-
11.
公开(公告)号:US10299128B1
公开(公告)日:2019-05-21
申请号:US16171190
申请日:2018-10-25
Applicant: Cisco Technology, Inc.
Inventor: Om Prakash Suthar , Ammar Rayes , Michael David Geller , Ian McDowell Campbell , Aeneas Sean Dodd-Noble
Abstract: A network function (NF) entity in a communication network receives authentication data associated with a User Equipment (UE), determines the UE supports a blockchain registration procedure based on the authentication data, exchanges authentication messages with a Blockchain Roaming Broker (BRB) entity over a blockchain network interface, receives a blockchain authentication confirmation from the BRB entity, and registers the UE with the core network based on the blockchain authentication confirmation.
-
公开(公告)号:US09854408B2
公开(公告)日:2017-12-26
申请号:US15046691
申请日:2016-02-18
Applicant: Cisco Technology, Inc.
Inventor: Om Prakash Suthar , Baljit Singh
IPC: H04B17/00 , H04W4/04 , H04W24/02 , H04B7/185 , H04W24/08 , H04W4/02 , H04W28/02 , H04L12/26 , H04W72/04 , H04W24/10 , H04W84/18
CPC classification number: H04W4/40 , H04B7/18506 , H04L43/16 , H04W4/02 , H04W4/04 , H04W24/02 , H04W24/08 , H04W24/10 , H04W28/0289 , H04W72/048 , H04W84/18
Abstract: Embodiments herein describe a system that includes an autonomous vehicle (referred to herein as a drone) which is controlled by a self-organizing network (SON) to expand the capabilities of a cellular network in real time. In one embodiment, the SON monitors the cellular network and identifies congestion or capacity issues where the cell towers covering the geographic region may be unable to satisfy the large number of requests for data by the users in the region. Once a congestion or capacity issue is detected, the SON determines whether dispatching a drone access point (AP) may improve or resolve the issue. In one example, the drone AP is an autonomous vehicle that includes a radio that permits the drone to serve as a mobile cell site for the cellular network.
-
公开(公告)号:US11604991B2
公开(公告)日:2023-03-14
申请号:US17810485
申请日:2022-07-01
Applicant: Cisco Technology, Inc.
Inventor: Om Prakash Suthar , Anwin P. Kallumpurath , Rajiv Asati
Abstract: Techniques for adaptive thresholding are provided. A first data point in a data stream is received, and a first plurality of data points from the data stream is identified, where the first plurality of data points corresponds to a timestamp associated with the first data point. At least a first cluster is generated for the first plurality of data points, and a predicted value for the first data point is generated based at least in part on data points in the first cluster. A deviation is computed between the predicted value for the first data point and an actual value for the first data point. Upon determining that the deviation exceeds a first predefined threshold, the first data point is labeled as anomalous, and reallocation of computing resources is facilitated based on labeling the first data point as anomalous.
-
公开(公告)号:US20220263906A1
公开(公告)日:2022-08-18
申请号:US17738917
申请日:2022-05-06
Applicant: Cisco Technology, Inc.
Inventor: Aeneas Sean Dodd-Noble , Om Prakash Suthar , Ianik Semco
Abstract: A network function (NF) entity in a communication network receives User Plane Function (UPF) registration information for a plurality of UPFs, the registration information including a respective network attribute for each UPF. The NF entity associates each UPF with a corresponding network based on the respective network attribute, and map one or more User Equipment (UE) to the corresponding network based on a security policy to create a UE-to-network table. The NF further receives a request to establish a session for a subsequent UE, the request including a subsequent UE identifier, and determine an access permission for the subsequent UE to access the corresponding network based on the subsequent UE identifier and the UE-to-network table. The NF selects one UPF from the plurality of UPF to service the session for the subsequent UE based on the access permission, and an association between the one UPF and the corresponding network.
-
公开(公告)号:US20220222102A1
公开(公告)日:2022-07-14
申请号:US17521381
申请日:2021-11-08
Applicant: Cisco Technology, Inc.
Inventor: Santanu Dasgupta , Chandragupta Ganguly , Ian Wells , Rajiv Asati , Om Prakash Suthar , Vinod Pandarinathan , Ajay Kalambur , Yichen Wang , John Wei-I Wu
IPC: G06F9/455 , H04W76/10 , H04L41/046 , H04L41/04 , H04W28/00
Abstract: A system is provided that includes one management cluster to manage network function virtualization infrastructure (NFVI) resources lifecycle in more than one edge POD locations, where resources include hardware and/or software, and where software resources lifecycle includes software development, upgrades, downgrades, logging, monitoring etc. Methods are provided for decoupling storage from compute and network functions in each virtual machine (VM)-based NFVI deployment location and moving it to a centralized location. Centralized storage could simultaneously interact with more than one edge PODs, and the security is built-in with periodic key rotation. Methods are provided for increasing NFVI system viability by dedicating (fencing) CPU core pairs for specific controller operations and workload operations, and sharing the CPU cores for specific tasks.
-
16.
公开(公告)号:US11368353B2
公开(公告)日:2022-06-21
申请号:US16172754
申请日:2018-10-27
Applicant: Cisco Technology, Inc.
Inventor: Anil Bhikuayya Jangam , Om Prakash Suthar , Rajiv Asati
IPC: G06F16/00 , H04L41/02 , H04L41/0893 , G06F16/28 , G06F16/2455
Abstract: Techniques for policy management and enforcement using semantic data modeling are provided. A first declarative policy is received at a network node from a controller. A first semantic data query protocol (SDQP) transaction is generated by retrieving a first semantic data model associated with the network node, where the first semantic data model describes a configuration domain of the network node, and parsing the first declarative policy based on the first semantic data model to generate the first SDQP transaction. The first declarative policy is then implemented by executing the first SDQP transaction against a semantic database.
-
公开(公告)号:US11258656B2
公开(公告)日:2022-02-22
申请号:US16278787
申请日:2019-02-19
Applicant: Cisco Technology, Inc.
Inventor: Raghavendra Suryanarayanarao , Om Prakash Suthar , Aeneas Sean Dodd-Noble , Vivek Agarwal , Rajiv Asati , Carlos M. Pignataro
IPC: H04L12/24 , H04W76/10 , H04L12/803 , H04W72/10 , H04W88/08 , H04W88/16 , H04L41/0668 , H04L47/125 , H04L41/0893
Abstract: Techniques are presented in which a new information element signaling priority of a management entity is included in a setup (e.g., S1-Setup) response or configuration update message sent by a management entity to a base station entity. The base station entity interprets this priority information along with the relative capacity information in an appropriate way to load-distribute the traffic/calls to highly preferable management entity instances (at a local site) when they are available, and switchover/failover to lower preference management entity instances (at a remote site) when there is a local site outage/failure or insufficient capacity in a geo-resilient pooled network.
-
公开(公告)号:US11212199B2
公开(公告)日:2021-12-28
申请号:US17005439
申请日:2020-08-28
Applicant: Cisco Technology, Inc.
Inventor: Om Prakash Suthar , Arghya Mukherjee , Santanu Dasgupta
Abstract: In one example, a Network Functions Virtualization Orchestrator (NFVO) obtains a radio service descriptor defining communication parameters for a radio in a virtual Radio Access Network (vRAN). Based on the radio service descriptor, the NFVO determines whether a virtual Distributed Unit (vDU) that is configured in accordance with the communication parameters and a virtual Centralized Unit (vCU) that is configured in accordance with the communication parameters are already instantiated in the vRAN. If it is determined that the vDU or the vCU is not already instantiated, the NFVO automatically instantiates the vDU or the vCU in the vRAN.
-
公开(公告)号:US11122491B2
公开(公告)日:2021-09-14
申请号:US16561634
申请日:2019-09-05
Applicant: Cisco Technology, Inc.
Inventor: Carlos M. Pignataro , Om Prakash Suthar , Nagendra Kumar Nainar , Rajiv Asati
IPC: H04W40/12 , H04L12/26 , H04L12/721 , H04L12/707 , H04L12/841 , H04W24/08 , H04W40/28 , H04L12/833 , H04L12/801 , H04L12/803 , H04W40/24
Abstract: Techniques are provided that leverage inband metadata techniques for use in a mobile core network in order to create relevant third generation 3rd Generation Partnership Project (3GPP) control plane interfaces between virtual control plane and virtual user plane elements that can be used to instruct the virtual entities to perform various functions, collect telemetry and other data from the virtual entities and signal maintenance messages between control plane and user plane entities. One control plane interface can be used to perform holistic performance analysis functionalities and identify the better performing path and accordingly use primary path and warm paths for control plane exchanges.
-
公开(公告)号:US11108636B2
公开(公告)日:2021-08-31
申请号:US16661958
申请日:2019-10-23
Applicant: Cisco Technology, Inc.
Inventor: Raghavendra Suryanarayana Rao Vidyashankar , Arun Gunasekaran , Padmaraj Ramanoudjam , Om Prakash Suthar
Abstract: In one embodiment, a method includes determining a first configuration information for configuring a user plane device of the first network slice associated with the control plane device, generating a first configuration identifier based on the first configuration information, sending, to the user plane device of the first network slice, the first configuration identifier and the first configuration information, receiving, from the user plane device of the first network slice, a second configuration identifier, wherein the second configuration identifier is generated by the user plane device of the first network slice based on the first configuration information received from the control plane device, and verifying, by comparing the first configuration identifier and the second configuration identifier, that the user plane device of the first network slice is configured using the first configuration information.
-
-
-
-
-
-
-
-
-