-
91.
公开(公告)号:US11658912B2
公开(公告)日:2023-05-23
申请号:US17324910
申请日:2021-05-19
Applicant: Cisco Technology, Inc.
Inventor: Gangadharan Byju Pularikkal , Santosh Ramrao Patil , Mark Grayson , Swaminathan Anantha , Sourav Chakraborty
IPC: H04L69/22 , H04L43/0852 , H04L43/0888 , H04L43/0894 , H04L47/2491 , H04L45/302 , H04L47/80
CPC classification number: H04L47/2491 , H04L45/306 , H04L47/805 , H04L69/22 , H04L43/0852 , H04L43/0888 , H04L43/0894
Abstract: Systems, methods, and devices are disclosed for providing a quality of service between nodes. A service provider can receive, from a first node of a customer network to an ingress node of a service provider network, packets bound for a second node on the customer network that is remote from the first node. The packets are mapped to a network segment according to a traffic type based on an identifier associated with the packets that identifies the traffic type of the packets. The packets are sent via their mapped network segment to an egress node with connectivity to the second node of the customer network according to a quality of service associated with the traffic type identified by the identifier.
-
公开(公告)号:US20230047867A1
公开(公告)日:2023-02-16
申请号:US17399286
申请日:2021-08-11
Applicant: Cisco Technology, Inc.
Inventor: Srinath Gundavelli , Indermeet Singh Gandhi , Mark Grayson
Abstract: Presented herein are techniques to facilitate wireless wide area (WWA) virtualized Radio Access Network (vRAN) (e.g., 5G) to wireless local area (WLA) RAN (e.g., Wi-Fi) steering or WLA RAN to WWA vRAN steering for one or more UE. In one example, a method may include obtaining first performance metrics associated with links of a WWA vRAN (e.g., fronthaul, midhaul, and backhaul links); obtaining second performance metrics associated with links WLA RAN (e.g., backhaul links); and in response to determining that one of the WWA vRAN is experiencing degraded performance based on the first performance metrics or the WLA RAN the second performance metrics, activating a steering event that causes, at least in part, an indication to be communicated to a UE to cause the UE to connect to the WWA vRAN or the WLA RAN that is not experiencing degraded performance.
-
公开(公告)号:US11582820B2
公开(公告)日:2023-02-14
申请号:US17072215
申请日:2020-10-16
Applicant: Cisco Technology, Inc.
Inventor: Srinath Gundavelli , Indermeet Singh Gandhi , Mark Grayson , Louis Gwyn Samuel , Oliver James Bull
IPC: H04W76/15 , H04L47/22 , H04L47/20 , H04L61/5014 , H04W84/12
Abstract: Presented herein are techniques to facilitate extending a multiple access Protocol Data Unit (PDU) session and Access Traffic Steering, Switching, and Splitting Low-Layer (ATSSS-LL) policies to an enterprise network. In one example, a method may include obtaining a request for an ATSSS-LL policy for a user equipment (UE) for establishing a multiple access protocol data unit session for the UE via a wireless wide area access network for an enterprise network; and providing to the UE one or more ATSSS-LL rules for the ATSSS-LL policy, an Internet Protocol (IP) address for the multiple access protocol data unit session for the UE, and an identifier for the multiple access protocol data unit session for the UE in which the IP address is utilized for a wireless local area access network connection for the UE established via a wireless local area access network of the enterprise network.
-
94.
公开(公告)号:US20230021642A1
公开(公告)日:2023-01-26
申请号:US17954717
申请日:2022-09-28
Applicant: Cisco Technology, Inc.
Inventor: Mark Grayson , Timothy Peter Stammers , Desmond Joseph O'Connor , Bart A. Brinckman
IPC: H04W8/12
Abstract: Presented herein are techniques associated with replicating an OpenRoaming™ policy federation in a Third Generation Partnership Project (3GPP) network environment. For example, techniques herein provide a roaming policy federation architecture for a 3GPP network environment. In one example a method is provided that may include encoding at least one multi-bit roaming policy for an identity provider and a plurality of bit-wise combinatorial permutations of the at least one multi-bit roaming policy within each of a plurality of multi-bit 3GPP broadcast identifiers, wherein the at least one multi-bit roaming policy includes bit-wise roaming policy information for the identity provider and configuring the multi-bit 3GPP broadcast identifiers for a mobile device associated with the identity provider, wherein the multi-bit 3GPP broadcast identifiers indicate that the mobile device is to connect to a visited radio access network associated with a local Internet Protocol (IP) access service or a home routed access service.
-
95.
公开(公告)号:US20230021194A1
公开(公告)日:2023-01-19
申请号:US17532495
申请日:2021-11-22
Applicant: Cisco Technology, Inc.
Inventor: Mark Grayson , Humberto Jose La Roche
Abstract: System, methods, and computer-readable media for a Neutral Host (NH) operation of a 5G radio, whereby a NH operator receives feedback from hosts and determines to partition Physical Resource Block (PRB) resources. Thus, a NH system is provided that enables a third-party to independently operate other channels, whereby individual physical random access channels (PRACH) are operated by independent hosts. The NH system is able to indicate partitioned resources to individual hosts, including PRACH definition and mutually exclusive set of PRBs partitioned between tenants. The hosts operating in the NH system may be operable to implement their own independent schedulers, incorporating host specific logic, that can be configured with the partitioned resources but which may further operate independently of each other.
-
公开(公告)号:US20220394599A1
公开(公告)日:2022-12-08
申请号:US17745432
申请日:2022-05-16
Applicant: Cisco Technology, Inc.
Inventor: Srinath Gundavelli , Indermeet Singh Gandhi , Mark Grayson
Abstract: Dynamic roaming partner prioritization based on service quality feedback may be provided. First, a server associated with an enterprise may receive performance data and location data for each of a plurality of service provider networks from a plurality of end use devices associated with the enterprise. Next, the server may assign a ranking to a plurality of service providers by location based upon information. The information may comprise the received performance data and the location data corresponding to each of the plurality of service provider networks. The server may then push the ranking to a first end use device.
-
公开(公告)号:US11523305B2
公开(公告)日:2022-12-06
申请号:US16791494
申请日:2020-02-14
Applicant: Cisco Technology, Inc.
Inventor: Mark Grayson , Louis Gwyn Samuel
Abstract: Techniques are described to provide traffic steering and policy combining in a mobile network. In one example, a method includes combining, by a policy function of a network, a user equipment (UE) access policy comprising UE access rules obtained from a UE with a network-based access policy associated with the network to generate a combined access policy, the combined access policy comprising combined access rules; communicating the combined access rules to the UE via a message, wherein the message comprises an indication that indicates that the UE is not allowed to override the combined access rules with the UE access rules; and communicating the combined access rules to a user plane function handling traffic for the UE.
-
公开(公告)号:US20220272594A1
公开(公告)日:2022-08-25
申请号:US17181715
申请日:2021-02-22
Applicant: Cisco Technology, Inc.
Inventor: Fred Jay Anderson , Indermeet Singh Gandhi , Mark Grayson , Shailender Potharaju
Abstract: Techniques presented herein may provide Distributed Unit (DU) failover techniques for a virtualized Radio Access Network (vRAN) architecture. In one example, a method may include maintaining, by a management node for a vRAN, service information for a plurality of distributed unit components for the vRAN in which the service information identifies, at least in part, service characteristics and failover rules for the vRAN. The method may further include determining a failure of a particular DU component of the plurality of DU components; and reassigning one or more particular RUs currently assigned to the particular DU component to one or more other DU components based on the service characteristics maintained in the service information and particular failover rules identified in the service information that are associated with each of the one or more particular RUs that are re-assigned.
-
公开(公告)号:US20220248302A1
公开(公告)日:2022-08-04
申请号:US17720484
申请日:2022-04-14
Applicant: Cisco Technology, Inc.
Inventor: Mark Grayson , Jerome Henry , Bart A. Brinckman , Matthew Stephen MacPherson
Abstract: Presented herein are techniques to facilitate wireless authorization based on in-line assurance and tariffing information. In one example, a method may include obtaining, by a home network, a request to authorize access of a roaming subscriber for a visited network; determining whether the request includes visited network charging information and visited network metric information; based on determining that the request includes the visited network charging information and the visited network metric information, determining whether one or more visited network metrics satisfy one or more threshold metrics for the roaming subscriber; and based on determining that the one or more visited network metrics satisfy the one or more threshold metrics for the roaming subscriber, authorizing access of the roaming subscriber for the visited network.
-
公开(公告)号:US20220131853A1
公开(公告)日:2022-04-28
申请号:US17571297
申请日:2022-01-07
Applicant: Cisco Technology, Inc.
Inventor: Malcolm Muir Smith , Bart Brinckman , Mark Grayson , Jerome Henry , Matthew Stephen MacPherson
Abstract: The disclosed technology relates to a process of evaluating any number of different identity providers (IDPs) and their respective set of credentials that are used to authenticate corresponding users to assist with the onboarding of the different IDPs in connection with Wi-Fi identity federations. In particular, the process allows a person's electronic identity and attributes (stored across one or more IDPs) to be determined once using a standard. Once trust has been established for the user, that trust can then be utilized across a number of different systems (e.g., Single-sign on). The same trust determination can be used without the need for the authenticity of the user identity to be re-evaluated with each new access request.
-
-
-
-
-
-
-
-
-