-
公开(公告)号:US20220070672A1
公开(公告)日:2022-03-03
申请号:US17011792
申请日:2020-09-03
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Yajun Xia , Chuanwei Li , Li Zhao
Abstract: A method includes identifying a potentially malicious node using a rating assigned to nodes within the network and decrementing the rating based on detected dropped messages to identify a potentially malicious node. The malicious node is identified based on location information obtained from the nodes within the network and comparable distances from the potentially malicious node. The method further includes ending communications with the malicious node and selecting a new parent node based on a presumption that any of the plurality of nodes other than the malicious node are non-malicious.
-
公开(公告)号:US20220038360A1
公开(公告)日:2022-02-03
申请号:US17410015
申请日:2021-08-24
Applicant: Cisco Technology, Inc.
Inventor: Yinfang Wang , Yajun Xia , Feiliang Wang , Chuanwei Li
Abstract: In one embodiment, a technique comprises monitoring data transfer over a radio frequency (RF) link between a first device and a second device in a mesh network where the second device is a descendent node and the first device is a parent node. The technique further transfers the data over a power link communication (PLC) when the RF link is inactive. The method also includes broadcasting, by the second device, RF link availability to at least a third device in the mesh network when the RF link with the first device is inactive where the third device has an active link with the second device and the third device is a descendent node of the second device. The method then includes communicating, between the second device and the third device, through the active RF link.
-
公开(公告)号:US11811636B2
公开(公告)日:2023-11-07
申请号:US17410015
申请日:2021-08-24
Applicant: Cisco Technology, Inc.
Inventor: Yinfang Wang , Yajun Xia , Feiliang Wang , Chuanwei Li
IPC: H04L43/0888 , H04B3/54 , H04L12/18 , H04W72/12 , H04W84/18
CPC classification number: H04L43/0888 , H04B3/54 , H04L12/189 , H04W72/12 , H04W84/18
Abstract: In one embodiment, a technique comprises monitoring data transfer over a radio frequency (RF) link between a first device and a second device in a mesh network where the second device is a descendent node and the first device is a parent node. The technique further transfers the data over a power link communication (PLC) when the RF link is inactive. The method also includes broadcasting, by the second device, RF link availability to at least a third device in the mesh network when the RF link with the first device is inactive where the third device has an active link with the second device and the third device is a descendent node of the second device. The method then includes communicating, between the second device and the third device, through the active RF link.
-
公开(公告)号:US10856170B1
公开(公告)日:2020-12-01
申请号:US16438669
申请日:2019-06-12
Applicant: Cisco Technology, Inc.
Inventor: Yajun Xia , Chuanwei Li , Lele Zhang , Yinfang Wang
Abstract: In one embodiment, a method comprises: forwarding, by a root network device in a low power and lossy network, an authentication message to a constrained child network device having attached to the root network device, the authentication message generated by an authenticator device and specifying a certificate associated with the authenticator device; receiving a second authentication message destined for a second constrained network device via the constrained child network device; removing, from the second authentication message, the certificate; and outputting, by the root network device, the modified second authentication message that does not include the certificate toward the second constrained network device via the constrained child network device, the modified second authentication message causing the constrained child network device to restore the second authentication message for delivery to the second constrained network device, based on insertion of the certificate back into the modified second authentication message.
-
公开(公告)号:US11128554B1
公开(公告)日:2021-09-21
申请号:US16265046
申请日:2019-02-01
Applicant: Cisco Technology, Inc.
Inventor: Yinfang Wang , Yajun Xia , Feiliang Wang , Chuanwei Li
Abstract: In one embodiment, a technique comprises monitoring data transfer over a radio frequency (RF) link between a first device and a second device in a mesh network where the second device is a descendent node and the first device is a parent node. The technique further transfers the data over a power link communication (PLC) when the RF link is inactive. The method also includes broadcasting, by the second device, RF link availability to at least a third device in the mesh network when the RF link with the first device is inactive where the third device has an active link with the second device and the third device is a descendent node of the second device. The method then includes communicating, between the second device and the third device, through the active RF link.
-
公开(公告)号:US12267682B2
公开(公告)日:2025-04-01
申请号:US18353772
申请日:2023-07-17
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Yajun Xia , Chuanwei Li , Li Zhao
IPC: H04W12/122 , G16Y30/10 , H04L9/40 , H04L43/0829 , H04L43/16 , H04W4/70 , H04W24/08 , H04W64/00 , H04W84/18
Abstract: A method includes determining a number of drops of a plurality of messages sent to a first node of a plurality of nodes within a mesh network. Based at least in part on the number of drops of the plurality of messages exceeding a threshold number of drops for a time period, decrementing a first rating assigned to the first node to a second rating assigned to the first node. Based at least in part on the second rating being below a rating threshold, determining that the first node is a potentially malicious node. Based at least in part on a first distance to the first node being larger than a distance threshold, identifying that the first node is a malicious node. The method may further include ending communications with the first node.
-
公开(公告)号:US20210029038A1
公开(公告)日:2021-01-28
申请号:US16518130
申请日:2019-07-22
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Chuanwei Li , Li Zhao , Yajun Xia
IPC: H04L12/803 , H04L12/24 , H04L12/753 , H04L12/721 , H04L12/26 , G06N20/00
Abstract: In one embodiment, a technique for load balancing of throughput for multi-PHY networks using decision trees is provided. A first device of a mesh communication network may collect at least one transmission metric indicative of a primary link and a secondary link between the first device and a second device of the mesh communication network. The first device may provide the at least one transmission metric as input to one or more decision trees comprising one or more attributes that are each indicative of a threshold for a corresponding transmission metric. The first device may obtain an output from the decision tree comprising a selection of either the primary link or the secondary link. The first device may send, based on the output from the decision tree, one or more packets to the second device using the selected link.
-
公开(公告)号:US20230362654A1
公开(公告)日:2023-11-09
申请号:US18353772
申请日:2023-07-17
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Yajun Xia , Chuanwei Li , Li Zhao
IPC: H04W12/122 , H04W4/70 , G16Y30/10 , H04L9/40 , H04W24/08 , H04W64/00 , H04L43/0829 , H04L43/16
CPC classification number: H04W12/122 , H04W4/70 , G16Y30/10 , H04L63/1416 , H04W24/08 , H04W64/00 , H04L43/0829 , H04L43/16 , H04W84/18
Abstract: A method includes determining a number of drops of a plurality of messages sent to a first node of a plurality of nodes within a mesh network. Based at least in part on the number of drops of the plurality of messages exceeding a threshold number of drops for a time period, decrementing a first rating assigned to the first node to a second rating assigned to the first node. Based at least in part on the second rating being below a rating threshold, determining that the first node is a potentially malicious node. Based at least in part on a first distance to the first node being larger than a distance threshold, identifying that the first node is a malicious node. The method may further include ending communications with the first node.
-
公开(公告)号:US11706625B2
公开(公告)日:2023-07-18
申请号:US17011792
申请日:2020-09-03
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Yajun Xia , Chuanwei Li , Li Zhao
IPC: H04W12/122 , H04W4/70 , G16Y30/10 , H04L9/40 , H04W24/08 , H04W64/00 , H04L43/0829 , H04L43/16 , H04W84/18
CPC classification number: H04W12/122 , G16Y30/10 , H04L43/0829 , H04L43/16 , H04L63/1416 , H04W4/70 , H04W24/08 , H04W64/00 , H04L2463/143 , H04W84/18
Abstract: A method includes identifying a potentially malicious node using a rating assigned to nodes within the network and decrementing the rating based on detected dropped messages to identify a potentially malicious node. The malicious node is identified based on location information obtained from the nodes within the network and comparable distances from the potentially malicious node. The method further includes ending communications with the malicious node and selecting a new parent node based on a presumption that any of the plurality of nodes other than the malicious node are non-malicious.
-
公开(公告)号:US11159430B2
公开(公告)日:2021-10-26
申请号:US16518130
申请日:2019-07-22
Applicant: Cisco Technology, Inc.
Inventor: Lele Zhang , Chuanwei Li , Li Zhao , Yajun Xia
IPC: H04L12/803 , H04L12/24 , G06N20/00 , H04L12/721 , H04L12/26 , H04L12/753
Abstract: In one embodiment, a technique for load balancing of throughput for multi-PHY networks using decision trees is provided. A first device of a mesh communication network may collect at least one transmission metric indicative of a primary link and a secondary link between the first device and a second device of the mesh communication network. The first device may provide the at least one transmission metric as input to one or more decision trees comprising one or more attributes that are each indicative of a threshold for a corresponding transmission metric. The first device may obtain an output from the decision tree comprising a selection of either the primary link or the secondary link. The first device may send, based on the output from the decision tree, one or more packets to the second device using the selected link.
-
-
-
-
-
-
-
-
-