-
公开(公告)号:US10779188B2
公开(公告)日:2020-09-15
申请号:US16123830
申请日:2018-09-06
Applicant: Cisco Technology, Inc.
Inventor: Keith Neil Mark Dsouza , Shivaji Pundlik Diwane , Madhusudana Rao Kata , Sendilvadivu Ganesan , Divya Sudhakaran Pillai
Abstract: Disclosed are methods, systems and non-transitory computer readable mediums for estimating bandwidth over packet data networks, for example, 5G networks. The methods, systems and non-transitory computer readable mediums can include modifying a buffer status report (e.g., via application programming interface) and reporting, to an eNodeB, the modified buffer status report. The methods, systems and non-transitory computer readable mediums can also include calculating the required throughput to satisfying transmitting a data amount stored at a regular buffer, receiving, from the eNodeB, uplink grants and transmitting, data from the regular buffer. The methods, systems and non-transitory computer readable mediums can also include calculating estimated throughput from the user equipment, determining if the estimated throughput services the data amount stored at the regular buffer and in response to the estimated throughput being insufficient to service the data amount stored the regular buffer, determining if a counter is less than a threshold value.
-
公开(公告)号:US11864020B2
公开(公告)日:2024-01-02
申请号:US17014647
申请日:2020-09-08
Applicant: Cisco Technology, Inc.
Inventor: Keith Neil Mark Dsouza , Shivaji Pundlik Diwane , Madhusudana Rao Kata , Sendilvadivu Ganesan , Divya Sudhakaran Pillai
IPC: H04L12/00 , H04W28/02 , H04L43/0888 , H04L43/0894 , H04W28/18 , H04W72/21 , H04W84/04
CPC classification number: H04W28/0278 , H04L43/0888 , H04L43/0894 , H04W28/18 , H04W72/21 , H04W84/045
Abstract: Disclosed are methods, systems and non-transitory computer readable mediums for estimating bandwidth over packet data networks, for example, 5G networks. The methods, systems and non-transitory computer readable mediums can include modifying a buffer status report (e.g., via application programming interface) and reporting, to an eNodeB, the modified buffer status report. The methods, systems and non-transitory computer readable mediums can also include calculating the required throughput to satisfying transmitting a data amount stored at a regular buffer, receiving, from the eNodeB, uplink grants and transmitting, data from the regular buffer. The methods, systems and non-transitory computer readable mediums can also include calculating estimated throughput from the user equipment, determining if the estimated throughput services the data amount stored at the regular buffer and in response to the estimated throughput being insufficient to service the data amount stored the regular buffer, determining if a counter is less than a threshold value.
-
公开(公告)号:US11310664B2
公开(公告)日:2022-04-19
申请号:US16884604
申请日:2020-05-27
Applicant: Cisco Technology, Inc.
Inventor: Shivaji Pundlik Diwane , Hungjen Sean Yang , Sundara Paal Rani Thirumalaiappan , Keith Neil Mark Dsouza , Sendilvadivu Ganesan
IPC: H04W12/08 , H04W12/50 , H04W12/069 , H04W12/126 , H04W12/0431
Abstract: In one illustrative example, a mobile network extender has a network interface configured to connect with a host router and a cellular modem configured to provide a wireless link for communications via a cellular mobile network. In a pairing process, the extender may establish a secure encrypted channel with the router via the network interface. In a locking process, the extender may receive information from the router and verify the information. Upon verification, the extender may be set in a locked state in which the extender is logically locked to the router. The extender may also receive and store a secret session key from the router, and permit the router to acquire the extender for communications. In the locked state, the extender may permit or deny subsequent router acquisition upon router reconnection based on verifying, using the secret session key, authentication data received via the network interface.
-
公开(公告)号:US10750368B1
公开(公告)日:2020-08-18
申请号:US16291833
申请日:2019-03-04
Applicant: Cisco Technology, Inc.
Inventor: Shivaji Pundlik Diwane , Hungjen Sean Yang , Sundara Paal Rani Thirumalaiappan , Keith Neil Mark Dsouza , Sendilvadivu Ganesan
Abstract: In one illustrative example, a mobile network extender has a network interface configured to connect with a host router and a cellular modem configured to provide a wireless link for communications via a cellular mobile network. In a pairing process, the extender may establish a secure encrypted channel with the router via the network interface. In a locking process, the extender may receive information from the router and verify the information. Upon verification, the extender may be set in a locked state in which the extender is logically locked to the router. The extender may also receive and store a secret session key from the router, and permit the router to acquire the extender for communications. In the locked state, the extender may permit or deny subsequent router acquisition upon router reconnection based on verifying, using the secret session key, authentication data received via the network interface.
-
公开(公告)号:US20200322801A1
公开(公告)日:2020-10-08
申请号:US16884604
申请日:2020-05-27
Applicant: Cisco Technology, Inc.
Inventor: Shivaji Pundlik Diwane , Hungjen Sean Yang , Sundara Paal Rani Thirumalaiappan , Keith Neil Mark Dsouza , Sendilvadivu Ganesan
Abstract: In one illustrative example, a mobile network extender has a network interface configured to connect with a host router and a cellular modem configured to provide a wireless link for communications via a cellular mobile network. In a pairing process, the extender may establish a secure encrypted channel with the router via the network interface. In a locking process, the extender may receive information from the router and verify the information. Upon verification, the extender may be set in a locked state in which the extender is logically locked to the router. The extender may also receive and store a secret session key from the router, and permit the router to acquire the extender for communications. In the locked state, the extender may permit or deny subsequent router acquisition upon router reconnection based on verifying, using the secret session key, authentication data received via the network interface.
-
公开(公告)号:US10798591B2
公开(公告)日:2020-10-06
申请号:US15581007
申请日:2017-04-28
Applicant: Cisco Technology, Inc.
Inventor: Madhusudana Rao Kata , Shivaji P. Diwane , Keith Dsouza , Sendilvadivu Ganesan , Vivek Jain
IPC: H04W4/00 , H04W24/02 , H04B7/08 , H04B7/0404 , H04B7/022 , H04B7/06 , H04L12/26 , H04B17/29 , H04B17/318 , H04B17/23 , H04L29/08
Abstract: In one embodiment, a diagnostic device determines signal strengths of two antennas of a multi-antenna device. When the signal strength of each of the two antennas is unacceptable, the diagnostic device provides a recommendation to adjust each of the two antennas. Alternatively, when the signal strength of a first antenna of the two antennas is unacceptable while the signal strength of a second antenna of the two antennas is acceptable, the diagnostic device provides a recommendation to adjust the first antenna. However, when the signal strength of each of the two antennas is acceptable, but a difference between the signal strength of a first antenna and a second antenna of the two antennas is greater than a threshold, then the diagnostic device determines a weaker antenna with weaker signal strength between the first antenna and the second antenna, and provides a recommendation to adjust the weaker antenna.
-
公开(公告)号:US20200288317A1
公开(公告)日:2020-09-10
申请号:US16291833
申请日:2019-03-04
Applicant: Cisco Technology, Inc.
Inventor: Shivaji Pundlik Diwane , Hungjen Sean Yang , Sundara Paal Rani Thirumalaiappan , Keith Neil Mark Dsouza , Sendilvadivu Ganesan
Abstract: In one illustrative example, a mobile network extender has a network interface configured to connect with a host router and a cellular modem configured to provide a wireless link for communications via a cellular mobile network. In a pairing process, the extender may establish a secure encrypted channel with the router via the network interface. In a locking process, the extender may receive information from the router and verify the information. Upon verification, the extender may be set in a locked state in which the extender is logically locked to the router. The extender may also receive and store a secret session key from the router, and permit the router to acquire the extender for communications. In the locked state, the extender may permit or deny subsequent router acquisition upon router reconnection based on verifying, using the secret session key, authentication data received via the network interface.
-
公开(公告)号:US20200084658A1
公开(公告)日:2020-03-12
申请号:US16123830
申请日:2018-09-06
Applicant: Cisco Technology, Inc.
Inventor: Keith Neil Mark Dsouza , Shivaji Pundlik Diwane , Madhusudana Rao Kata , Sendilvadivu Ganesan , Divya Sudhakaran Pillai
Abstract: Disclosed are methods, systems and non-transitory computer readable mediums for estimating bandwidth over packet data networks, for example, 5G networks. The methods, systems and non-transitory computer readable mediums can include modifying a buffer status report (e.g., via application programming interface) and reporting, to an eNodeB, the modified buffer status report. The methods, systems and non-transitory computer readable mediums can also include calculating the required throughput to satisfying transmitting a data amount stored at a regular buffer, receiving, from the eNodeB, uplink grants and transmitting, data from the regular buffer. The methods, systems and non-transitory computer readable mediums can also include calculating estimated throughput from the user equipment, determining if the estimated throughput services the data amount stored at the regular buffer and in response to the estimated throughput being insufficient to service the data amount stored the regular buffer, determining if a counter is less than a threshold value.
-
公开(公告)号:US10225774B2
公开(公告)日:2019-03-05
申请号:US15478367
申请日:2017-04-04
Applicant: Cisco Technology, Inc.
Inventor: Shivaji P. Diwane , Vivek Datar , Jeslin Antony Puthenparambil , Sendilvadivu Ganesan , Keith Dsouza , Sundara Paal Rani Thirumalaippan
Abstract: In one embodiment, a device, having a first and a second network interface, detects a switchover by the first network interface from using a preferred wireless access standard to access a carrier network to using a second wireless access standard to access the carrier network. The device identifies when the preferred wireless access standard is again available from the carrier network using the second network interface and causes the first network interface to switch to using the preferred wireless access standard, based on identification by the second network interface that the preferred wireless access standard is again available from the carrier network.
-
公开(公告)号:US20180317100A1
公开(公告)日:2018-11-01
申请号:US15581007
申请日:2017-04-28
Applicant: Cisco Technology, Inc.
Inventor: Madhusudana Rao Kata , Shivaji P. Diwane , Keith Dsouza , Sendilvadivu Ganesan , Vivek Jain
IPC: H04W24/02 , H04B17/318 , H04B7/08 , H04L12/24 , H04B17/23 , H04B7/0404
Abstract: In one embodiment, a diagnostic device determines signal strengths of two antennas of a multi-antenna device. When the signal strength of each of the two antennas is unacceptable, the diagnostic device provides a recommendation to adjust each of the two antennas. Alternatively, when the signal strength of a first antenna of the two antennas is unacceptable while the signal strength of a second antenna of the two antennas is acceptable, the diagnostic device provides a recommendation to adjust the first antenna. However, when the signal strength of each of the two antennas is acceptable, but a difference between the signal strength of a first antenna and a second antenna of the two antennas is greater than a threshold, then the diagnostic device determines a weaker antenna with weaker signal strength between the first antenna and the second antenna, and provides a recommendation to adjust the weaker antenna.
-
-
-
-
-
-
-
-
-