Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Cisco Technology Inc patents


Recent patent applications related to Cisco Technology Inc. Cisco Technology Inc is listed as an Agent/Assignee. Note: Cisco Technology Inc may have other listings under different names/spellings. We're not affiliated with Cisco Technology Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "C" | Cisco Technology Inc-related inventors


System and method to facilitate device triggering for non-internet protocol data delivery in a network environment

A method is provided in one example embodiment and may include receiving, by a service capability exposure function (scef), a request to send data to a user equipment (ue), wherein a context for the ue is not available at the scef when the request is received; querying a subscriber database to determine whether the context for the ue is available at the subscriber database; and sending the data for the ue to a mobility management entity (mme) by the scef using an interface directly interconnecting the mme and the scef based on a determination that the context for the ue is available at the subscriber database.. . ... Cisco Technology Inc

Pinning encryption metadata to segment uris

In one embodiment, a method, comprising obtaining a first uniform resource identifier for a segment of a content item, obtaining encryption metadata indicative of encryption information to be used for encrypting the segment when the segment is requested by a client device or a content delivery network, generating a data combination based on the first uniform resource identifier and the encryption metadata, generating an authentication code or a signature by applying a secret to the data combination, the secret being unknown to the client device or the content delivery network, generating a second uniform resource identifier for the segment based on the authentication code or the signature, the encryption metadata and the first uniform resource identifier, inserting the second uniform resource identifier in an adaptive bitrate media playlist for the content item, and sending the adaptive bitrate media playlist to the client device or the content delivery network.. . ... Cisco Technology Inc

Technologies for following participants in a video conference

Systems, methods, and computer-readable storage media for enabling participant following in an electronic conference. An example method can involve generating a graphical interface for an electronic conference including a group of participants, the graphical interface displaying an active participant in a first display region and a panel of respective graphical participant representations in a second display region. ... Cisco Technology Inc

System and method for using hdmi arc for estimating latency

Disclosed is a method that includes receiving an audio video stream, decoding the audio video stream to yield decoded video and decoded audio, transmitting the decoded video on a video cable to a display, transmitting a signal, such as, for example, a signal on an audio channel of the video cable, identifying an impulse response based on a received signal responsive to the transmitting of the signal, identifying a delay amount based on the impulse response and transmitting the decoded audio to a loudspeaker according to the delay amount. The cable can include an hdmi cable with the audio return channel (arc) capability.. ... Cisco Technology Inc

Encoding and decoding of live-streamed video using common video data shared between a transmitter and a receiver

A first endpoint device has access to common video data including common video frames and encoded common video data having the common video frames encoded therein. The encoded common video data is downloaded to a second endpoint device. ... Cisco Technology Inc

Machine learning-based traffic classification using compressed network telemetry data

In one embodiment, a device in a network receives telemetry data regarding a traffic flow in the network. One or more features in the telemetry data are individually compressed. ... Cisco Technology Inc

End-to-end, in situ packet enrichment for network analytics

End-to-end, in situ packet enrichment for network analytics includes receiving, at a network device is a part of an end-to-end path in a network, a template that specifies unique information elements to be added to a header of a packet traversing the network device when different combinations of network features are applied to the packet at the network device. When the network device applies one or more of the network features to the packet, the network device inserts one a particular information element of the unique information elements into the header of the packet based on the template and the one or more network features applied to the packet. ... Cisco Technology Inc

System and method to facilitate content forwarding using bit index explicit replication (bier) in an information-centric networking (icn) environment

A method is provided in one example embodiment and may include receiving a packet by a forwarder in an information-centric networking (icn) network; determining bit index explicit replication (bier) information associated with the packet; and forwarding the packet based, at least in part, on the bier information associated with the packet. The packet can be an interest packet or a data packet received by the forwarder in the icn network.. ... Cisco Technology Inc

System and method for providing a bit indexed service chain

Disclosed is a method that modifies a bit indexed explicit replication (bier) algorithm. The method includes receiving a packet at a node, wherein the packet includes a bier header identifying a bitstring, the bitstring including a first bit indicating a first destination and a second bit indicating a second destination and forwarding the packet through one or more networks toward the first destination and the second destination based on the bitstring and a predetermined bit selection order. ... Cisco Technology Inc

Application-aware equal cost multipath discovery mechanism

One embodiment is a method including creating at an ingress node of a communications network a request message including an application specific mapping (“asm”) tlv identifying a hashing parameter for a network application, wherein the asm tlv includes range of values for the identified hashing parameter to enable load balancing for packets associated with the network application; forwarding the created request message to a node associated with a next hop along a first path through the network between the ingress node and an egress node; and receiving a response message from the node associated with the next hop, wherein the response message includes load balancing information for the node associated with the next hop corresponding to the range of values for the identified hashing parameter.. . ... Cisco Technology Inc

Process representation for process-level network segmentation

A application and network analytics platform can capture telemetry (e.g., flow data, server data, process data, user data, policy data, etc.) within a network. The application and network analytics platform can determine flows between servers (physical and virtual servers), server configuration information, and the processes that generated the flows from the telemetry. ... Cisco Technology Inc

Predicting application and network performance

An application and network analytics platform can capture comprehensive telemetry from servers and network devices operating within a network. The platform can discover flows running through the network, applications generating the flows, servers hosting the applications, computing resources provisioned and consumed by the applications, and network topology, among other insights. ... Cisco Technology Inc

Sparse coding of hidden states for explanatory purposes

In one embodiment, a device in a network maintains a machine learning-based recursive model that models a time series of observations regarding a monitored entity in the network. The device applies sparse dictionary learning to the recursive model, to find a decomposition of a particular state vector of the recursive model. ... Cisco Technology Inc

Mixing rule-based and machine learning-based indicators in network assurance systems

In one embodiment, a device in a network receives data regarding a plurality of predefined health status rules that evaluate one or more observed conditions of the network. The device, using the data regarding the plurality of health status rules for the network, trains a machine learning-based classifier to generate predictions regarding outputs of the health status rules. ... Cisco Technology Inc

09/27/18 / #20180278483

Refresh of the binding tables between data-link-layer and network-layer addresses on mobility in a data center environment

A method for assisting communication of a source host upon movement from a first data center (dc) to a second dc is disclosed. The method includes identifying that the source host has moved from the first dc to the second dc, ensuring that packets identifying a source as the source host in the second dc are copied to a control plane network element, and, for a first destination host identified in a first packet copied to the control plane network element and identified as a host that is not in the second dc, updating an address resolution protocol (arp)/neighbor discovery protocol (ndp) cache of the source host by sending, to the source host, a first arp message/unsolicited neighbor advertisement specifying a media access control (mac) address of an edge router associated with the source host in the second dc as a destination mac address for the first destination host.. ... Cisco Technology Inc

09/27/18 / #20180278481

Distributed policy store

The disclosed technology relates to a distributed policy store. A system is configured to locate, in an index, an entry for a network entity, determine, based on the entry, a file identifier for a file containing a record for the network entity and an offset indicating a location of the record in the file. ... Cisco Technology Inc

09/27/18 / #20180278480

Intent driven network policy platform

The disclosed technology relates to intent driven network management. A system is configured to maintain an inventory store comprising records for a set of network entities in a network, wherein each network entity in the set of network entities is associated with a record in the inventory store. ... Cisco Technology Inc

09/27/18 / #20180278479

Network agent for reporting to a network policy system

The disclosed technology relates to a network agent for reporting to a network policy system. A network agent includes an agent enforcer and an agent controller. ... Cisco Technology Inc

09/27/18 / #20180278478

Network agent for generating platform specific network policies

The disclosed technology relates to a network agent for generating platform specific network policies. A network agent is configured to receive a platform independent network policy from a network policy system, determine implementation characteristics of the network entity, generate platform specific policies from the platform independent network policy based on the implementation characteristics of the network entity, and implement the platform specific policies on the network entity.. ... Cisco Technology Inc

09/27/18 / #20180278470

Per-prefix lfa frr with bit indexed explicit replication

Methods, devices and program instructions are disclosed for performing bit indexed explicit replication (bier) including fast reroute capability. One embodiment of a method includes receiving, from an egress node of a bier network, an advertisement at a forwarding node, where the advertisement identifies a mapping of the egress node to a bit position of a packet bit string to be carried by a packet through the network. ... Cisco Technology Inc

09/27/18 / #20180278459

Sharding of network resources in a network policy platform

The disclosed technology relates to assigning network agents to communication modules. A network policy system is configured to assign network agents to buckets based on an agent identifier of each agent. ... Cisco Technology Inc

09/27/18 / #20180276553

System for querying models

The disclosed technology relates to machine learning and statistical models. A system is configured to receive a user statement comprising a request for information and identify an intent type and one or more parameters based on the user statement. ... Cisco Technology Inc

09/27/18 / #20180276477

Multi-blend fingerprinting

Multi-blend fingerprinting may be detected. First, a video sample may be received. ... Cisco Technology Inc

09/27/18 / #20180275756

System and method of controlling based on a button having multiple layers of pressure

A device and method for providing multiple functions in a context based on a level of pressure the user provides on a button. The method includes receiving first user input from a user, at a first level of pressure, via a button on a device, the first user input resulting in a first function being performed, providing, based on the first user input and based on a context associated with the first user input, a first indication of a second function that would be performed if the user provided a second user input at a second level of pressure on the button. ... Cisco Technology Inc

09/20/18 / #20180270754

Low power wireless communication device and remote management techniques

According to one embodiment, a beacon device is configured to provide power in the beacon device in response to a signal from a clock to enter a wake state from a sleep state. The beacon device is further configured to receive configuration parameters over the wireless network interfaces from a network device, monitor one or more of a beacon sensor or a user device over the wireless network interfaces according to the configuration parameters, transmit data over the network interfaces to the network device according to the configuration parameters, and monitor the clock for a signal to enter a sleep state. ... Cisco Technology Inc

09/20/18 / #20180270646

Virtual mobility anchor for network sharing

Embodiments are directed to a virtual mobility anchor network element to receive, from a packet gateway (pgw) node, a request for an internet protocol (ip) address for a mobile device, establish an ip address for the mobile device; and provide the ip address to the pgw node in response to the request for the ip address for the mobile device. The virtual mobility anchor network element is configured to receive ip traffic from a network location; determine a target destination for the ip traffic based on a destination ip address, the destination ip address comprising the second ip address; and forward the ip traffic to the pgw node associated with the destination ip address. ... Cisco Technology Inc

09/20/18 / #20180270484

Compressed domain data channel for watermarking, scrambling and steganography

A computer-implemented method is provided for processing a video stream in the compressed domain for watermarking, scrambling and other applications. Syntax elements are generated for input video as part of a video compression process. ... Cisco Technology Inc

09/20/18 / #20180270133

Assuring policy impact before application of policy on current flowing traffic

Presented herein are techniques for determining the impact a policy change might have on a network. The techniques include receiving configuration information from a plurality of network devices in a network, receiving traffic flow records from the plurality of network devices, receiving an indication of an intent to apply a new policy on the network devices, and based on the configuration information, traffic flow records and the new policy, determining an impact of the new policy on the network devices and traffic flowing through the network.. ... Cisco Technology Inc

09/20/18 / #20180270129

Techniques for determining network topologies

In one embodiment, a monitoring device (or module) monitors messages exchanged between nodes in a communication network. The monitoring device further determines, based on time stamp data associated with each message, one or more latency distributions of paired response times between the nodes, and determines a node topology consistent with each of the one or more latency distributions of paired response times between the nodes. ... Cisco Technology Inc

09/20/18 / #20180270127

Interactive hierarchical network chord diagram for application dependency mapping

The technology visualizes data flows within a datacenter in an interactive hierarchical network chord diagram. Based on analyzed data describing data flows, a portion of the data flows that originate at the same first endpoint and terminate at the same second endpoint can be grouped. ... Cisco Technology Inc

09/20/18 / #20180270114

Multi platform static semantic consistency checking of network configurations

Semantic checking of multi-device and protocol configurations based on an extensible rules database for a variety of devices and operating systems may be provided. First, a configuration may be received. ... Cisco Technology Inc

09/20/18 / #20180270113

Intelligent sfc (isfc) - cognitive policy instantiation in sfc environments

In one embodiment, a device in a network receives traffic sent via a service function chain (sfc). The device models one or more behavioral characteristics of the traffic using a machine learning-based service function in the sfc. ... Cisco Technology Inc

09/20/18 / #20180270103

Techniques for wireless access and wireline network integration

One embodiment is a method and includes receiving at a termination element of a first network a bandwidth report (“bwr”), in which the bwr includes information regarding a data transmission opportunity over a second network for at least one endpoint data; scheduling a first network transmission opportunity for the at least one endpoint data using information derived from the received bwr; and receiving from a 5 first network forwarding device the at least one endpoint data in accordance with the scheduled first network transmission opportunity.. . ... Cisco Technology Inc

09/20/18 / #20180267990

Cluster-wide container optimization and storage compression

One embodiment includes identifying a common file associated with a first software container deployed on a host; adding a single copy of the common file to a common file pool maintained by the host, removing the common file from the first container and replacing it with a pointer to the copy of the common file in the shared file pool, and removing the common file from the first container and replacing it with a pointer to the copy of the common file in the shared file pool; identifying at least one unique file associated with the first container; and moving the unique file to the common file pool maintained by the host and removing the unique file from the first container and replacing it with a pointer to the copy of the unique file in the shared file pool.. . ... Cisco Technology Inc

09/20/18 / #20180267988

Systems and methods for device visiting frequency estimation

Disclosed are systems, methods, and computer-readable media for determining a distribution of various visiting frequencies among devices/elements detected at a site. A method includes generating a list representing a portion of devices detected at a site over a first time period based on wireless signals transmitted by the devices and received at an access point and determining a visiting frequency for each device represented in the list based on data representing devices previously detected at the site. ... Cisco Technology Inc

09/20/18 / #20180267774

Conference assistant device with configurable user interfaces based on operational state

The present technology is a hybridized user interface model where different interaction methods work together in concert to make public conference calling devices much easier to use. The interaction on the device consists of voice ui together with physical capacitive touch interaction (variable function based on context), as well as remote control from any personal computing device, i.e. ... Cisco Technology Inc

09/06/18 / #20180255547

Processing of wireless signals for access points using a central controller

Techniques are disclosed to reduce latency of processing for access points using a central controller. For example, an example method of wireless communication includes receiving, at an access point, a signal wirelessly. ... Cisco Technology Inc

09/06/18 / #20180255347

System and method for cloud digital video recorders

In one embodiment, a first value is computed on a networked computing device, the first value being associated with storing a recording of a broadcast video at a first cloud storage device situated in a first one of a plurality of regions, for playback on a remote client device situated in the first one of the plurality of regions, the first value being a measure of user consumption patterns and use of computing and network resources. A second value is computed on the networked computing device, the second value being associated with storing the recording of the broadcast video at a second cloud storage device situated in a second one of the plurality of regions, for playback on a remote client device situated in the second one of the plurality of regions, the second value being a measure of user consumption patterns and use of computing and network resources. ... Cisco Technology Inc

09/06/18 / #20180255336

Autonomously generated video channels

A method for generating ad hoc video stream channels is implemented on at least one computing device and includes: receiving a multiplicity of incoming user video feeds, where schedules for the incoming user video feeds are unknown; classifying the multiplicity of incoming user video feeds according to at least a genre; selecting at least one incoming video feed from among the multiplicity of incoming user video feeds for inclusion in at least one video stream channel, where the selecting is according to selection criteria, and the selection criteria are based at least on the classifying; generating at least one outgoing video stream for the at least one video stream channel according to the selecting; and delivering the at least one outgoing video stream to presentation devices.. . ... Cisco Technology Inc

09/06/18 / #20180255152

Indirect integration of network connected devices into service function chains

A gateway device is configured to operate as a network function in a service function chain and is connected to a plurality of network connected devices. The gateway device receives a service function chain packet that includes a request to obtain data from one or more of the plurality of network connected devices. ... Cisco Technology Inc

09/06/18 / #20180255092

Dynamic device isolation in a network

In one embodiment, a device in a network inserts a profile tag into an address request sent by an endpoint node in the network to a lookup service. The lookup service is configured to identify one or more addresses with which the endpoint node is authorized to communicate based on a profile for the endpoint node associated with the inserted profile tag. ... Cisco Technology Inc

09/06/18 / #20180255061

Device management across multiple operator networks

Various implementations disclosed herein enable a method of managing device access on one or more operator networks. The method includes determining correspondence between a first adaptor module of a plurality of adaptor modules and a first request to manage devices deployed on a first operator network associated with the first adaptor module. ... Cisco Technology Inc

09/06/18 / #20180255017

Identity-based policy implementation in network address translation (nat) environments

A policy server correlates information from several messages associated with a client device to implement an identity-based network access policy. The policy server receives a first message from a network element connected to the client device. ... Cisco Technology Inc

09/06/18 / #20180255002

Group based multicast in networks

Group based multicasts may be provided. First, a request may be received. ... Cisco Technology Inc

09/06/18 / #20180254997

Fog-based service function chaining

A fog controller is operable to communicate with fog nodes associated with a plurality of special purpose network connected devices. The fog controller receives, from each of a plurality of the fog nodes, an indication of one or more processing capabilities of the respective fog node. ... Cisco Technology Inc

09/06/18 / #20180254982

Communication paths for distributed ledger systems

Various implementations disclosed herein enable adjusting the performance of at least a portion of communication paths associated with a distributed ledger. In various implementations, a method includes determining a quality of service value for a data transmission over the communication paths provided by a first plurality of network nodes. ... Cisco Technology Inc

09/06/18 / #20180254972

Automatic optimal route reflector root address assignment to route reflector clients and fast failover in a network environment

Embodiments are provided for providing optimal route reflector (orr) root address assignment to route reflector clients and fast failover capabilities in an autonomous system, including identifying a first node in an autonomous system as a candidate root node of a first routing group, identifying a client node based on a neighbor address used in a first routing protocol, mapping the neighbor address to routing information received from the client node via a second routing protocol, and associating the neighbor address with the first routing group if the routing information includes an identifier of the first routing group. In more specific embodiments, identifying the first node as a candidate root node includes determining the first node and the first routing group are advertised in a first protocol packet, and determining the first node and the second routing group are advertised in a second protocol packet.. ... Cisco Technology Inc

09/06/18 / #20180254971

Path optimization based on reducing dominating set membership to essential parent devices

In one embodiment, a method comprises identifying, by a path computation element, essential parent devices from a nonstoring destination oriented directed acyclic graph (dodag) topology as dominating set members belonging to a dominating set; receiving, by the path computation element, an advertisement message specifying a first dominating set member having reachability to a second dominating set member, the reachability distinct from the nonstoring dodag topology; and generating, by the path computation element based on the advertisement message, an optimized path for reaching a destination network device in the nonstoring dodag topology via a selected sequence of dominating set members, the optimized path providing cut-through optimization across the nonstoring dodag topology.. . ... Cisco Technology Inc

09/06/18 / #20180254841

Transaction management in distributed ledger systems

In various implementations, a method of managing transactions in a distributed ledger is performed by a first network node that is configured to maintain a distributed ledger in coordination with a plurality of network nodes. In various implementations, the first network node includes a processor, a non-transitory memory, and a network interface. ... Cisco Technology Inc

09/06/18 / #20180253256

Storage area network based extended i/o metrics computation for deep insight into application performance

A method is described and in one embodiment includes monitoring by an integrated circuit device read/write commands in connection with a flow of an application executing in a fibre channel storage area network (“fc-san”); determining from the monitored read/write commands at least one metric for characterizing i/o performance of the application with respect to a storage device, wherein the at least one metric includes at least one of an inter i/o gap (“iig”), a logical unit number (“lun”) i/o access pattern (“iap”), relative block size, i/o operations per second (“iops”) and throughput, and iops per virtual server; storing the calculated at least one metric in a flow record associated with the flow; and using the calculated at least one metric to identify a storage device for use by the flow, wherein the calculated at least one metric is indicative of a performance of the application in the fc-san.. . ... Cisco Technology Inc

09/06/18 / #20180253215

Auto convert meeting link to join button in chat

A method is provided to simplify the connection to a meeting service based on a link presented in a text-based communication session. The method involves monitoring the text-based communication session among at least two participants and detecting in the text-based communication session a text string that represents a link to a meeting service. ... Cisco Technology Inc

09/06/18 / #20180252335

Minimal touch bracket for cable routing with rack mounted devices

The present technology provides minimal touch cable guides for rack-mounted devices. The minimal touch cable guides disclosed herein provide structures for routing cables from field replaceable units installed in a rack mounted device in such a way that cables of different types are not crossed and provides a mechanism for adjusting installed cabling to permit access to otherwise obscured field replaceable units. ... Cisco Technology Inc

08/23/18 / #20180242477

Expandable rack mountable computing device

An expandable rack mountable computing device for use in a variety of telecommunications and computing racks comprises a computing device chassis, at least one expandable baffle, at least one biasing mechanism, and at least one expansion mechanism. During installation of the computing device into a rack, the biasing mechanism holds the at least one expandable baffle in a retracted position at least partially inside of the computing device chassis. ... Cisco Technology Inc

08/23/18 / #20180242218

Heterogeneous access gateway for an information-centric networking environment

A method is provided in one example embodiment and may include receiving an interest message at a gateway, wherein the gateway provides connectivity to a plurality of radio accesses that interface with an information-centric networking-based (icn-based) network; identifying a service class associated with the interest message; selecting a particular radio access of the plurality of radio accesses to handle traffic for the interest message based on at least one of: one or more policies associated with the service class, one or more policies associated with the plurality of radio accesses, and network conditions associated with the plurality of radio accesses; and forwarding the interest message to the particular radio access.. . ... Cisco Technology Inc

08/23/18 / #20180242186

System and method to facilitate cross-layer optimization of video over wifi in an information-centric networking environment

A method is provided in one example embodiment and may include determining each station of a plurality of stations connected to a wifi access point that are to receive downlink video transmissions from the wifi access point, wherein the wifi access point is connected to an information-centric networking-based (icn-based) network; associating each station of the plurality of stations to each of a corresponding icn face of a plurality of icn faces maintained by the wifi access point; and managing a downlink transmission buffer for each station of the plurality of stations based, at least in part, a modulation and coding scheme (mcs) associated with downlink video transmissions for each station of the plurality of stations, wherein each downlink transmission buffer is associated with the corresponding icn face associated with each station.. . ... Cisco Technology Inc

08/23/18 / #20180242178

System and method to facilitate troubleshooting and predicting application performance in wireless networks

An example method is provided in one example embodiment and may include gathering current wireless local area network (wlan) data for a wlan, wherein the wlan data comprises network data, radio frequency (rf) data, and transmission data for a plurality of user equipment (ue) operating within the wlan; generating a plurality of color maps; merging the plurality of color maps to generate a combined color map; and calculating a predicted application score for at least one ue operating within the wlan based, at least in part, on application of the combined color map to a trained statistical model that represents linking relationships between the wlan data gathered for the wlan and a plurality of possible application scores for the plurality of ue. The plurality of color maps can include an rf color map, a transmission color map, and a quality of service color map.. ... Cisco Technology Inc

08/23/18 / #20180242169

Optimizing spectral efficiency in a network by activating or deactivating access points based on client device activity

Presented herein are techniques for optimizing spectral efficiency in a network. One or more metrics of one or more wireless access points that enable one or more wireless client devices to connect to a wireless network are monitored. ... Cisco Technology Inc

08/23/18 / #20180241852

Mixed qualitative, quantitative sensing data compression over a network transport

In one embodiment, a device in a serial network de-multiplexes a stream of traffic in the serial network into a plurality of data streams. A particular one of the data streams is associated with a particular endpoint in the serial network. ... Cisco Technology Inc

08/23/18 / #20180241762

Anomaly selection using distance metric-based diversity and relevance

In one embodiment, a device in a network receives a notification of a particular anomaly detected by a distributed learning agent in the network that executes a machine learning-based anomaly detector to analyze traffic in the network. The device computes one or more distance scores between the particular anomaly and one or more previously detected anomalies. ... Cisco Technology Inc

08/23/18 / #20180241759

Behavior-based authentication

In one embodiment, a method includes receiving an access request for a video service from a client device, authorizing the client device to access the video service when the client device is initiating connection to the video service via a home internet access point in a home associated with an authorized account for the video service, determining a time restriction for access to at least part of the video service when the client device is initiating connection to the video service via a non-home internet access point located outside the home, a duration of the time restriction being dependent upon a usage behavior of the client device, and authorizing the client device to access the at least part of the video service subject to the time restriction when the client device is initiating connection to the video service via the non-home internet access point.. . ... Cisco Technology Inc

08/23/18 / #20180241688

Distributing and rate limiting packets among multiple paths in a single stage switching topology to a reordering node

One embodiment includes multiple distribution nodes sending packets of different ordered sets of packets among multiple packet switching devices arranged in a single stage topology to reach a reordering node. The reordering node receives these packets sent over the different paths and stores them in reordering storage, such as, but not limited to, in queues for each distribution node and packet switching device combination. ... Cisco Technology Inc

08/23/18 / #20180241679

System and method to facilitate robust traffic load balancing and remote adaptive active queue management in an information-centric networking environment

A method is provided in one example embodiment and may include generating an interest message to be transmitted using each face of a plurality of faces associated with a node, wherein the interest message is to be discarded by each of a neighboring node of a plurality of neighboring nodes that receive the interest message; determining, for each face of the plurality of faces associated with the node, a one-hop propagation delay associated with each face of the plurality of faces; and selecting a particular face through which to transmit another interest message based, at least in part, on the one-hop propagation delay of the particular face and a number of pending interests associated with the particular face.. . ... Cisco Technology Inc

08/23/18 / #20180241671

System and method to facilitate content delivery to multiple recipients in a network environment

A method is provided in one example embodiment and may include determining at a parent content node that a plurality of recipient content nodes are to receive a same content; generating, based on a determination that the same content is available at the parent content node, a multi-delivery header comprising a plurality of identifiers, wherein each identifier of the plurality of identifiers indicates each recipient content node that is to receive the same content; appending the multi-delivery header to one or more packets of an internet protocol (ip) flow associated with the same content; and transmitting packets for the ip flow to each of the plurality of the recipient content nodes.. . ... Cisco Technology Inc

08/23/18 / #20180241669

System and method to facilitate an information-centric networking socket and fast in-network authentication

A method is provided in one example embodiment and may include generating a first interest message for a consumer application of a first node, wherein the first interest message comprises a content name within an internet protocol identifying content to be received by the first node; opening an information-centric networking (icn) socket for the first node, wherein the icn socket is associated with the content name and the consumer application; and transmitting the first interest message to an ip network, wherein the ip network comprises at least one hybrid icn-enabled routing node that is capable of performing packet forwarding using both ip networking constructs and icn constructs.. . ... Cisco Technology Inc

08/23/18 / #20180241627

Containerized software architecture for configuration management on network devices

A network device has a processor that executes software instructions for a primary control plane operable to program a primary data plane that processes packets received at the network device to determine how or whether the packets are to be directed into a network. The processor also executes software instructions for a secondary control plane operable to program a secondary data plane. ... Cisco Technology Inc

08/23/18 / #20180241615

System and method to facilitate network element failure detection and session restoration in a network environment

A method is provided in one example embodiment and may include maintaining, by a diameter routing agent (dra), an availability status for a plurality of network elements; receiving a request associated with a user equipment (ue) session, wherein a first network element of the plurality of network elements is serving the ue session; determining that the first network element serving the ue session is unavailable; and re-establishing the ue session at a second network element of the plurality of network elements that is available, wherein the re-establishing is performed without terminating the ue session.. . ... Cisco Technology Inc

08/23/18 / #20180241550

Collaborative computation of hmac

In one embodiment, a first apparatus includes a processor and an interface, wherein the interface is operative to receive a request from a second apparatus to commence a keyed-hash message authentication code (hmac) computation, the processor is operative to perform a first computation computing a first part of the hmac computation using a secret key k as input yielding a first value, the interface is operative to send the first value to the second apparatus, the interface is operative to receive a second value from the second apparatus, the second value resulting from the second apparatus processing the first value with at least part of a message m, the processor is operative to perform a second computation based on the second value and the secret key k yielding an hmac value, and the interface is operative to send the hmac value to the second apparatus.. . ... Cisco Technology Inc

08/23/18 / #20180241467

Multi-identity optics modules

An optics module sends, to a host module, a pin signal indicating that an optics module is plugged into the host module, wherein the optics module is configured to operate at at least a first data rate and a second data rate. The optics module receives, from the host module, an indication of a host data rate. ... Cisco Technology Inc

08/23/18 / #20180240011

Distributed machine learning

Presented herein are techniques for training a central/global machine learning model in a distributed machine learning system. In the data sampling techniques, a subset of the data obtained at the local sites is intelligently selected for transfer to the central site for use in training the central machine learning model. ... Cisco Technology Inc

08/23/18 / #20180239689

Automatic classification and parallel processing of untested code in a protected runtime environment

A system is provided to run new code modules safely in a duplicative, protected environment without affecting the code modules that are already trusted to be on the system. The system receives a new code module that validates operational data of a computing device, and instantiates a new, parallel execution engine to run the new code module on the operational data in parallel with another execution engine running the trusted/verified code modules that also validate the same operational data. ... Cisco Technology Inc

08/23/18 / #20180239647

System and method of lightweight decentralized nfv orchestration

In one embodiment, a network functions virtualization infrastructure can be managed in a decentralized fashion. A front end can receive a request to provision a virtualized network function. ... Cisco Technology Inc

08/23/18 / #20180239411

Configuration of energy savings

According to one example embodiment, a modem or other network device include an energy module configured to enter a low-power, low-bandwidth state when not in active use by a user. The low-power state may be maintained under certain conditions where network activity is not present, and or when only non-bandwidth-critical traffic is present. ... Cisco Technology Inc

08/16/18 / #20180234453

Prefetch intrusion detection system

In one embodiment, a device in a network generates a machine learning-based traffic model using data indicative of a particular node in the network attempting to retrieve content from a particular resource in the network. The device predicts, using the traffic model, a time at which the particular node is expected to attempt retrieving future content from the particular resource. ... Cisco Technology Inc

08/16/18 / #20180234348

Prediction of network device control plane instabilities

In one embodiment, a device in a network receives control plane packet data indicative of control plane packets for a control plane in the network. The device models the control plane using a machine learning model based on the control plane packet data. ... Cisco Technology Inc

08/16/18 / #20180234333

Machine learning-based mechanism for optimal interface selection in network environments employing network address translation

A communication session is established between at least a first endpoint and a second endpoint, either or both of which is behind at least one network device in a network that performs network address translation. Candidate path information is obtained that indicates candidate paths in the network through which the communication session can traverse, taking into account, network address translation occurring in the network. ... Cisco Technology Inc

08/16/18 / #20180234316

Passive monitoring and measurement of network round trip time delay

A method is described and in one embodiment includes receiving at a first network element of a communications network a first packet corresponding to a first traffic flow from a first end user device to a second end user device at a time t1; receiving at the first network element a second packet corresponding to a second traffic flow from the second end user device to the first end user device at a time t2; calculating by the first network element a difference α1 between the time t1 and the time t2; creating at the first network element a first record including the calculated difference Δ1; and providing the first record to a network collector device, wherein the network collector device compares the first record with a second record received from a second network element to determine a round trip time (“rtt”) delay for the communications network.. . ... Cisco Technology Inc

08/16/18 / #20180234306

Network device user interface

In one embodiment, a system includes a first interface to receive a request to generate a user interface screen for a selected network device, a memory to store configuration data of the selected network device, a processor to generate, using the configuration data of the selected network device, a first user interface screen showing a graphical representation of an internal configuration of the selected network device in each of at least three different abstraction layers from a plurality of different abstraction layers, one of the at least three different abstraction layers including a physical layer showing a plurality of ports of the selected network device, and a second interface to send the first user interface screen for output to a display device. Related apparatus and methods are also described.. ... Cisco Technology Inc

08/16/18 / #20180234141

Mu-mimo grouping system

Embodiments herein describe a network device (e.g., an access point) that dynamically arranges multi-user (mu) multiple input multiple output (mimo) compatible client devices into mu-mimo groups. That is, the network device uses network metrics and historical data to change the assignment of client devices in the mu-mimo groups which may improve mu-mimo efficiency by reducing the amount of power that leaks between the clients devices in the group. ... Cisco Technology Inc

08/16/18 / #20180234130

Echo cancellation

A method is provided in one example and includes receiving a data signal, receiving an interference signal, wherein the interference signal is copied to create a reference data interference signal, combining the data signal and the interference signal to create a combined signal, using an analog echo cancellation engine on the combined signal to create an analog echo cancellation signal, and using a digital echo cancellation engine on the analog echo cancellation signal to create a data with echo cancellation signal. The data with echo cancellation signal can be communicated using a coaxial cable. ... Cisco Technology Inc

08/16/18 / #20180233880

Bonded laser with solder-free laser active stripe in facing relationship with submount

A laser light source, a submount for a semiconductor laser, and a method of providing a laser light source are provided. The laser light source includes a submount with first and second electrical contacts thereon and a trench there-between. ... Cisco Technology Inc

08/16/18 / #20180232889

Generating and reviewing motion metadata

Aspects of the instant disclosure relate to methods for generating motion metadata for a newly captured video feed. In some aspects, methods of the subject technology can include steps for recording a video feed using the video capture system, partitioning the image frames into a plurality of pixel blocks, and processing the image frames to detect one or more motion events. ... Cisco Technology Inc

08/16/18 / #20180232566

Enabling face recognition in a cognitive collaboration environment

A method including obtaining a vector including a plurality of numbers representative of a face of a user of a collaboration endpoint, wherein the vector is generated from the face captured by a camera of the collaboration endpoint; identifying an identity of the face of the user using the vector; and based on the identity of the face of the user, causing a collaboration action to be performed at the collaboration endpoint is disclosed.. . ... Cisco Technology Inc

08/09/18 / #20180228017

Stand-off block

An apparatus may be provided. The apparatus may comprise a substrate and a circuit board. ... Cisco Technology Inc

08/09/18 / #20180227969

Wireless roaming using a distributed store

Systems, methods, and computer-readable storage media for wireless roaming are disclosed. An access point receives a communication request from a wireless device and determines a home broadcast domain associated with the wireless device. ... Cisco Technology Inc

08/09/18 / #20180227218

Generating non-congruent paths having minimal latency difference in a loop-free routing topology having routing arcs

In one embodiment, a method comprises creating, in a computing network, a loop-free routing topology comprising a plurality of routing arcs for reaching a destination network node; identifying, within the loop-free routing topology, non-congruent paths for a source network node to reach the destination node; and determining, from the non-congruent paths, a non-congruent path pair providing no more than a prescribed difference of latency from the source network node to the destination node, enabling the source network node to forward a data packet in a first direction of the one non-congruent path pair and a bicasted copy of the data packet in a second direction of the one non-congruent path pair, for reception of the data packet and the bicasted copy by the destination node within the prescribed difference of latency.. . ... Cisco Technology Inc

08/09/18 / #20180227207

Soft constrained shortest-path tunneling

In one embodiment, a method includes obtaining a request to route traffic from a source to a destination in a network, where the request is associated with a setup bandwidth criterion. The method includes: identifying a plurality of candidate tunnel paths from the source to the destination; and, for each of the plurality of candidate tunnel paths, determining whether or not at least one of the candidate tunnel paths satisfies the setup bandwidth criterion. ... Cisco Technology Inc

08/09/18 / #20180227168

Triggered in-band operations, administration, and maintenance in a network environment

Embodiments of the disclosure pertain to activating in-band oam based on a triggering event. Aspects of the embodiments are directed to receiving a first notification indicating a problem in a network; triggering a data-collection feature on one or more nodes in the network for subsequent packets that traverse the one or more nodes; evaluating a subsequent packet that includes data augmented by the data collection feature; and determining the problem in the network based on the data augmented to the subsequent packet.. ... Cisco Technology Inc

08/09/18 / #20180227010

Spread spectrum acoustic communication techniques

In a transmit method, a set of data eigenvectors that are based on a prometheus orthonormal set (pons) code construction and orthogonal to each other are stored, wherein the data eigenvectors are mapped to unique multi-bit words. A pilot sequence representing a pilot eigenvector that is based on the pons code construction and orthogonal to each of the data eigenvectors is generated. ... Cisco Technology Inc

08/09/18 / #20180224560

Location and orientation based digital media search

In one embodiment, a client computing device stores a plurality of digital media files. For each digital media files, the client computing device stores data identifying a geographic location associated with the digital media file. ... Cisco Technology Inc

08/02/18 / #20180220521

Bi-directional heatsink dampening force system

A circuit board includes a heatsink configured to be coupled to the circuit board via a first coupling mechanism, the first coupling mechanism providing an asymmetrical downward force for coupling the heatsink to the circuit board. The circuit board further includes a second coupling mechanism configured to provide a counter force to the asymmetrical downward force of the first coupling mechanism. ... Cisco Technology Inc

08/02/18 / #20180220202

Real-time interstitial content resolution and trick mode restrictions

Server-side trick mode restrictions in a stream may be provided. The stream may comprise, for example, a video on demand (vod) adaptive bitrate (abr) stream. ... Cisco Technology Inc

08/02/18 / #20180220007

Full-duplex adaptive echo cancellation in a conference endpoint

A loudspeaker is driven with a loudspeaker signal to generate sound, and sound is converted to one or more microphone signals with one or more microphones. The microphone signals are concurrently transformed into far-field beam signals and near-field beam signals. ... Cisco Technology Inc

08/02/18 / #20180219982

Virtualized media processing pipeline

Aspects of the disclosed technology provide virtualized solutions for processing media frames. A process of the disclosed technology can include steps for receiving unprocessed media packets, de-packetizing the unprocessed media packets to produce unprocessed media frames, and sending the unprocessed media frames to a virtual media application. ... Cisco Technology Inc

08/02/18 / #20180219958

Policy architecture for cable networks

One embodiment is a method including extending a policy server to provide per subscriber policies to a cable modem (cm) and a cable modem termination system (cmts), receiving, at the policy server, a request for a policy profile from a cable modem termination system (cmts), accessing a subscriber database to determine the policy profile, and communicating the policy profile to the cmts. In an example, the policy server is a packet cable multimedia policy server of a cable network.. ... Cisco Technology Inc

08/02/18 / #20180219890

Identifying a security threat to a web-based resource

Access logs associated with user requests for a web-based resource are monitored. Parameter(s) that index records of the web-based resource are identified. ... Cisco Technology Inc

08/02/18 / #20180219833

Mitigation against domain name system (dns) amplification attack

Presented herein are techniques for mitigating a domain name system (dns) amplification attack. A methodology is provided including receiving, at a (dns) server, a dns request, determining whether the dns request has a source ip address that matches a predetermined source ip address and a port number that falls within a predetermined port range. ... Cisco Technology Inc

08/02/18 / #20180219783

Reliable load-balancer using segment routing and real-time application monitoring

Systems, methods, and computer-readable media for load balancing using segment routing and application monitoring. A method can involve receiving a packet including a request from a source device to an application associated with a virtual address in a network, mapping the request to a set of candidate servers hosting the application associated with the virtual address, and encoding the set of candidate servers as a list of segments in a segment routing header associated with the packet. ... Cisco Technology Inc

08/02/18 / #20180219768

System and method for providing small cell gateway redundancy

An example method is provided and may include steps of configuring a henb with plurality of global enode b identities (global enb ids), where each global enb id is associated with one of a plurality of henb gateways (henb-gws), and broadcasting a first global enb id by the henb when the henb is served by a first henb-gw. When/if the henb loses connectivity with the first henb-gw, the method provides a step of switching the broadcasting from the first global enb id to a second global enb id and re-parenting the henb, now broadcasting or is configured to start/continue broadcasting the second global enb id, from being served by the first henb-gw to being served by a second henb-gw.. ... Cisco Technology Inc

08/02/18 / #20180219754

Probabilistic and proactive alerting in streaming data environments

In one embodiment, a device in a network aggregates values for a set of key performance indicators (kpis) for a system the network to form a plurality of kpi states. The device associates a plurality of observed performance metric values from the system with the kpi states. ... Cisco Technology Inc

08/02/18 / #20180219682

Signature method and system

In one embodiment, a method, system, and apparatus are described, the method, system, and apparatus including generating metadata to be associated with each block of a series of blocks, the generating including, except for an initial block, receiving: a first block, including a signed block, and a second block to be signed, retrieving a first value including a square of a random number, r′2, multiplying r′2 by a nonce, r, and setting r·r′2 to be a square of a first random number, denoted r2, for the second block, retrieving a second value from the first block, the second value including k-bit vector, e′, determining a bit string value of the second block, m, computing e=hash(r2∥m∥e′), and determining a signature, sig, for the second block by calculating sig=r sig′ se-e′. Related methods, systems, and apparatuses are also described.. ... Cisco Technology Inc

08/02/18 / #20180219620

Optical transceiver compensation, monitoring and alarming

One or more operational parameters associated with pluggable optical transceivers are estimated to mitigate impairments to an optical signal caused by imperfections in the optical transceivers. A monitoring algorithm within a receiver signal processor may further use the estimated operational parameters associated with the pluggable optical transceivers to determine whether the transceivers are performing correctly. ... Cisco Technology Inc

08/02/18 / #20180218149

Container application security and protection

A plurality of pages of code executing via a container host operating system are monitored. The plurality of pages of code include pages of code from a plurality of container applications configured to utilize the container host operating system. ... Cisco Technology Inc

08/02/18 / #20180218007

Fast network performance in containerized environments for network function virtualization

Aspects of the subject technology relate to methods for inter-container communication in a virtual network environment. Steps for implementing an inter-container communication method can include: creating, using a container management system, a file-structure in a shared memory, generating, by the container management system, a first memory-mapping between the file-structure and a first network container, and generating, by the container management system, a second memory-mapping between the file-structure and a second network container. ... Cisco Technology Inc

08/02/18 / #20180217823

Tightly integrated accelerator functions

In an example, there is disclosed a computing system, including: a processor; a memory; a configuration interface to a logic configuration unit; and a system compiler including: a first block compiler to compile logic for a first logical block in a first language, the first language being a domain-specific language (dsl) and the first logical block being switching logic for a network switch; a second block compiler to compile logic for a second logical block in a second language, the second language being a non-dsl and providing an external accelerator method not supported by the first language; and an interface compiler to define input/output channels for encapsulated data interchange between the first logical block and the second logical block, wherein the encapsulated data interchange is to target a resident instance of the external accelerator method.. . ... Cisco Technology Inc

07/26/18 / #20180213461

System and method to facilitate unequal cost multipath routing in a network environment

An example method is provided in one example embodiment and may include determining a first routing metric associated with a first communication network, wherein the first routing metric identifies a capability of the first communication network to handle an internet protocol (ip) flow for a user equipment (ue); determining a second routing metric associated with a second communication network, wherein the second routing metric identifies a capability of the second communication network to handle the ip flow for the ue and wherein the second routing metric is different from the first routing metric; and routing the ip flow for the ue using the first communication network or the second communication network based, at least in part, on the first routing metric and the second routing metric.. . ... Cisco Technology Inc

07/26/18 / #20180213296

Assisted acceleration for video streaming clients

Techniques are described for managing streaming video profile selections of downstream client devices for a network device. Embodiments include reserving a determined amount of bandwidth at a network gateway device, on a link between the network gateway device and an upstream network device. ... Cisco Technology Inc

07/26/18 / #20180212996

Entity identification for enclave segmentation in a network

In one embodiment, a device in a network identifies a set of network entities. The device determines characteristics of the network entities. ... Cisco Technology Inc

07/26/18 / #20180212992

Service usage model for traffic analysis

In one embodiment, a device in a network identifies an set of services of a domain accessed by a plurality of users in the network. The device generates a service usage model for the domain based on the set of services accessed by the plurality of users. ... Cisco Technology Inc

07/26/18 / #20180212896

Distributed hybrid cloud orchestration model

Aspects of the instant disclosure relate to methods for facilitating intercloud resource migration. In some embodiments, a method of the subject technology can include steps for instantiating a first intercloud fabric provider platform (icfpp) at a first cloud datacenter, instantiating a second icfpp at a second cloud datacenter, and receiving a migration request at the first icfpp, the migration request including a request to migrate a virtual machine (vm) workload from the first cloud datacenter to the second cloud datacenter. ... Cisco Technology Inc

07/26/18 / #20180212876

Dynamic and compressed trie for use in route lookup

In one embodiment, a method includes receiving a request to add a prefix to memory for a route lookup at a forwarding device, the memory comprising a plurality of pivot tiles for storing pivot entries, each of the pivot entries comprising a plurality of prefixes and a pointer to a trie index, searching at the forwarding device, a dynamic pool of the pivot tiles based on a base-width associated with the prefix, allocating at least a portion of the pivot tile to the base-width and creating a pivot entry for the prefix and other prefixes with a corresponding base-width, and dynamically updating prefixes stored on the pivot tiles based on route changes to optimize storage of prefixes on the pivot tiles. An apparatus and logic are also disclosed herein.. ... Cisco Technology Inc

07/26/18 / #20180212865

Mechanism and framework for finding optimal multicast tree roots without the knowledge of traffic sources and receivers for fabricpath and trill

The proposed methodology enables finding the most efficient roots in the network to carry multicast traffic, while further providing a theoretical basis for such selection. It guarantees the minimum expected delivery cost for multicast frames in the absence of any knowledge about the source and receivers.. ... Cisco Technology Inc

07/26/18 / #20180212861

Distributing network path information in a network environment

Methods for distributing multicast network path information to various network nodes in a network environment are disclosed. An exemplary method includes a downstream node transmitting a first message including a network path indicating a specific desired route that is to be used when delivering multicast traffic from a given multicast source to a given host, as well as an identifier assigned to the network path in order to uniquely identify that network path in the network. ... Cisco Technology Inc

07/26/18 / #20180211167

Heuristic alarm and event aggregation and correlation method for service provider network operation

In one embodiment, a method for heuristic event aggregation and correlation includes grouping events from a same device into event groups. Neighboring events in an event group have a timestamp gap of less than a defined timestamp gap threshold. ... Cisco Technology Inc

07/19/18 / #20180206275

System and method to facilitate stateless serving gateway operations in a network environment

A method is provided in one example embodiment and may include sharing an access key from a control-plane serving gateway (sgw-c) to a plurality of user-plane serving gateways (sgw-us); allocating a plurality of fully qualified tunnel endpoint identifiers (fqteids) associated with a user equipment (ue) session; generating an access token for the ue session based, at least in part, on the access key and the plurality of fqteids; and appending the access token to user-plane packets for the ue session. The method can further include receiving a data packet for the ue session by a particular sgw-u, wherein the uplink packet is appended with the access token for the ue session; determining fqteids associated with the uat; and routing the uplink packet from the particular sgw-u based on the fqteids.. ... Cisco Technology Inc

07/19/18 / #20180206198

Jointly managed access point transmit power control

Previously available network monitoring and management systems fail to provide adequate transmit power control in wifi networks having multiple neighboring wireless access points. By contrast, various implementations disclosed herein include systems, methods and apparatuses that generate an interference map based at least on co-channel interference reported in a number of neighbor lists, wherein each of the neighbor lists is associated with a respective one of a plurality of compliant wireless access points included in one of a local area network (lan) and a portion of a virtual lan (vlan); and determine a respective transmit power adjustment for each of the plurality of compliant wireless access points included in the interference map based on at least one interference criterion characterizing the interference on each of the plurality of compliant wireless access points included in the interference map and respective neighboring wireless access points.. ... Cisco Technology Inc

07/19/18 / #20180206145

Networking apparatuses and packet statistic determination methods employing atomic counters

Disclosed herein are methods and related apparatuses for determining statistics descriptive of packets received at a particular location on a network out of a set of packets transmitted on the network, which include transmitting first and second groups of packets on the network, the packets in the first and second groups labeled with first and second labels, respectively (the packets in the second group not in the first group), incrementing first and second packet counters associated with the particular network location in response to packet(s) in the first and second groups, respectively, being received at the network location until all packets in the first and second groups have drained from the network, and using values read from the first and second packet counters to determine a statistic descriptive of the packets received at the particular network location out of those in the first and second groups transmitted on the network.. . ... Cisco Technology Inc

07/19/18 / #20180205989

Determining audience engagement

Determining audience engagement may be provided. First, an image may be received and a plurality of faces may be identified in the received image. ... Cisco Technology Inc

07/19/18 / #20180205802

Cache aware streaming

Cache aware streaming may be provided. First, a client device may measure a transfer rate of a flow corresponding to content. ... Cisco Technology Inc

07/19/18 / #20180205750

Statistical fingerprinting of network traffic

In one embodiment, a device in a network determines a set of lattice points in a multi-dimensional space constructed using message characteristics of messages exchanged between endpoint nodes in the network. The device uses the lattice points to derive vector representations of communication channels in the network with each of the communication channels being associated with one or more of the exchanged messages. ... Cisco Technology Inc

07/19/18 / #20180205734

Security policy for https

In one embodiment, a browser operating on a host device receives, from a user, a request to access a web server that includes a uniform resource locator (url) associated with the web server. In response, the browser sends, to a domain name system (dns) server, a request for an internet protocol (ip) address correlated with the domain hosting the url, and receives, from the dns server, a response that comprises a block policy ip address and an appropriate error code. ... Cisco Technology Inc

07/19/18 / #20180205713

Graceful handling of dynamic update in peer address of secure communication session

A computing device receives one or more messages in a secure communication session with a peer device. Security information for the secure communication session includes a first network address associated with the peer device. ... Cisco Technology Inc

07/19/18 / #20180205669

System and method for scaling multiclouds in a hybrid cloud architecture

According to one aspect, a method includes an intercloud fabric switch (ics) included in a public cloud and an ics cluster obtaining a packet, and determining if the packet is obtained from a site-to-site link that links the ics to an enterprise datacenter. If the packet is obtained from the site-to-site link, it is determined whether the packet is an unknown unicast packet. ... Cisco Technology Inc

07/19/18 / #20180205654

Hash-based address matching

In one embodiment, processing is performed based on the result of a lookup operation that determines a matching hash bucket entry, with each of the entries of the hash table spanning at least two memories. A first portion of the matching hash bucket entry is retrieved from a first random access memory from a first hash bucket stored at a first location identified based on a first particular hash function applied to a hash key. ... Cisco Technology Inc

07/19/18 / #20180205643

Propagating flow characteristics in service function chaining (sfc) headers

In one embodiment, a service function classifier device determines a classification of a packet using one or more packet classification rules. The device selects a service function path based on the classification of the packet. ... Cisco Technology Inc

07/19/18 / #20180205641

Entropy prefix segment identifier for use with entropy label in segment routing networks

In one embodiment, a method includes receiving at an ingress node in a segment routing network, an entropy prefix segment identifier, generating a label stack comprising the entropy prefix segment identifier and an entropy label beneath the entropy prefix segment identifier, and transmitting a packet comprising the label stack using the entropy prefix segment identifier as a transport label and an entropy label identifier. An apparatus and logic are also disclosed herein.. ... Cisco Technology Inc

07/19/18 / #20180205624

System and method for continuous in-line monitoring of data-center traffic

Disclosed is a method for continuous in-line monitoring of data-centric traffic to guarantee application performance. The method includes, in each switch of a plurality of switches in a network fabric, grouping all packets entering each respective switch of the plurality of switches based on either 5-tuple applications or epg based applications, collecting performance statistics at every hop in the network fabric across all flows in-line in a flow table maintained in each respective switch and periodically exporting the performance statistics to analysis module.. ... Cisco Technology Inc

07/19/18 / #20180205605

Datacenter workload deployment using global service profiles

At least two domains of a datacenter are registered. Each of the domains comprises at least one server. ... Cisco Technology Inc

07/19/18 / #20180205565

Bit indexed explicit replication using internet protocol version 6

Various systems and methods for performing bit indexed explicit replication (bier) using ipv6. For example, one method involves receiving, at a node, a packet that includes an ip header. ... Cisco Technology Inc

07/19/18 / #20180205532

Front end for full duplex cable modem

Designs for a front end for suppressing adjacent channel interference (aci) and adjacent leakage interference (ali) in a full duplex cable modem (cm) for a data over cable service interface specification (“docsis”) network are described. The cm includes an upstream (us) signal path receiving a digital us input signal and transmitting an analog-converted us signal in a us frequency range to a cable modem termination system (cmts); a downstream (ds) signal path receiving an analog ds signal in a ds frequency range and converting the analog ds signal into a digital ds signal; and an echo cancellation (ec) circuit configured to subtract, from at least one of the analog ds signal and the digital ds signal, a correction signal generated from the digital us input signal or a correction signal generated from the analog-converted us signal to generate an echo-cancelled digital ds input signal without aci and ali.. ... Cisco Technology Inc

07/19/18 / #20180205394

Malleable error control code structures suitable for adaptive error protection

In various implementations, a method includes determining a sequence of source packets. In some implementations, the sequence of source packets satisfies a windowing condition. ... Cisco Technology Inc

07/19/18 / #20180204129

Predicting a user experience metric for an online conference using network analytics

In one embodiment, a device in a network receives an indication of a connection between an endpoint node in the network and a conferencing service. The device retrieves network data associated with the indicated connection between the endpoint node and the conferencing service. ... Cisco Technology Inc

07/19/18 / #20180204093

Clustering-based person re-identification

Presented herein are techniques for assignment of an identity to a group of captured images. A plurality of captured images that each include an image of at least one person are obtained. ... Cisco Technology Inc

07/19/18 / #20180203866

Distributed object storage

The disclosure provides a system, method and computer-readable storage device embodiments. Some embodiments can include an ipv6-centric distributed storage system. ... Cisco Technology Inc

07/19/18 / #20180203604

Fast archival with loopback

In one embodiment, an accelerator node transfers a first fragment of the data in a first format received from a data generating machine to a storage node. The accelerator node reads the first fragment in the first format from the storage node after the transferring is complete. ... Cisco Technology Inc

07/12/18 / #20180199339

Dynamic installation of bypass path by intercepting node in storing mode tree-based network

In one embodiment, a method comprises promiscuously detecting, by a network device in a wireless data network having a tree-based topology for reaching a root device, a wireless data packet transmitted by a source network device and specifying a destination device in the wireless data network; determining, by the network device, that the destination device is within a first sub-topology provided by the network device to reach the root device, wherein the source network device is within a second distinct sub-topology provided by a parent device of the source network device to reach the root device; and causing installation of a bypass path, bypassing the root device, based on the network device generating and transmitting an instruction to the parent device to install a route entry causing a data packet destined for the destination device to be routed by the parent device directly to the network device.. . ... Cisco Technology Inc

07/12/18 / #20180198852

Forming neighborhood groups from disperse cloud providers

A cloud manager, for forming neighborhood groups from disperse cloud providers, receives provider data relating to a plurality of disperse cloud providers for a plurality of data subcategories classified under n-number main categories. The cloud manager generates a respective vector to represent each of the plurality of disperse cloud providers based on the provider data. ... Cisco Technology Inc

07/12/18 / #20180198811

Identifying malicious network traffic based on collaborative sampling

Identifying malicious network traffic based on distributed, collaborative sampling includes, at a computing device having connectivity to a network, obtaining a first set of data flows, based on sampling criteria, that represents network traffic between one or more nodes in the network and one or more domains outside of the network, each data flow in the first set of data flows including a plurality of data packets. The first set of data flows is forwarded for correlation with a plurality of other sets of data flows from other networks to generate global intelligence data. ... Cisco Technology Inc

07/12/18 / #20180198805

Graph prioritization for improving precision of threat propagation algorithms

Systems described herein preemptively detect newly registered network domains that are likely to be malicious before network behavior of the domains is actually observed. A network security device (e.g., a router) receives domain registration data that associates network domains with keys and generating a graph representing the domain registration data. ... Cisco Technology Inc

07/12/18 / #20180196686

Method of tracking usage of virtual machines

A method for tracking virtual machine usage includes deploying, by a client machine with a client internet protocol (ip) address, an instance of a virtual machine. The client machine generates an identification for the instance of the virtual machine and requests a domain name system (dns) lookup for a domain name string from a tracker server specified by a tracker ip address, where the domain name string comprises the identification. ... Cisco Technology Inc

07/05/18 / #20180192157

Method and device for determining redress measures for tv service outages based in impact analysis

Techniques for use in determining redress measures for a television (tv) service outage based on impact analysis are described. A tv service outage may be associated with a tv system apparatus including a tv user interface (ui). ... Cisco Technology Inc

07/05/18 / #20180192131

Method and device for identifying and verifying the illegitimate use of residential set-top boxes

In one illustrative example, tv usage data associated with a residential set-top box (stb) are obtained and stored over a plurality of repeated (e.g. Weekly) time periods. ... Cisco Technology Inc

07/05/18 / #20180192002

Automated configuration of behavior of a telepresence system based on spatial detection of telepresence components

A system that automatically configures the behavior of the display devices of a video conference endpoint. The controller may detect, at a microphone array having a predetermined physical relationship with respect to a camera, audio emitted from one or more loudspeakers, each loudspeaker having a predetermined physical relationship with respect to at least one of one or more display devices in a conference room. ... Cisco Technology Inc

07/05/18 / #20180191757

Using data science to aid in detection of unauthorized distribution

In one embodiment, a method performed by a system that includes at least one processor, the method comprising: obtaining subscriber data of a plurality of subscribers, wherein said subscriber data comprises at least one of: consumption data relating to subscribed content consumption by said plurality of subscribers, or network data relating to data transmittal via one or more computer networks by the plurality of subscribers; detecting anomalous data by comparing subscriber data of different subscribers in the plurality of subscribers; identifying one or more suspected subscribers out of the plurality of subscribers as being suspected of unauthorized subscribed content distribution, the one of more suspected subscribers being associated with the anomalous data; and providing a respective identity for the one or more suspected subscribers.. . ... Cisco Technology Inc

07/05/18 / #20180191748

Associating a user identifier detected from web traffic with a client address

In one embodiment, a device in a network receives a set of known user identifiers used in the network. The device receives web traffic log data regarding web traffic in the network. ... Cisco Technology Inc

07/05/18 / #20180191703

User-to-user information (uui) carrying security token in pre-call authentication

In one embodiment, a telecommunication apparatus includes a processor to generate a telephone call set-up message including a user-to-user information (uui) field, and include a security token in the uui field of the telephone call set-up message, and a network interface to send the telephone call set-up message to a telephone network. Related apparatus and methods are also described.. ... Cisco Technology Inc

07/05/18 / #20180191669

Providing dynamic routing updates in field area network deployment using internet key exchange v2

A method is described and in one embodiment includes identifying at an initiator element a list of internet protocol (“ip”) prefixes corresponding to routes designated as interesting routes, wherein the ip prefixes are included in a routing information base (“rib”) of the initiator; monitoring the rib for a change in the list of ip prefixes; and, responsive to detection of a change in the list of ip prefixes, injecting at least a portion of the changed list of ip prefixes into a payload of an ikev2 notify message and sending the ikev2 notify message to a responder element peered with the initiator element, wherein the responder element updates an rib of the responder element using the ip prefixes included in the received ikev2 notify message.. . ... Cisco Technology Inc

07/05/18 / #20180191615

Using segmentation identification to identify destination node within network environment

Packet transmission techniques are disclosed herein. An exemplary method includes receiving a packet that identifies an internet protocol (ip) address assigned to more than one destination node; selecting a virtual routing and forwarding table based, at least in part, on a segmentation identification in the packet; identifying a designated destination node in the packet based, at least in part, on the selected virtual routing and forwarding table; and transmitting the packet to the designated destination node.. ... Cisco Technology Inc

07/05/18 / #20180191603

Detecting and mitigating loops

Access-side loop mitigation may be provided. First, a first edge device may determine that a duplicate host exists on a network. ... Cisco Technology Inc

07/05/18 / #20180189951

Automated generation of pre-labeled training data

Presented herein are techniques for automatically generating object segmentation training data. In particular, a segmentation data generation system is configured to obtain training images derived from a scene captured by one or more image capture devices. ... Cisco Technology Inc

07/05/18 / #20180189677

Training a machine learning-based traffic analyzer using a prototype dataset

In one embodiment, a device in a network generates a feature vector based on traffic flow data regarding one or more traffic flows in the network. The device makes a determination as to whether the generated feature vector is already represented in a training dataset dictionary by one or more feature vectors in the dictionary. ... Cisco Technology Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Cisco Technology Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Cisco Technology Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###