Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Cisco Technology Inc patents


Recent patent applications related to Cisco Technology Inc. Cisco Technology Inc is listed as an Agent/Assignee. Note: Cisco Technology Inc may have other listings under different names/spellings. We're not affiliated with Cisco Technology Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "C" | Cisco Technology Inc-related inventors


Dynamic installation of bypass path by intercepting node in storing mode tree-based network

In one embodiment, a method comprises promiscuously detecting, by a network device in a wireless data network having a tree-based topology for reaching a root device, a wireless data packet transmitted by a source network device and specifying a destination device in the wireless data network; determining, by the network device, that the destination device is within a first sub-topology provided by the network device to reach the root device, wherein the source network device is within a second distinct sub-topology provided by a parent device of the source network device to reach the root device; and causing installation of a bypass path, bypassing the root device, based on the network device generating and transmitting an instruction to the parent device to install a route entry causing a data packet destined for the destination device to be routed by the parent device directly to the network device.. . ... Cisco Technology Inc

Forming neighborhood groups from disperse cloud providers

A cloud manager, for forming neighborhood groups from disperse cloud providers, receives provider data relating to a plurality of disperse cloud providers for a plurality of data subcategories classified under n-number main categories. The cloud manager generates a respective vector to represent each of the plurality of disperse cloud providers based on the provider data. ... Cisco Technology Inc

Identifying malicious network traffic based on collaborative sampling

Identifying malicious network traffic based on distributed, collaborative sampling includes, at a computing device having connectivity to a network, obtaining a first set of data flows, based on sampling criteria, that represents network traffic between one or more nodes in the network and one or more domains outside of the network, each data flow in the first set of data flows including a plurality of data packets. The first set of data flows is forwarded for correlation with a plurality of other sets of data flows from other networks to generate global intelligence data. ... Cisco Technology Inc

Graph prioritization for improving precision of threat propagation algorithms

Systems described herein preemptively detect newly registered network domains that are likely to be malicious before network behavior of the domains is actually observed. A network security device (e.g., a router) receives domain registration data that associates network domains with keys and generating a graph representing the domain registration data. ... Cisco Technology Inc

Method of tracking usage of virtual machines

A method for tracking virtual machine usage includes deploying, by a client machine with a client internet protocol (ip) address, an instance of a virtual machine. The client machine generates an identification for the instance of the virtual machine and requests a domain name system (dns) lookup for a domain name string from a tracker server specified by a tracker ip address, where the domain name string comprises the identification. ... Cisco Technology Inc

Method and device for determining redress measures for tv service outages based in impact analysis

Techniques for use in determining redress measures for a television (tv) service outage based on impact analysis are described. A tv service outage may be associated with a tv system apparatus including a tv user interface (ui). ... Cisco Technology Inc

Method and device for identifying and verifying the illegitimate use of residential set-top boxes

In one illustrative example, tv usage data associated with a residential set-top box (stb) are obtained and stored over a plurality of repeated (e.g. Weekly) time periods. ... Cisco Technology Inc

Automated configuration of behavior of a telepresence system based on spatial detection of telepresence components

A system that automatically configures the behavior of the display devices of a video conference endpoint. The controller may detect, at a microphone array having a predetermined physical relationship with respect to a camera, audio emitted from one or more loudspeakers, each loudspeaker having a predetermined physical relationship with respect to at least one of one or more display devices in a conference room. ... Cisco Technology Inc

Using data science to aid in detection of unauthorized distribution

In one embodiment, a method performed by a system that includes at least one processor, the method comprising: obtaining subscriber data of a plurality of subscribers, wherein said subscriber data comprises at least one of: consumption data relating to subscribed content consumption by said plurality of subscribers, or network data relating to data transmittal via one or more computer networks by the plurality of subscribers; detecting anomalous data by comparing subscriber data of different subscribers in the plurality of subscribers; identifying one or more suspected subscribers out of the plurality of subscribers as being suspected of unauthorized subscribed content distribution, the one of more suspected subscribers being associated with the anomalous data; and providing a respective identity for the one or more suspected subscribers.. . ... Cisco Technology Inc

Associating a user identifier detected from web traffic with a client address

In one embodiment, a device in a network receives a set of known user identifiers used in the network. The device receives web traffic log data regarding web traffic in the network. ... Cisco Technology Inc

User-to-user information (uui) carrying security token in pre-call authentication

In one embodiment, a telecommunication apparatus includes a processor to generate a telephone call set-up message including a user-to-user information (uui) field, and include a security token in the uui field of the telephone call set-up message, and a network interface to send the telephone call set-up message to a telephone network. Related apparatus and methods are also described.. ... Cisco Technology Inc

Providing dynamic routing updates in field area network deployment using internet key exchange v2

A method is described and in one embodiment includes identifying at an initiator element a list of internet protocol (“ip”) prefixes corresponding to routes designated as interesting routes, wherein the ip prefixes are included in a routing information base (“rib”) of the initiator; monitoring the rib for a change in the list of ip prefixes; and, responsive to detection of a change in the list of ip prefixes, injecting at least a portion of the changed list of ip prefixes into a payload of an ikev2 notify message and sending the ikev2 notify message to a responder element peered with the initiator element, wherein the responder element updates an rib of the responder element using the ip prefixes included in the received ikev2 notify message.. . ... Cisco Technology Inc

Using segmentation identification to identify destination node within network environment

Packet transmission techniques are disclosed herein. An exemplary method includes receiving a packet that identifies an internet protocol (ip) address assigned to more than one destination node; selecting a virtual routing and forwarding table based, at least in part, on a segmentation identification in the packet; identifying a designated destination node in the packet based, at least in part, on the selected virtual routing and forwarding table; and transmitting the packet to the designated destination node.. ... Cisco Technology Inc

Detecting and mitigating loops

Access-side loop mitigation may be provided. First, a first edge device may determine that a duplicate host exists on a network. ... Cisco Technology Inc

07/05/18 / #20180189951

Automated generation of pre-labeled training data

Presented herein are techniques for automatically generating object segmentation training data. In particular, a segmentation data generation system is configured to obtain training images derived from a scene captured by one or more image capture devices. ... Cisco Technology Inc

07/05/18 / #20180189677

Training a machine learning-based traffic analyzer using a prototype dataset

In one embodiment, a device in a network generates a feature vector based on traffic flow data regarding one or more traffic flows in the network. The device makes a determination as to whether the generated feature vector is already represented in a training dataset dictionary by one or more feature vectors in the dictionary. ... Cisco Technology Inc

07/05/18 / #20180189191

Multi-level paging and address translation in a network environment

An example method for facilitating multi-level paging and address translation in a network environment is provided and includes receiving a request for memory in a physical memory of a network element, associating the request with a first virtual address space, mapping a memory region located in the physical memory to a first window in the first virtual address space, the memory region being also mapped to a second window in a different, second virtual address space, remapping the first window in the first virtual address space to the second window in the second virtual address space, and responding to the request with addresses of the second window in the second virtual address space.. . ... Cisco Technology Inc

07/05/18 / #20180188450

Photonic chip with an evanescent coupling interface

Embodiments herein describe a photonic chip which includes a coupling interface for evanescently coupling the chip to a waveguide on an external substrate. In one embodiment, the photonic chip includes a tapered waveguide that aligns with a tapered waveguide on the external substrate. ... Cisco Technology Inc

06/28/18 / #20180184340

Network initiated dynamic quality of service for carrier wireless local area network calling

Presented herein are techniques for detecting establishment of a bearer associated with a communication session offloaded from a mobile carrier network to a wireless local area network, such as a wi-fi® network, and sending, from the mobile carrier network to the wireless local area network, an indication of a level of quality of service (qos) to be applied to a segment of the communication session that is conveyed by the wireless local area network. The indication of the level of qos may be passed via a network controller.. ... Cisco Technology Inc

06/28/18 / #20180184337

Cable cellular heterogeneous network

A method is described and in one embodiment includes providing a physical connection between a node and a user equipment at a subscriber premises via a cable connection, wherein the node comprises a data over cable service interface specification (“docsis”) remote phy device (“rpd”) collocated with a cellular small cell device; receiving at the node a cellular downlink (“dl”) data signal from a cellular network connected to the cellular small cell device; combining the received cellular dl data signal with a docsis downstream (“ds”) signal from a cellular network connected to the docsis rpd to create a combined ds data signal; and forwarding the combined ds data signal from the node to the user equipment via the cable connection.. . ... Cisco Technology Inc

06/28/18 / #20180184229

Managing multiple mobile devices on different operator networks

Disclosed are techniques for managing mobile devices, such as cellphones, tablets, and laptops, deployed on different operator networks, such as cellular networks, permissioned wi-fi networks, lans, and wans. The techniques include receiving, at an interface module, a request identifying at least two mobile devices and at least two of a plurality of operator networks associated therewith. ... Cisco Technology Inc

06/28/18 / #20180184228

Managing mobile devices on different operator networks

Disclosed are techniques for managing mobile devices, such as cellular telephones, tablets, and laptop computers, deployed on different operator networks, such as cellular networks, permissioned wi-fi networks, lans, and wans. The techniques include receiving, at an interface module, a request identifying a mobile device and one of a plurality of operator networks associated with the device. ... Cisco Technology Inc

06/28/18 / #20180184160

Reinforced interleaved watermarking

In one embodiment, an apparatus includes a processor to receive a primary video, select first sections of the primary video in which to include units of data for use in watermarking, select second sections of the primary video, each second section including a first data item without which at least one video unit of the primary video cannot be rendered or rendered correctly, replace each first section with at least two watermark variants, replace each second section with at least two watermark variant decoys, wherein the apparatus is operative to operate in an environment including an end-user device operative to select one of the watermark variants for each first section and one of the watermark variant decoys for each second section for rendering as part of an interleaved video stream including the primary video in order to embed units of data of an identification in the interleaved video stream.. . ... Cisco Technology Inc

06/28/18 / #20180184146

Video streaming resource optimization

Techniques are provided for optimizing an assignment of a set of available video encoders to a plurality of video channels. Embodiments determine an optimal assignment of the set of available video encoders to the plurality of video channels, comprising, for each of the plurality of video channels, by determining a respective number of video encoders to assign to the video channel, and determining a respective set of video streams to provide for the video channel, using the assigned video encoders. ... Cisco Technology Inc

06/28/18 / #20180184145

Abr network profile selection engine

Embodiments provide techniques for optimizing abr profiles for broadcast channels at a network gateway device. Embodiments include monitoring, at a network gateway device for a network, a plurality of client devices within the network to determine adaptive bitrate (abr) streaming information for a first broadcast channel of a plurality of broadcast channels. ... Cisco Technology Inc

06/28/18 / #20180184137

Cloud dvr optimization

In one embodiment, a method, system and apparatus are described for cloud digital video recorder optimization. A cloud based storage unit stores recorded content items in response to recording requests by users from among a plurality of users, each recorded content item belonging to at least one content item type category and each user belonging to at least one user type category. ... Cisco Technology Inc

06/28/18 / #20180183865

System and method of managing flow state in stateful applications

Disclosed is a method for managing flow tables at a switch in a network. The method includes establishing a static rule to distribute a first flow to a first server and a second flow to a second server and monitoring a first load on the first server and a second load on a second server. ... Cisco Technology Inc

06/28/18 / #20180183753

Method and device for provisioning a new node using ip unnumbered interfaces

In one implementation, a method performed by a first node with interfaces configured as ip unnumbered interfaces sharing a single ip address and to communicate with a dhcp-associated second node includes: obtaining a first message that indicates a configuration status of a third node at a respective interface; obtaining a second message for the third node from the dhcp-associated second node that includes a temporary ip address for the third node and an indicator of a file server; obtaining a third message associated with the third node that includes the temporary ip address, the third message requests address information for the file server; and configuring the third node by establishing a connection between the third node and the file server to transfer at least one configuration file, where configuring the third node includes providing the temporary ip address to the dhcp-associated second node via bgp.. . ... Cisco Technology Inc

06/28/18 / #20180183734

System and method for centralized virtual interface card driver logging in a network environment

A method is provided in one example and includes creating a staging queue in a virtual interface card (vic) adapter firmware of a server based on a log policy; receiving a log message from a vic driver in the server; copying the log message to the staging queue; generating a vic control message comprising the log message from the staging queue; and sending the vic control message to a switch.. . ... Cisco Technology Inc

06/28/18 / #20180183697

Method and device for reducing multicast flow join latency

In one embodiment, a method includes determining a first node as a current termination node of a first multicast flow; determining whether a link between the first node and a downstream next-hop node has available bandwidth to accommodate the first multicast flow, where the downstream next-hop node is not currently associated with the first multicast flow; and transmitting the first multicast flow to the downstream next-hop node according to a determination that the link between the first node and a downstream next-hop node has available bandwidth to accommodate the first multicast flow. According to some implementations, the method is performed by a controller with one or more processors and non-transitory memory, where the controller is communicatively coupled to a plurality of network nodes in a network.. ... Cisco Technology Inc

06/28/18 / #20180183678

Refresh of the binding tables between data-link-layer and network-layer addresses on mobility in a data center environment

A method for assisting communication of a source host upon movement from a first data center (dc) to a second dc is disclosed. The method includes identifying that the source host has moved from the first dc to the second dc, ensuring that packets identifying a source as the source host in the second dc are copied to a control plane network element, and, for a first destination host identified in a first packet copied to the control plane network element and identified as a host that is not in the second dc, updating an address resolution protocol (arp)/neighbor discovery protocol (ndp) cache of the source host by sending, to the source host, a first arp message/unsolicited neighbor advertisement specifying a media access control (mac) address of an edge router associated with the source host in the second dc as a destination mac address for the first destination host.. ... Cisco Technology Inc

06/28/18 / #20180183660

Configuring heterogeneous computing environments using machine learning

In one embodiment, a device receives data regarding a plurality of heterogeneous computing environments. The received data comprises measured application metrics for applications executed in the computing environments and indications of processing capabilities of the computing environments. ... Cisco Technology Inc

06/28/18 / #20180183654

Systems, devices, and methods for detecting an ethernet segment failure in an ethernet virtual private network

Systems, devices, and methods for detecting an ethernet segment failure in an ethernet virtual private network (evpn) are described herein. An example method can include monitoring for failure of an ethernet segment, establishing a bidirectional forwarding detection (bfd) session with a remote peer, and transmitting a bfd control packet to the remote peer over a network. ... Cisco Technology Inc

06/28/18 / #20180183435

Efficiently managing multiple power supplies

An apparatus comprises multiple power supply switches each including a respective power metal oxide semiconductor field effect transistor (mosfet) to receive a respective one of multiple power voltages ranked incrementally from a lowest priority to a highest priority, and multiple control modules each coupled to, and configured to control, a respective one of the power mosfets, each control module to receive all of the power voltages having higher priorities than the power voltage received at the respective power mosfet controlled by that control module, each control module to control the respective power mosfet so as to turn off the respective power mosfet if any of the higher priority power voltages are present, or permit the respective power mosfet to turn on responsive to the respective power voltage if all of the higher priority power voltages are absent.. . ... Cisco Technology Inc

06/28/18 / #20180181751

Anomaly detection in distributed ledger systems

In various implementations, a method of identifying anomalies is performed by a first network node that is configured to maintain a distributed ledger in coordination with a plurality of network nodes. In various implementations, the first network node includes one or more processors, a non-transitory memory, and one or more network interfaces. ... Cisco Technology Inc

06/28/18 / #20180181178

Persistent power over ethernet

Embodiments described herein improve availability of a power plane in a network device by using a poe manager that is separate from an operating system in the network device. For example, when the operating system (or a poe application executing in the operating system) becomes unavailable, either because of failure or system upgrade, the poe manager continues managing a power plane in the network device such that connected pds continue to receive dc power. ... Cisco Technology Inc

06/21/18 / #20180176791

Joint scheduler for integrated wi-fi and lte-u wireless access point

An access point (ap) transmits wi-fi transmit frames according to a wi-fi protocol and long-term evolution-unlicensed (lte-u) transmit frames according to an lte-u protocol in a shared channel bandwidth that encompasses unlicensed channel bandwidth associated with the lte-u protocol. The ap assigns a wi-fi access category to each wi-fi transmit frame and assigns to each lte-u transmit frame an lte-u access category. ... Cisco Technology Inc

06/21/18 / #20180176510

Data handling method and apparatus

A method for adding a call from a second client to a videoconference; wherein a call from at least a first client is connected to the videoconference, the call from the first client comprising first call control data and first call media data; wherein the call from the second client comprises second call control data and second call media data; and wherein a first node in a videoconferencing network handles the first call media data; the method comprising: handling the second call control data at a second node of the videoconferencing network; determining whether at least one criterion is satisfied; and in the event that at least one criterion is satisfied, diverting the second call media data to the first node of the videoconferencing network.. . ... Cisco Technology Inc

06/21/18 / #20180176333

Data cap aware video streaming client

Embodiments provide techniques for selecting a video stream for a client device. Embodiments receive a request to initiate streaming of a first video content item of a plurality of video channels. ... Cisco Technology Inc

06/21/18 / #20180176281

System and method for quality-aware recording in large scale collaborate clouds

An example method includes establishing a communication session between a first participant and a second participant, programming, via a control plane, a stream classifier which is to process packets associated with the communication session with classification logic. The method includes receiving a first packet at the stream classifier and, when the communication session requires recording, applying the classification logic at the stream classifier to route the first packet into a chosen service function path that includes a recording service function which reports media quality data to the control plane. ... Cisco Technology Inc

06/21/18 / #20180176270

Initiating a conferencing meeting using a conference room device

The disclosed technology addresses the need in the art for a conference room device configured to aid the initiation, organization, and management of a conference meeting. A conference room device is configured to determine that a user is within a threshold distance of a conference room device and that the user is associated with a conference meeting at a current time. ... Cisco Technology Inc

06/21/18 / #20180176269

Multimodal stream processing-based cognitive collaboration system

A collaboration system includes a stream processing engine and a bot subsystem. The stream processing engine performs cognitive processing of multimodal input streams originated at one or more user devices in a communication session supported by a collaboration service to derive user-intent-based user requests and transmit the user requests over one or more networks. ... Cisco Technology Inc

06/21/18 / #20180176240

Identifying self-signed certificates using http access logs for malware detection

In one embodiment, a device in a network receives traffic information regarding one or more secure sessions in the network. The device associates the one or more secure sessions with corresponding certificate validation check traffic indicated by the received traffic information. ... Cisco Technology Inc

06/21/18 / #20180176232

Detecting malicious domains and client addresses in dns traffic

In one embodiment, a device in a network constructs a graph based on domain name system (dns) traffic in which vertices of the graph correspond to client addresses from the dns traffic and domains from dns traffic. The device uses stacked autoencoders to determine priors for the domains and client addresses. ... Cisco Technology Inc

06/21/18 / #20180176218

Network authorization in web-based or single sign-on authentication environments

Systems and methods for network authorization are described herein. An example method can include receiving a user credential from a host device connected to a network, authenticating the user credential, and in response to authenticating the user credential, determining an authorization policy associated with the host device. ... Cisco Technology Inc

06/21/18 / #20180176181

Endpoint admission control

In an example, there is disclosed a network switch, including: an ingress interface; an egress interface; an endpoint repository network interface; and one or more logic elements including an endpoint admission control engine to: receive a packet on the ingress interface, the packet having an associated source internet protocol (ip) address and virtual network identifier (vni); query an endpoint repository via the endpoint repository network interface for the source ip address and vni; determine that the source ip address and vni are found in an endpoint repository database of the endpoint repository; and forward the packet to a destination ip address via the egress interface.. . ... Cisco Technology Inc

06/21/18 / #20180176145

Switch fabric based load balancing

A switch/switching fabric is configured to load balance traffic. The switch fabric includes a plurality of switches. ... Cisco Technology Inc

06/21/18 / #20180176134

Machine learning-derived entropy path graph from in-situ oam (ioam) data

In one embodiment, a device in a network receives in-situ operations administration and management (ioam) data regarding a plurality of traffic flows in the network. The ioam data comprises entropy values for the plurality of traffic flows. ... Cisco Technology Inc

06/21/18 / #20180176128

Service chaining at a network device

In one embodiment, a network device is provided that comprises a plurality of ports at which network packets are received at the network device and sent from the network device. At least hardware module includes one or more memories that store entries for one or more networking features to be performed to direct network packets with respect to the plurality of ports. ... Cisco Technology Inc

06/21/18 / #20180176105

Sorting and displaying network traffic analytics

A method including: in a network element that includes one or more hardware memory resources of fixed storage capacity for storing data used to configure a plurality of networking features of the network element and a utilization management process running on the network element, the utilization management process performing operations including: obtaining a plurality of entries of the one or more hardware memory resources representing utilization of the one or more hardware memory resources by network traffic passing through the network element; sorting the plurality of entries of the one or more hardware memory resources by statistics associated with the network traffic passing through the network element to produce sorted entries; and sending the extracted to a network management application for display is disclosed. An apparatus and one or more non-transitory computer readable storage media to execute the method are also provided.. ... Cisco Technology Inc

06/21/18 / #20180176096

Network data model mapping based on matching strength

In one embodiment, a method includes processing network data models at a network device configured to operate in a network comprising one or more network components associated with one of the network data models, generating representations of the network data models, the representations comprising labels for elements in the network data models, comparing the labels associated with leaf nodes of the network data models to identify matching leaf nodes, comparing the labels associated with parent nodes of the matching leaf nodes to identify a strength of matching, and mapping at least two of the network data models at the network device based on the strength of matching for use in a network application. An apparatus and logic are also disclosed herein.. ... Cisco Technology Inc

06/21/18 / #20180176044

Computing transmit and receive filters for a network device

The embodiments herein use a factorization based technique for determining filter coefficients for a subset of the subcarriers in a wireless frequency band. Once the filter coefficients for the subset of the subcarriers are calculated, the network device uses these filter coefficients to identify the filter coefficients in a neighboring subcarrier. ... Cisco Technology Inc

06/21/18 / #20180175903

Spread spectrum acoustic communication techniques

In a transmit method, a set of data eigenvectors that are based on a prometheus orthonormal set (pons) code construction and orthogonal to each other are stored, wherein each of the data eigenvectors is mapped to a unique multi-bit word. A pilot sequence representing a pilot eigenvector that is based on the pons code construction and orthogonal to each of the data eigenvectors is generated. ... Cisco Technology Inc

06/21/18 / #20180175895

Filter design for access points

Receiving filter design that reduces out-of-channel interference for aps is disclosed. An ap includes a first radio and a second radio disposed in a body of the ap. ... Cisco Technology Inc

06/21/18 / #20180175675

Removal of common mode choke

Disclosed herein is a technique for a connection from an ethernet physical transceiver (phy) to an integrated connector module (icm) where the connection and the icm lack a common mode choke. The icm can include a magnetic coupler that directly couples an ethernet jack and the phy.. ... Cisco Technology Inc

06/21/18 / #20180173436

Performing multiple write operations to a memory using a pending write queue/cache

Techniques are described for a memory device. In various embodiments, a scheduler/controller is configured to manage data as it read to or written from a memory. ... Cisco Technology Inc

06/14/18 / #20180167880

System and method for providing power savings in an access point via ethernet rate and interface shifting

Disclosed is a method for managing bus channels between a physical layer and a media access channel layer of a network. The method includes determining a current rate of link speed on a media dependent interface side of a physical layer of a network architecture. ... Cisco Technology Inc

06/14/18 / #20180167706

Telecommunications audio endpoints

Presented herein is an audio endpoint for telecommunication operations, sometimes referred to herein as a “telecommunications audio endpoint” or, more, simply as an “audio endpoint.” according to at least one example, the audio endpoint presented herein includes a base, a speaker, a speaker waveguide, a microphone waveguide, and two or more microphones. The base is configured to engage a support surface (i.e., a table) and the speaker is configured to emit sounds (i.e., fire) in a direction of the base. ... Cisco Technology Inc

06/14/18 / #20180167617

Adaptive multi-symbol arithmetic coding

Techniques are presented herein for coding non-binary syntax elements in video coding, including coefficients, by using a symbol-adaptive multi-symbol arithmetic code. These techniques achieve coding gain, reduce or eliminate the deficit of error-resilient versus non-error resilient coding, eliminate the compressed header and reduce the symbol throughput in entropy coding.. ... Cisco Technology Inc

06/14/18 / #20180167450

Adaptive load balancing for application chains

Disclosed are systems, methods, and computer-readable storage media for adaptive load balancing for application chains. A load-balancer can receive a data packet for a connection/transaction to be routed through an application chain. ... Cisco Technology Inc

06/14/18 / #20180167404

Filtering onion routing traffic from malicious domain generation algorithm (dga)-based traffic classification

In one embodiment, a device in a network receives domain information from a plurality of traffic flows in the network. The device identifies a particular address from the plurality of traffic flows as part of an onion routing system based on the received domain information. ... Cisco Technology Inc

06/14/18 / #20180167370

Secure data exchange platform

In one embodiment, a device in a network receives sensor data from one or more nodes in the network. The device selects a processing mode from among a plurality of processing modes based on a plurality of attributes of the sensor data. ... Cisco Technology Inc

06/14/18 / #20180167338

Handling reflexive acls with virtual port-channel

Techniques for providing a reflexive access control list (acl) on a virtual switch are provided. Embodiments receive a first packet corresponding to a first network flow and a second packet corresponding to a second network flow. ... Cisco Technology Inc

06/14/18 / #20180167315

Efficient multicast traffic forwarding in evpn-based multi-homed networks

Embodiments of the present disclosure relate to assisting forwarding of multicast traffic over ethernet virtual private network (evpn) from a multicast source to a host multi-homed to multiple provider edge (pe) devices. Embodiments are based on the inclusion of an ethernet segment identification (esi) to evpn type-6 routes advertised by pe devices which received a multicast join message. ... Cisco Technology Inc

06/14/18 / #20180167311

Forwarding of multicast packets in a network

In one embodiment, multicast packets including, but not limited to, bit index explicit replication (bier) multicast packets, are forwarded in a network. An independent lookup operation is performed on each destination node identified in the received packet to determine a nexthop to which to forward a copy of the packet. ... Cisco Technology Inc

06/14/18 / #20180167198

Trust enabled decentralized asset tracking for supply chain and automated inventory management

A system for decentralized tracking of assets (devices (hardware) or software) is provided. One or more servers are configured to execute blockchain software for a blockchain that tracks ownership and usage of devices or software. ... Cisco Technology Inc

06/14/18 / #20180165579

Deep learning application distribution

In one embodiment, a method includes training a deep neural network using a first set of network characteristics corresponding to a first time and a second set of network characteristics corresponding to a second time, generating, using the deep neural network, a predictive set of network characteristics corresponding to a future time, and assigning a task of a distributed application to a processing unit based on the predictive set of network characteristics.. . ... Cisco Technology Inc

06/14/18 / #20180165576

Scalable deep learning video analytics

In one embodiment, a method includes receiving training data, the training data including training video data representing video of a location in a quiescent state, training a neural network using the training data to obtain a plurality of metrics, receiving current data, the current data including current video data representing video of the location at a current time period, generating a reconstruction error based on the plurality of metrics and the current video data in the embedded space, and generating, in response to determining that the reconstruction error is greater than a threshold, a notification indicative of the location being in a non-quiescent state.. . ... Cisco Technology Inc

06/14/18 / #20180165313

Distributing and processing streams over one or more networks for on-the-fly schema evolution

In an embodiment, a method comprises receiving a first record comprising one or more first fields from a first source computer; in response to determining that the first record is a first type and a first node is associated with the first type, sending the first record to the first node to be processed; receiving a second record comprising the one or more first fields and one or more second fields from a second source computer; in response to determining that the second record is a second type and a second node is associated with the second type, sending the second record to the second node; in response to determining that the second type is a first subtype of the first type, sending the second record to the first node to be processed, without suspending the first node.. . ... Cisco Technology Inc

06/14/18 / #20180164958

Ordered list user interface

In one embodiment, a method includes receiving input data from at least one input device, preparing a user interface including a list of ordered items, a details panel about a first ordered item, and a pointer pointing from the details panel to a first position in the list, interpreting the input data to include moving the first pointer to pointing at a second position in the list, updating the user interface, the updated user interface including the first pointer pointing from the details panel to the second position, interpreting the input data to include confirming placement of the first ordered item for placement in the list according to the second position, and updating the user interface to show the first ordered item placed in the list according to the second position.. . ... Cisco Technology Inc

06/07/18 / #20180160415

System and method for discovery and acquisition of a control channel using guard bands

An example apparatus for discovery and acquisition of a control channel using guard bands is provided and includes a processor; and a memory in communication with the memory. The processor configured is to determine that a whitespace map is unavailable for communication between a first device and a second device; determine that a guard band is to be used for a control channel between the first device and the second device; send a first message to the second device including an indication to the second device that the second device is use a guard band to maintain communication with the first device; and send a second message to the second device including control channel tuning information associated with the guard band.. ... Cisco Technology Inc

06/07/18 / #20180160395

Slice-based tracking areas

In one embodiment, a mobile base station includes: an antenna; a transceiver operative to communicate with a user equipment (ue) via said antenna; a processor; and a mobility control application to be executed by said processor and operative: to provide to said ue when in communication with said mobile base station at least a relevant tracking area list from among at least two tracking area lists associated with said mobile base station.. . ... Cisco Technology Inc

06/07/18 / #20180160345

Overshooting cell detection

In one embodiment, a system includes: an input/output (i/o) module operative to receive operational data for features associated with at least inter-cell performance in a mobile network, processing circuitry, a model generator application to be executed by the processing circuitry and operative to: use at least one prediction model to analyze training sets comprising examples of values for the features for at least overshooting cells, and to generate a scoring model for detection of the overshooting cells from among cells in the mobile network, and a boomer detection application to be executed by the processing circuitry and operative to: use the scoring model with the operational data to detect the overshooting cells from among cells in a mobile network, and reduce interference by the overshooting cells.. . ... Cisco Technology Inc

06/07/18 / #20180160312

System and method for control channel determination and detection in an opportunistic wireless network environment

An example apparatus for control channel determination and detection in an opportunistic wireless network environment is provided and includes a processor; and a memory in communication with the processor. The processor configured is to send, by a first device, a request for a whitespace map, the whitespace map including a list of whitespace frequency channels available for use within a particular geographical area. ... Cisco Technology Inc

06/07/18 / #20180160176

Method and device for field testing user interfaces based on a flexible hierarchy structure

In one implementation, a method performed by a content server with one or more processors and non-transitory memory includes: receiving a first view request from a first client device; determining a first view group associated with the first client device in response to receiving the first view request; identifying a first view hierarchy based on the first view group, where the first view hierarchy includes a first plurality of pointers to a first plurality of content sub-tree hierarchies associated with content items and the first view hierarchy also includes a first order schema; obtaining the first plurality of content sub-tree hierarchies based on the first plurality of pointers; and transmitting display data associated with a first user interface to the first client device based on the first order schema and the first plurality of content sub-tree hierarchies.. . ... Cisco Technology Inc

06/07/18 / #20180159978

Method and system for omnichannel supervision

In one embodiment described herein, an omnichannel supervision interface system and method includes a hardware processor, and a graphics engine executed by the processor for displaying a first portion to display, for one contact center agent among a plurality of contact center agents, a near-real time transcript of the contact center agent's conversation with one customer over a plurality of channels, and a second portion to display a first media category of a session of the contact center agent and the customer, wherein the omnichannel supervision interface is operative to display a plurality of channels for the plurality of contact center agents. Related methods, apparatus, and systems are also described.. ... Cisco Technology Inc

06/07/18 / #20180159962

System and method for compressing content centric networking messages

A computer system can compress or decompress a type-length-value (tlv) component in a message. During operation, the computer can select a compression table associated with a network interface used to send and/or to receive the message, and can search the compression table for an entry that includes a prefix of a value from type-length-value (tlv) component being compressed or decompressed. ... Cisco Technology Inc

06/07/18 / #20180159957

Context export from an access point to a fabric infrastructure

Aspects of the embodiments are directed to a network element that is configured for receiving, from an access point, a data packet originating from a client, the data packet comprising a packet header that comprises a packet header augmented with context information; decapsulating the packet header to identify the context information; applying a client-specific policy on the packet based, at least in part, on the context information; and forwarding the packet to a next hop in the network. The network element can be part of a network, such as a datacenter fabric architecture.. ... Cisco Technology Inc

06/07/18 / #20180159916

System and method for announcing media changes

In one embodiment, a method, system, and apparatus is described, the method, system, and apparatus including the creation of a dedicated hypertext transfer protocol (http) live streaming (hls) adaptive bitrate (abr) timed metadata stream which is located at a designated location, the populating the dedicated hls abr timed metadata stream with timed metadata items which signal availability of a particular subset of a superset of all media types which are anticipated as being available in streaming media playlists and making the timed metadata items available to an application on a client device. Related methods, systems and apparatus is also described.. ... Cisco Technology Inc

06/07/18 / #20180159899

User interface for low-touch security policy provisioning

In one embodiment, a system includes a processor, and a memory to store data used by the processor, the processor being operative to prepare a first user interface including a security policy selection section, interpret user input data to include performing at least one security policy selection action in the security policy selection section yielding selection of a first security policy for a first device, and update the first user interface yielding an updated first user interface including the first security policy, and a first security policy activation key for inputting into a second user interface to be generated when the first device is installed, the first security policy activation key being associated with providing authentication for downloading the first security policy to the first device.. . ... Cisco Technology Inc

06/07/18 / #20180159894

Automatic threshold limit configuration for internet of things devices

Presented herein are techniques for mitigating a distributed denial of service attack. A method includes, at a network security device, such as a firewall, monitoring network traffic, flowing through the firewall, destined for a network device, determining whether the network traffic is below a predetermined amount, while the network traffic is below the predetermined amount, sending to the network device a plurality of probes, receiving responses from the network device in response to the probes, and setting one or more thresholds for subsequent traffic destined for the network device based on the responses received from the network device.. ... Cisco Technology Inc

06/07/18 / #20180159813

Source-aware technique for facilitating lisp host mobility

A method is provided in one example embodiment and includes detecting by a first network element at a first data center site a local connection of an endpoint identifier (“eid”), in which the eid was previously locally connected to a second network element at a second data center site and notifying a mapping server of the local connection of the eid to the first network element. The method further includes receiving from the mapping server identifying information for the second network element and communicating with the second network element using the identifying information to obtain service information for traffic associated with the eid. ... Cisco Technology Inc

06/07/18 / #20180159781

Group-based pruning in a software defined networking environment

Presented herein are traffic pruning techniques that define the pruning at the group level. A software defined network (sdn) controller determines first and second endpoint groups (epgs) of an sdn associated with the sdn controller. ... Cisco Technology Inc

06/07/18 / #20180159779

Load balancing eligible packets in response to a policing drop decision

One embodiment includes a packet switching device load balancing eligible packets in response to a policing drop decision. The packet switching device sends packets of a particular packet flow out of the packet switching device over a first path in the network towards a destination node; and in response to a policer discipline determining to drop a particular packet of the particular packet flow, switching from said sending packets over the first path to sending packets of the particular packet flow out of the packet switching device over a second path in the network towards the destination node (possibly by switching output queues associated with the two different paths), with the second path being different than the first path, and with the particular packet not being dropped but being sent out of the packet switching device towards the destination node.. ... Cisco Technology Inc

06/07/18 / #20180159777

Techniques for informing communications networks of desired packet transport treatment

A method is described and in one embodiment includes receiving at a first node in a communications network a message associated with a first flow, wherein the message comprises a flow treatment attribute including metadata indicative of how the first flow should be treated in the network; analyzing the flow treatment attribute at the first node; setting policy for treatment of the flow in the network based on the analyzing; and forwarding the message to a next network node.. . ... Cisco Technology Inc

06/07/18 / #20180159755

Selective and dynamic application-centric network measurement infrastructure

In one embodiment, a device in a network receives data indicative of traffic characteristics of traffic associated with a particular application. The device identifies one or more paths in the network via which the traffic associated with the particular application was sent, based on the traffic characteristics. ... Cisco Technology Inc

06/07/18 / #20180159745

Orchestration of cloud and fog interactions

Systems, methods, and computer-readable media for orchestrating cloud to fog interactions. In some examples, a method can involve partitioning an application into software containers, each of the software containers being configured to host a respective component of the application. ... Cisco Technology Inc

06/07/18 / #20180159724

Automatic task tracking

The present technology correlates tasks between multiple threads of an application. A payload consisting of a task object may be identified as part of a method. ... Cisco Technology Inc

06/07/18 / #20180159700

Capability aware routing

Various systems and methods for bypassing one or more non-capable nodes. For example, one method involves a capable node determining that an adjacent node is non-capable, where capable nodes are configured to implement a data plane capability and non-capable nodes are not. ... Cisco Technology Inc

06/07/18 / #20180159659

Minimum latency link layer metaframing and error correction

Techniques for reducing latency associated with metaframe error correction. Embodiments receive, via a first port of a plurality of ports, a stream of bits within a metaframe. ... Cisco Technology Inc

06/07/18 / #20180158437

Multi-device content presentation

In one embodiment, a method for presenting content on multiple devices is implemented on a computing device and includes: receiving selection of a multimedia content item, the multimedia content item including at least two media segments each of a different type, defining a first media segment of the at least two media segments as a primary media segment, defining at least a second media segment of the at least two media segments as at least one secondary media segment, allocating the at least one secondary media segment for presentation on at least one secondary presentation device, presenting the primary media segment on the computing device, detecting a current progress in the presenting, and based on said current progress, forwarding to the at least one secondary media segment an indication of an instruction for synchronizing presentation of the at least one secondary media segment with said presenting.. . ... Cisco Technology Inc

06/07/18 / #20180157713

Automated log analysis

There is disclosed in an example a computer-implemented method of providing automated log analysis, including: receiving a log stream comprising a plurality of transaction log entries, the log entries comprising a time stamp, a component identification (id), and a name value pair identifying a transaction; creating an index comprising mapping a key id to a name value pair of a log entry; and selecting from the index a key id having a relatively large number of repetitions. There is also disclosed an apparatus and computer-readable medium for performing the method.. ... Cisco Technology Inc

06/07/18 / #20180157572

Rogue hardware detection through power monitoring

Techniques are provided for monitoring power consumption for individual systems or devices as a way to detect illicit or rogue hardware, e.g., addition of an unauthorized integrated circuit (ic), which may have been added to an existing system. Techniques include monitoring a power on sequence of a system, the power on sequence including one or more distinct stages, determining for each stage of the one or more distinct stages of the power on sequence, whether an observed power load of any distinct stage has deviated from an expected power load according to a power profile for the system, and when the observed power load of a given distinct stage has deviated from the expected power load, performing an action indicating that a deviation from the expected power load has occurred. ... Cisco Technology Inc

06/07/18 / #20180157493

Reduced stack usage in a multithreaded processor

Embodiments are generally directed to a multithreaded processor for executing a plurality of threads, as well as an associated method and system. The multithreaded processor comprises a first control register configured to store a stack limit value, and instruction decode logic configured to, upon receiving a procedure entry instruction for a stack associated with a first thread, determine whether to throw a stack limit exception based on the stack limit value and a first predefined stack region size associated with the stack.. ... Cisco Technology Inc

06/07/18 / #20180156984

Ubiquitous optical cleaning apparatus

A device for cleaning an optical communication device includes a hollow outer stem, an inner stem core, a locking handle, a flexible base, at least one ring seal, and a flexible cover. The inner stem core, fits within a length of the hollow outer stem and is slidable along the length of the hollow outer stem. ... Cisco Technology Inc

05/31/18 / #20180152909

Precise uav tracking in 3-d space

In one embodiment, a first wireless unmanned aerial vehicle (uav)-locating signal is transmitted by a wireless network access point in a network based on a first uav-locating mode selected from a plurality of uav-locating modes. The wireless network access point receives a wireless signal in response to the first transmitted uav-locating signal, the wireless signal indicative of a location of an airborne uav, and causes the determination of the location of the airborne uav based on the received wireless signal. ... Cisco Technology Inc

05/31/18 / #20180152487

Predicting utilization of a shared collaboration resource

Presented herein are techniques and systems associated with generating a predicted utilization likelihood for a shared collaboration resource. Integrated resource data associated with a meeting scheduled for a shared collaboration resource is obtained and analyzed using a machine-learned predictive model. ... Cisco Technology Inc

05/31/18 / #20180152467

Leveraging synthetic traffic data samples for flow classifier training

In one embodiment, a device in a network receives traffic data regarding a plurality of observed traffic flows. The device maps one or more characteristics of the observed traffic flows from the traffic data to traffic characteristics associated with a targeted deployment environment. ... Cisco Technology Inc

05/31/18 / #20180152466

Estimating feature confidence for online anomaly detection

In one embodiment, a device in a network obtains characteristic data regarding one or more traffic flows in the network. The device incrementally estimates an amount of noise associated with a machine learning feature using bootstrapping. ... Cisco Technology Inc

05/31/18 / #20180152377

Source routed deterministic packet in a deterministic data network

In one embodiment, a method comprises receiving, by a network device in a deterministic data network, one or more deterministic schedules for reaching a destination network device along one or more deterministic paths in the deterministic data network; generating, by the network device, a deterministic source-route path for reaching the destination network device based on the deterministic schedules allocated for the deterministic paths, the deterministic source-route path comprising, for each specified hop, a corresponding deterministic start time; and outputting, by the network device, a source routed deterministic packet comprising the deterministic source-route path for deterministic forwarding of the source routed deterministic packet to the destination network device.. . ... Cisco Technology Inc

05/31/18 / #20180152357

Directing data flows in data centers with clustering services

Techniques are provided for implementing clustering services in a virtual data center or other virtualized infrastructure in a manner that allows packets to be directed to a particular service engine of a service engine cluster.. . ... Cisco Technology Inc

05/24/18 / #20180146413

Wireless bypass of next-hop device in source route path

In one embodiment, a method comprises promiscuously detecting, by a network device in a wireless data network, a wireless data packet comprising a source route header specifying a hop-by-hop path for reaching a destination device in the wireless data network; determining, by the network device, that the network device is identified in the hop-by-hop path as following a first next-hop device targeted for reception of the wireless data packet; and executing intercepted forwarding of the wireless data packet, by the network device, to a second next-hop device successively following the network device in the hop-by-hop path.. . ... Cisco Technology Inc

05/24/18 / #20180146251

Search filter push

In one embodiment, a receiver-decoder device includes a receiver to receive encoded video content, a decoder to decode the encoded video content, a processor to send a push proposition to a mobile device running, television remote control software via a wireless link, the posh proposition indicating an electronic program guide search filter which is activated by the receiver-decoder device on receiving a confirmation from the mobile device, receive a confirmation from the mobile device, via the wireless link, the confirmation indicating that a selectable item based on the push proposition was selected on the mobile device, filter a list of program items with the search filter yielding a filtered program item list, and display an electronic program guide including items from the filtered program item list. Related apparatus and methods are also described.. ... Cisco Technology Inc

05/24/18 / #20180146221

Keyframe mitigation for video streams with multiple receivers

In one embodiment, a video encoder generates an encoded bitstream representing a sequence of video frames including a keyframe. The encoder generates information for use by a decoder that receives the encoded bitstream to enable the decoder to generate display frames from a pre-keyframe video frame that is prior to the keyframe in the sequence of video frames. ... Cisco Technology Inc

05/24/18 / #20180146074

Dropping or admitting packets to an output queue using policy-based scheduling and virtual destination queue occupancy values

One embodiment is associated with dropping or admitting packets to an output queue using occupancy values of virtual destination queues which are updated according to different independent disciplines upon the enqueuing of a packet to an output queue, and the dequeuing of that packet from an output queue. In one embodiment, a virtual destination queue is determined for a packet. ... Cisco Technology Inc

05/24/18 / #20180146057

Managing metadata in cloud driven, thin client video applications

A client device may send a first request and then receive, in response to sending the first request, a first response and a first fingerprint tree corresponding to the first response. Next, the client device may cache the first response and the first fingerprint tree corresponding to the first response. ... Cisco Technology Inc

05/24/18 / #20180146007

Behavioral white labeling

In one embodiment, a traffic model manager node receives data flows in a network and determines a degree to which the received data flows conform to one or more traffic models classifying particular types of data flows as non-malicious. If the degree to which the received data flows conform to the one or more traffic models is sufficient, the traffic model manager node characterizes the received data flows as non-malicious. ... Cisco Technology Inc

05/24/18 / #20180145908

System and method for forwarder connection information in a content centric network

One embodiment provides a system which facilitates exchanging identifying information between connected nodes. During operation, the system generates, by an intermediate node for an adjacent node, an interest which includes an identifier for the intermediate node and a name for a link between the intermediate node and the adjacent node. ... Cisco Technology Inc

05/24/18 / #20180145906

Federated microburst detection

An example method includes a sensor detecting multiple packets of a flow during a specified total time period (e.g., a reporting time period). The total time period can be subdivided into multiple time periods. ... Cisco Technology Inc

05/24/18 / #20180145876

Integrating information centric networking (icn) over low power and lossy networks (llns)

In one embodiment, a device in a network joins an information centric networking (icn)-based directed acyclic graph (dag) based on the device being able to act as an icn cache in the network. The device receives icn content data for forwarding between a content provider node in the network and a destination node in the network. ... Cisco Technology Inc

05/24/18 / #20180145841

Reliable multi-cast in low-power and lossy networks

In one embodiment, a device in a network sends a first multicast message to a plurality of destinations in the network. The first multicast message includes a first bitmap that identifies the destinations. ... Cisco Technology Inc

05/24/18 / #20180143868

Graphical user interface for visualizing a plurality of issues with an infrastructure

Disclosed are systems, methods and non-transitory computer-readable mediums for dynamically presenting and updating a directed time graph displayed in a graphical user interface. In some examples, the method can include displaying a suggested path within a graphical user interface on a computer screen, the suggested path can include outstanding issues of elements of a network. ... Cisco Technology Inc

05/17/18 / #20180139274

Application based intelligent edge computing in a low power wide area network environment

Embodiments include technologies for receiving two or more requests to join a network from an end device via two or more gateways, respectively, and selecting one of the two or more gateways for the end device. Embodiments further include sending, to the selected gateway, a response to a request to join the network received via the selected gateway, where the response includes an indication to the selected gateway to forward the request to join the network to an edge network server associated with the selected gateway. ... Cisco Technology Inc

05/17/18 / #20180139246

In-meeting graphical user interface using calendar information

A meeting application can gather calendar information from a calendaring service, even if that calendaring service is independent from (e.g., a “third party to”) the meeting service. The meeting application can incorporate the calendar information into an in-meeting graphical user interface so that the calendar information can be displayed with the meeting. ... Cisco Technology Inc

05/17/18 / #20180139240

Routing and/or forwarding information driven subscription against global security policy data

Techniques are provided by which devices in a network may subscribe to a rapidly changing rules in central threat repository. The policies associated with threats are filtered so that just current attack vectors from within subnets learned via routing and/or forwarding information (at the network level of the network) are installed in the local access control list/policy database of the network devices. ... Cisco Technology Inc

05/17/18 / #20180139214

Malware classification and attribution through server fingerprinting using server certificate data

In one embodiment, a device in a network receives certificate data for an encrypted traffic flow associated with a client node in the network. The device determines one or more data features from the certificate data. ... Cisco Technology Inc

05/17/18 / #20180139150

Dynamic endpoint group binding for cross-tenant resource sharing in software defined networks

The techniques presented herein use dynamic endpoint group (epg) binding changes to facilitate cross-tenant resource sharing. A first node of a multi-tenant software defined network determines that an application on a first endpoint has initiated operation and needs temporary access to resources located at a second endpoint. ... Cisco Technology Inc

05/17/18 / #20180139146

Method and apparatus for providing deadline-based segmentation for video traffic

According to one aspect, a method includes identifying at least a first chunk to be obtained, the at least first chunk including at least a first packet, and determining a deadline for the first chunk, the deadline being indicative of an amount of time before the first chunk is needed. The method also includes determining whether the deadline for the first chunk is relatively long, and de-prioritizing the first chunk with respect to obtaining the first chunk for queueing in a buffer when it is determined that the deadline for the first chunk is relatively long. ... Cisco Technology Inc

05/17/18 / #20180139141

On-box behavior-based traffic classification

In one embodiment, a networking device in a network detects an traffic flow conveyed in the network via the networking device. The networking device generates flow data for the traffic flow. ... Cisco Technology Inc

05/17/18 / #20180139138

Load balancing with flowlet granularity

A first flowlet of a flow from a source network device to a destination network device is assigned to a first path of a plurality of paths between the source device and the destination device. The assignment of the first flowlet to the first path is made by a network connected device. ... Cisco Technology Inc

05/17/18 / #20180139132

Network fabric overlay

Disclosed herein are methods of forwarding packets on a network, such as a leaf-spine network having leaf devices and spine devices. The methods may include receiving a packet at an ingress leaf device, and determining based, at least in part, on a header of the packet whether the packet is to be transmitted to a spine device. ... Cisco Technology Inc

05/17/18 / #20180139127

Border leaf traffic convergence in a software defined network

A border leaf of a software defined computer network receives network traffic directed to a first endpoint from a second endpoint. The first endpoint is connected to the software defined network, and the second endpoint is external to the software defined network. ... Cisco Technology Inc

05/17/18 / #20180139124

Source address translation in overlay networks

Systems, methods, and non-transitory computer-readable storage media for translating source addresses in an overlay network. An access switch in an overlay network, such as a vxlan, may receive an encapsulated packet from a tunnel endpoint in the overlay network. ... Cisco Technology Inc

05/17/18 / #20180139066

System and method to control latency of serially-replicated multi-destination flows

Exemplified systems and methods facilitate multicasting latency optimization operations for router, switches, and other network devices, for routed layer-3 multicast packets to provide even distribution latency and/or selective prioritized distribution of latency among multicast destinations. A list of network destinations for serially-replicated packets is traversed in different sequences from one packet to the next, to provide delay fairness among the listed destinations. ... Cisco Technology Inc

05/17/18 / #20180137747

Method and apparatus for exchanging information through a tachometer signal

According to one aspect, a method includes obtaining a first signal from a host at an air mover system, the air mover system including an air mover and a tachometer, the tachometer having an associated tachometer signal. The method also includes determining whether the first signal is a request for information associated with the air mover, and providing the information from the air mover system to the host on the associated tachometer signal when it is determined that the first signal is the request for information associated with the air mover.. ... Cisco Technology Inc

05/17/18 / #20180137412

Network traffic prediction using long short term memory neural networks

A server uses an lstm neural network to predict a bandwidth value for a computer network element using past traffic data. The server receives a time series of bandwidth utilization of the computer network element. ... Cisco Technology Inc

05/17/18 / #20180137208

Method and device for sharing segmented video content across multiple manifests

Segments of media content may be shared amongst multiple requesting entities in a cdvr environment. In one illustrative example, a first request to initiate recording of media content at a first start time is received from a first requesting entity. ... Cisco Technology Inc

05/17/18 / #20180137073

Policy-driven storage in a microserver computing environment

An example method for facilitating policy-driven storage in a microserver computing environment is provided and includes receiving, at an input/output (i/o) adapter in a microserver chassis having a plurality of compute nodes and a shared storage resource, policy contexts prescribing storage access parameters of respective compute nodes and enforcing the respective policy contexts on i/o operations by the compute nodes, in which respect a particular i/o operation by any compute node is not executed if the respective policy context does not allow the particular i/o operation. The method further includes allocating tokens to command descriptors associated with i/o operations for accessing the shared storage resource, identifying a violation of any policy context of any compute node based on availability of the tokens, and throttling i/o operations by other compute nodes until the violation disappears.. ... Cisco Technology Inc

05/17/18 / #20180136714

Selection of power in power over ethernet systems

Embodiments described herein include a power over ethernet (poe) enabled device that uses 2-event classification when allocating power to coupled powered devices (pds). If the 2-event classification is successful, power sourcing equipment (pse) on the poe device allocates a maximum power allotment to the pd. ... Cisco Technology Inc

05/17/18 / #20180136683

Network energy distribution

In one embodiment, a method includes receiving, from a first resource of a plurality of resources connected by an energy network, data indicative of a current amount of energy stored by the first resource at a current time. The method includes determining, based on the data indicative of the current amount of energy stored by the first resource at the current time, a predicted amount of energy to be stored by the first resource at a later time. ... Cisco Technology Inc

05/17/18 / #20180134386

Multi-modal uav certification

In one embodiment, a method includes receiving flight path data regarding the presence of an unmanned aerial vehicle (uav) at a location at a future time, detecting the presence of the uav at the location at the future time, determining radio identity data of the uav using a radio mode of identification, determining optical identity data of the uav using an optical mode of identification, and certifying the uav based on a comparison of the radio identity data and the optical identity data to the flight path data.. . ... Cisco Technology Inc

05/10/18 / #20180132206

Method and device for improved multi-homed media transport

In one embodiment, a method includes: determining a plurality of candidate paths for a plurality of media streams, where each of the candidate paths is characterized by a first set of performance attributes and each of the plurality of media streams is characterized by a set of stream parameters; jointly determining a respective path from among the plurality of candidate paths that satisfies the set of stream parameters for each of the plurality of the media streams; and coordinating transmission of the plurality of media streams via the jointly determined respective path for each of the plurality of media streams. According to some implementations, the method is performed by a device with one or more processors and non-transitory memory.. ... Cisco Technology Inc

05/10/18 / #20180132177

System and method to facilitate power management in a long range radio network environment

An example method is provided in one example embodiment and may include receiving a power saving mode (psm) request by a long range radio, wherein the psm request comprises an identification of at least one receive window to disable for the long range radio for a plurality of uplink transmissions and an identification of a duration for which the at least one receive window is to be disabled for the plurality of uplink transmissions; and transmitting the plurality of uplink transmissions by the long range radio, wherein the at least one receive window is disabled following each uplink transmission of the plurality of uplink transmissions by the long range radio for the duration identified in the psm request.. . ... Cisco Technology Inc

05/10/18 / #20180131783

Video and media content delivery network storage in elastic clouds

Content delivery network storage may be provided. A first proxy module may receive a first content object request from a first user device. ... Cisco Technology Inc

05/10/18 / #20180131695

Methods and systems using trust-but-verify dynamic quality-of-service (qos)

Exemplified system and method optimizes dynamic quality of service (qos) operation across a network infrastructure to alleviate time constraints when applying dynamic qos policy on newly initiated traffic flow, particularly for various data streams. Initially, and by default, the exemplified system and method temporarily applies a high qos policy to a newly initiated traffic flow and then verifies the qos legitimacy of the flow to which the high qos policy for the newly initiated traffic flow is maintained or is reduced to a lower-priority qos policy. ... Cisco Technology Inc

05/10/18 / #20180131672

Method and system for enabling media optimization in a cloud conference

An example method is provided and includes receiving a relay address allocation request from an endpoint, the relay address allocation request comprises a unique session identifier that identifies a conference session joined by the endpoint for media streaming; determining a relay candidate comprising a relay transport address for allocating to each endpoint of the conference session having the unique session identifier. Further, the method includes mapping the relay candidate with the unique session identifier and sending a relay address allocation response that comprises at least the relay candidate mapped with the unique session identifier. ... Cisco Technology Inc

05/10/18 / #20180131632

Management of heterogeneous client device groups

Various implementations disclosed herein enable client devices to share a network resource in order to produce more evenly distributed perceptual playback quality levels within each subscription tier. Sharing of a network resource is facilitated by providing client devices with one or more qoe distribution indicator values, which enables client device participation in the allocation of the network resource. ... Cisco Technology Inc

05/10/18 / #20180131616

Tactical traffic engineering based on segment routing policies

In one embodiment, a method includes monitoring traffic in a segment routing (sr) network through a collection of a segment routing demand matrix (srdm) at a traffic engineering (te) system operating at a network device, receiving topology information for the sr network at the te system, modeling the sr network based on the topology information and the srdm at the te system, identifying a violation of a constraint in the sr network at the te system, and running an optimization algorithm for sr optimization of constraints in the sr network at the te system, wherein the optimization comprises limiting a number of segment identifiers (sids) used in a sr policy implemented to resolve the constraint violation. An apparatus is also disclosed herein.. ... Cisco Technology Inc

05/10/18 / #20180131610

Scalable handling of bgp route information in vxlan with evpn control plane

A method for programming a mac address table by a first leaf node in a network comprising a plurality of leaf nodes is provided. Each leaf node comprises one or more virtual tunnel end points (“vteps”) and instantiates a plurality of virtual routing and forwarding elements (“vrfs”), with a corresponding bridge domain (“bd”) assigned to each vrf. ... Cisco Technology Inc

05/10/18 / #20180131590

Method and apparatus for tracing paths in service function chains

In one embodiment, a method includes receiving a trace request packet at a service node in a service chain, the trace request packet comprising a service path identifier, a service index, and a service index limit, processing the trace request packet at the service node, comparing the service index to the service index limit, determining that the service index is greater than the service index limit, generating a trace response packet at the service node indicating that the service index is greater than the service index limit, and transmitting the trace response packet. The trace response packet comprises service function information for each of a plurality of service nodes in the service chain. ... Cisco Technology Inc

05/10/18 / #20180131568

Network aware dynamic orchestration method and system for multicast services

Presented herein is an exemplified system and method that facilitate network-aware consolidation, by orchestration, of similar sets of virtualized multicast-traffic receivers and/or sources (e.g., virtual machines) under a common network fabric element (e.g., same leaf switch and/or spine switch in a data center network fabric), e.g., to reduce network switch work load and/or number of network fabric elements involved with transmission of multicast traffic. The orchestration of scattered- and like-sets of multicast-traffic receivers and/or sources under a common network fabric element (e.g., a single and same leaf switch and/or spine switch) facilitates improvements of the operation of orchestration management technologies and virtualization overlay technologies by, e.g., improving network efficiency for multicast packet switching, reducing control plane traffic (e.g., igmp queries), and reducing delay- and packet-transfer errors.. ... Cisco Technology Inc

05/10/18 / #20180131532

Area-specific broadcasting using bit indexed explicit replication

Methods and network devices are disclosed relating to a multi-area communication network employing bit indexed explicit replication (bier). In one embodiment, a method includes receiving, at a node in a communications network, a message comprising a first message bit array. ... Cisco Technology Inc

05/10/18 / #20180131531

Dynamic power management

In one embodiment, a method includes: obtaining a power loss value for a cable that couples a device to a power source, where the power loss value is indicative of an amount of power lost through the cable during power transmission from the power source to the device; and determining, based at least in part on the power loss value for the cable, a power budget value indicative of an amount of power received by the device from the power source.. . ... Cisco Technology Inc

05/10/18 / #20180131182

Power-over-ethernet power method and system

In one embodiment, a method, system, and apparatus including a power source equipment (pse) device configured to provide power-over-ethernet (poe) to a powered device (pd) that is configured to receive a request from the pd requesting a quantity of poe power, the quantity of poe power including an amount of power to be provided by the pse as power for redundancy, receiving a message from the pd, the message including a unique identifier, allocating a requested quantity of poe power, the allocating of the requested quantity of poe power including allocating to provide the requested quantity of poe power from one of a plurality of pses, and providing the requested quantity of poe power to the pd. Related methods, systems, and apparatuses are described.. ... Cisco Technology Inc

05/10/18 / #20180129491

Space-optimized software installation using in-place extractable archive image

In one embodiment, a device in a network stores an archive image to a storage location of the device. The archive image comprises a plurality of compressed files. ... Cisco Technology Inc

05/03/18 / #20180124812

Per-packet, time slotted channel hopping (tsch), meta-timeslot

In one embodiment, a device in a network receives a time-slotted channel hopping (tsch) communication schedule. The tsch communication schedule is divided into a plurality of macrocells, each macrocell comprising a plurality of tsch cells. ... Cisco Technology Inc

05/03/18 / #20180124688

Virtual access point (vap) formation

In one embodiment, a supervisory device in a network receives from a plurality of access points (aps) in the network data regarding a network availability request broadcast by a node seeking to access the network and received by the aps in the plurality. The supervisory device uniquely associates the node with a virtual access point (vap) for the node and forms a vap mapping between the vap for the node and a set of the aps in the plurality selected based on the received data regarding the network availability request. ... Cisco Technology Inc

05/03/18 / #20180124646

Transparent roaming in virtual access point (vap) enabled networks

In one embodiment, a supervisory device in a network forms a virtual access point (vap) for a node in the network. A set of access points (aps) in the network are mapped to the vap as part of a vap mapping and the node treats the aps in the vap mapping as a single ap for purposes of communicating with the network. ... Cisco Technology Inc

05/03/18 / #20180124632

Data traffic management in virtual access point (vap) enabled networks

In one embodiment, a supervisory device in a network forms a virtual access point (vap) for a node in the network whereby a plurality of access points (aps) in the network are mapped to the vap as part of a vap mapping. The node treats the aps in the vap mapping as a single ap for purposes of communicating with the network. ... Cisco Technology Inc

05/03/18 / #20180124553

Presence indicator signal

In one embodiment a method for providing presence information in a smart environment is implemented on a personal computing device associated with a user and includes: broadcasting a presence indicator signal in the smart environment, where the presence indicator signal indicates presence of the user in the smart environment, and the personal computing device is not provided by an operator of the smart environment.. . ... Cisco Technology Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Cisco Technology Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Cisco Technology Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###