentation using logical subnet segments is described. A single network segment or subnet provided by a third party is mapped into multiple layer-3 virtual or logical segments without requiring separate subnets. This mapping is accomplished by using virtual routing functions (VRFs) per logical subnet segment while retaining a single subnet across the segments. The logical subnet segments interact with the single network segment provided by the third party (ISP). The layer-3 VRF instances are created without the need for separate IP subnet pools per layer-3 segment. Each VRF instance for the various logical subnet segments is mapped to a Virtual Network Identifier (VNI) and Scalable Group Tag (SGT).
-
公开(公告)号:US20230344746A1
公开(公告)日:2023-10-26
申请号:US18343931
申请日:2023-06-29
Applicant: Cisco Technology, Inc.
Inventor: Prakash JAIN , Sanjay K. HOODA , Victor MORENO
CPC classification number: H04L45/02 , H04L63/0227 , H04L12/66 , H04L45/22
Abstract: Techniques for network routing border convergence are described. Backup paths for external connections for a network are established and provide for a temporary path for network traffic during network routing convergence, preventing traffic loss at network border nodes.
-
公开(公告)号:US20230021912A1
公开(公告)日:2023-01-26
申请号:US17443301
申请日:2021-07-23
Applicant: Cisco Technology, Inc.
Inventor: Prakash C. JAIN , Sanjay K. HOODA , Vinay SAINI
Abstract: An enterprise network may receive a WiFi packet associated with a 5G service (or other type of service) at an access point (AP) in the enterprise network. The enterprise network determines whether the WiFi packet satisfies a first-packet policy associated with the 5G service, where the first-packet policy controls access to a tunnel for traversing the enterprise network to reach the 5G service. If the packet satisfies the policy, the enterprise network queries a map server to identify a location of a 5G border in the enterprise network that is connected to the 5G service. The enterprise network can transmit the WiFi packet on the tunnel with priority to meet SLA using the location of the 5G border.
-
公开(公告)号:US20220158930A1
公开(公告)日:2022-05-19
申请号:US17650151
申请日:2022-02-07
Applicant: Cisco Technology, Inc.
Inventor: Shashank VINCHURKAR , Sanjay K. HOODA , Chiragkumar P. DESAI
Abstract: Techniques for extended network configuration conversion and reconfiguration are described. A network controller proceeds through a set of extended network nodes in an extended network and reconfigures ports in at the various nodes from a first configuration to a second configuration while preventing network traffic looping and maintaining data and management traffic connection to the nodes during the reconfiguration.
-
公开(公告)号:US20180367627A1
公开(公告)日:2018-12-20
申请号:US15834341
申请日:2017-12-07
Applicant: Cisco Technology, Inc.
Inventor: Sanjay K. HOODA , Prakash JAIN , Marc P. COMERAS , Victor M. MORENO , Atri INDIRESAN
CPC classification number: H04L67/26 , H04L61/103 , H04L61/1511 , H04L61/2015 , H04L61/6022
Abstract: The embodiments herein push notifications to network devices used by a shared service to which a roaming host in a network fabric is subscribed. For example, a network fabric controller can access a VN policy table which stores the relationships between the virtual networks in the network fabric. Using this table, the controller can identify what shared service VNs (i.e., extranets) can communicate with the host's VN. The controller can push out notifications to the network devices used by the shared service VNs to store the new location of the host. That is, the network devices that locally store a location of the host can update their routing caches to point to the new location of the host. In this manner, the network fabric can reduce the time needed to reconverge on the new location of the host by updating the network devices used by the shared service VNs.
-
公开(公告)号:US20240154900A1
公开(公告)日:2024-05-09
申请号:US18412207
申请日:2024-01-12
Applicant: Cisco Technology, Inc.
Inventor: Shashank VINCHURKAR , Sanjay K. HOODA , Chiragkumar P. DESAI
Abstract: Techniques for extended network configuration conversion and reconfiguration are described. A network controller proceeds through a set of extended network nodes in an extended network and reconfigures ports in at the various nodes from a first configuration to a second configuration while preventing network traffic looping and maintaining data and management traffic connection to the nodes during the reconfiguration.
-
公开(公告)号:US20230421481A1
公开(公告)日:2023-12-28
申请号:US17809343
申请日:2022-06-28
Applicant: Cisco Technology, Inc.
Inventor: Prakash C. JAIN , Balaji PITTA VENKATACHALAPATHY , Malathi A. SRINIVASAN , Sanjay K. HOODA , Victor MORENO
CPC classification number: H04L45/126 , H04L45/64
Abstract: Techniques for communication network routing include receiving, at a routing device associated with a first site in an overlay communication network, a dynamic parameter value associated with each of a plurality of additional sites in the overlay communication network. The plurality of additional sites are each configured to provide a first network service for a computing device in the first site. A second site in the overlay communication network is selected, from among the plurality of additional sites, based on a first dynamic parameter value associated with the first site and a received second dynamic parameter value associated with the second site. The first network service is provided from the second site for the computing device, based on the selecting the second site.
-
-
-
-
-
-
-
-
-