-
公开(公告)号:US20240381166A1
公开(公告)日:2024-11-14
申请号:US18465380
申请日:2023-09-12
Applicant: Cisco Technology, Inc.
Inventor: Robert Barton , Matt Silverman , Jerome Henry , Indermeet Gandhi , Malcolm Smith
IPC: H04W28/02
Abstract: Devices, systems, methods, and processes are described herein that can reduce network communication overhead by reducing data that is sent. This reduction in data can be achieved by reducing the requests for data related to the buffers of one or more network devices. This buffer status data reduction can be achieved by predicting the current status of the buffers in other network devices. When the buffer predictions are sufficient, the need to request or poll for buffer status reports can be reduced. The buffer predictions can be evaluated through one or more confidence levels. These buffer predictions and confidence levels can be generated by one or more machine learning processes that are configured to operate on one or more network devices. Based on the confidence levels of the predictions, the number of buffer status report polls and of any unsolicited buffer service reports can be reduced.
-
公开(公告)号:US20190020372A1
公开(公告)日:2019-01-17
申请号:US15650359
申请日:2017-07-14
Applicant: Cisco Technology, Inc.
Inventor: Robert Barton , Maik Guenter Seewald , Michael Alan Kowal
Abstract: A methodology includes determining a first delay between a first relay and a first label edge router, a second delay between a second relay and a second label edge router, and a third delay of a label-switched path between the first label edge router and the second label edge router. Based on the first, second, and third delays, it is determined whether an end-to-end latency between the first relay and the second relay exceeds an end-to-end latency threshold.
-
公开(公告)号:US12192770B2
公开(公告)日:2025-01-07
申请号:US17731689
申请日:2022-04-28
Applicant: Cisco Technology, Inc.
Inventor: Domenico Ficara , Roberto Muccifora , Amine Choukir , Robert Barton , Jerome Henry , Arun Khanna
IPC: H04W12/122 , H04W12/106 , H04W12/73
Abstract: A method is provided that is performed in a wireless network to detect a rogue wireless device. The method comprises detecting a suspect wireless device in the wireless network based on messages transmitted by the suspect wireless device using a first Media Access Control (MAC) address that is also used by a valid wireless device in the wireless network. When a suspect wireless device is detected, the method next includes sending to the valid wireless device in the wireless network a request configured to cause the valid wireless device to change its MAC address. After the valid wireless device has changed its MAC address, the method involves observing messages transmitted by the suspect wireless device in the wireless network. The method then includes determining that the suspect wireless device is a rogue device when the suspect wireless device continues to transmit messages using the first MAC address.
-
公开(公告)号:US12034695B2
公开(公告)日:2024-07-09
申请号:US17673100
申请日:2022-02-16
Applicant: Cisco Technology, Inc.
Inventor: Thomas Vegas , Anirban Karmakar , Robert Barton , Jerome Henry
IPC: H04L61/2596 , H04W8/26 , H04L101/622 , H04W80/02
CPC classification number: H04L61/2596 , H04W8/26 , H04L2101/622 , H04W80/02
Abstract: A first access point of a wireless network minimizes Media Access Control (MAC) address collisions in the wireless network. The first access point receives an association request from a first wireless device. The association request identifies a first MAC address of the first wireless device. The first access point determines whether a second wireless device is associated with the wireless network using the first MAC address. Responsive to a determination that the second wireless device is associated with a second access point of the wireless network, the first access point obtains a virtual MAC address for the first wireless device. The first access point translates between the first MAC address and the virtual MAC address for network traffic of the first wireless device.
-
公开(公告)号:US20230354034A1
公开(公告)日:2023-11-02
申请号:US17731689
申请日:2022-04-28
Applicant: Cisco Technology, Inc.
Inventor: Domenico Ficara , Roberto Muccifora , Amine Choukir , Robert Barton , Jerome Henry , Arun Khanna
IPC: H04W12/122 , H04W12/73 , H04W12/106
CPC classification number: H04W12/122 , H04W12/73 , H04W12/106
Abstract: A method is provided that is performed in a wireless network to detect a rogue wireless device. The method comprises detecting a suspect wireless device in the wireless network based on messages transmitted by the suspect wireless device using a first Media Access Control (MAC) address that is also used by a valid wireless device in the wireless network. When a suspect wireless device is detected, the method next includes sending to the valid wireless device in the wireless network a request configured to cause the valid wireless device to change its MAC address. After the valid wireless device has changed its MAC address, the method involves observing messages transmitted by the suspect wireless device in the wireless network. The method then includes determining that the suspect wireless device is a rogue device when the suspect wireless device continues to transmit messages using the first MAC address.
-
16.
公开(公告)号:US20230262798A1
公开(公告)日:2023-08-17
申请号:US17673334
申请日:2022-02-16
Applicant: Cisco Technology, Inc.
Inventor: Amine Choukir , Robert Barton , Anirban Karmakar , Domenico Ficara , Vincent Cuissard , Jerome Henry
Abstract: A user device connected to a wireless network maintains session persistence through a MAC address change of a user device. The user device establishes a multi-path communication session including a first subflow associated with a first MAC address for the user device. When the user device changes from the first MAC address to a second MAC address. the user device establishes a second subflow of the multi-path communication session. The second subflow is associated with the second MAC address. After establishing the second subflow associated with the second MAC address, the user device ends the first subflow associated with the first MAC address.
-
公开(公告)号:US20190356600A1
公开(公告)日:2019-11-21
申请号:US15982935
申请日:2018-05-17
Applicant: Cisco Technology, Inc.
Inventor: Robert Barton , Maik Guenter Seewald , Michael Alan Kowal , Muthurajah Sivabalan , Jerome Henry
IPC: H04L12/841 , H04L12/24 , H04B7/14 , H04L12/26
Abstract: A method for teleprotection over a segment routed network comprises receiving network requirements for communication between a first teleprotection relay and a second teleprotection relay, the first teleprotection relay associated with a first router of the segment routed network, and the second teleprotection relay associated with a second router of the segment routed network, identifying a primary path from the first router to the second router satisfying the network requirements, determining a congruent reverse of the primary path satisfies the network requirements, sending, to the first router, the primary path, the first router routing traffic from the first teleprotection relay to the second teleprotection relay using the primary path, and sending, to the second router, the congruent reverse of the primary path, the second router routing traffic from the second teleprotection relay to the first teleprotection relay using the congruent reverse of the primary path.
-
公开(公告)号:US10176379B1
公开(公告)日:2019-01-08
申请号:US15995846
申请日:2018-06-01
Applicant: Cisco Technology, Inc.
Inventor: Robert Barton , Jerome Henry , Joseph Bassaly , Vanessa Sulikowski
Abstract: In one example embodiment, an integration system obtains, based on data from a wireless location system, location data of a wireless device in a spatial area. The integration system determines location data of a person in the spatial area based on at least one image of the person captured by a camera. Based on the location data of the wireless device and the location data of the person, the integration system calculates a proximity parameter representing a spatial relationship between the wireless device and the person. Based on the proximity parameter, the integration system computes a probability of association between the wireless device and the person and determines, based on the probability of association, whether the person is a user of the wireless device.
-
公开(公告)号:US20250016568A1
公开(公告)日:2025-01-09
申请号:US18892955
申请日:2024-09-23
Applicant: Cisco Technology, Inc.
Inventor: Domenico Ficara , Roberto Muccifora , Amine Choukir , Robert Barton , Jerome Henry , Arun Khanna
IPC: H04W12/122 , H04W12/106 , H04W12/73
Abstract: A method is provided that is performed in a wireless network to detect a rogue wireless device. The method comprises detecting a suspect wireless device in the wireless network based on messages transmitted by the suspect wireless device using a first Media Access Control (MAC) address that is also used by a valid wireless device in the wireless network. When a suspect wireless device is detected, the method next includes sending to the valid wireless device in the wireless network a request configured to cause the valid wireless device to change its MAC address. After the valid wireless device has changed its MAC address, the method involves observing messages transmitted by the suspect wireless device in the wireless network. The method then includes determining that the suspect wireless device is a rogue device when the suspect wireless device continues to transmit messages using the first MAC address.
-
20.
公开(公告)号:US20240422846A1
公开(公告)日:2024-12-19
申请号:US18817885
申请日:2024-08-28
Applicant: Cisco Technology, Inc.
Inventor: Amine Choukir , Robert Barton , Anirban Karmakar , Domenico Ficara , Vincent Cuissard , Jerome Henry
Abstract: A user device connected to a wireless network maintains session persistence through a MAC address change of a user device. The user device establishes a multi-path communication session including a first subflow associated with a first MAC address for the user device. When the user device changes from the first MAC address to a second MAC address. the user device establishes a second subflow of the multi-path communication session. The second subflow is associated with the second MAC address. After establishing the second subflow associated with the second MAC address, the user device ends the first subflow associated with the first MAC address.
-
-
-
-
-
-
-
-
-