-
公开(公告)号:US11832124B2
公开(公告)日:2023-11-28
申请号:US17451564
申请日:2021-10-20
Applicant: Cisco Technology, Inc.
Inventor: Mark Grayson , Santosh Ramrao Patil , Gangadharan Byju Pularikkal , Kedar K. Gaonkar
IPC: H04W28/02 , H04W24/02 , H04L43/0888 , H04L43/0823 , H04L43/16 , H04W24/08 , H04W88/08 , H04W84/04
CPC classification number: H04W28/0268 , H04L43/0823 , H04L43/0888 , H04L43/16 , H04W24/02 , H04W24/08 , H04W84/042 , H04W88/08
Abstract: A method of controlling performance of a wireless device is performed by a node that is in electronic communication with a cellular network. The node includes a processor, a non-transitory memory, and a network interface. The method includes receiving a performance value characterizing a performance of a communication channel between a wireless device and a wireless access point. In some implementations, the wireless device and the cellular network are associated with different radio access technologies (RATs). The method includes determining whether the performance value breaches a performance criterion for the wireless device. The method includes adjusting a first amount of data transmitted to the wireless device from a base station of the cellular network and a second amount of data transmitted to the wireless device from the wireless access point. In some implementations, the combined first and second amounts of data satisfy the performance criterion for the wireless device.
-
公开(公告)号:US11051172B2
公开(公告)日:2021-06-29
申请号:US16539428
申请日:2019-08-13
Applicant: Cisco Technology, Inc.
Inventor: Raghavaiah Avula , Akram Ismail Sheriff , Santosh Ramrao Patil , Gangadharan Byju Pularikkal
IPC: H04W76/14 , H04W12/086 , H04W48/16 , H04W8/18 , H04L29/06 , H04W12/06 , H04W12/40 , H04W12/72 , H04W48/18
Abstract: In one example, a wireless Access Point (AP) is configured to provide network connectivity between a User Equipment (UE) and a private wireless network. The wireless AP obtains, from the private wireless network, an indication that the UE is unregistered with the private wireless network. In response to the indication that the UE is unregistered with the private wireless network, the wireless AP provides, to the private wireless network, an indication to initiate an emergency attach procedure with respect to the UE. In response to the indication to initiate the emergency attach procedure, the wireless AP obtains, from the private wireless network, an indication that the UE is authorized to access the private wireless network. In response to the indication that the UE is authorized to access the private wireless network, the wireless AP provides guest access to the private wireless network on behalf of the UE.
-
公开(公告)号:US10999738B2
公开(公告)日:2021-05-04
申请号:US16259019
申请日:2019-01-28
Applicant: Cisco Technology, Inc.
Inventor: Santosh Ramrao Patil , Matthew Aaron Silverman , Huaiyi Wang , Gangadharan Byju Pularikkal , Akram Ismail Sheriff
Abstract: Techniques for identification and isolation of Internet-of-Things devices in an enterprise network are described. In one embodiment, a method includes detecting a plurality of devices having a first network interface to connect to a wireless wide area network and a second network interface to connect to an enterprise network. The method also includes identifying a first subset of the plurality of devices as Internet-of-Things (IoT) devices based on at least a detected repetition rate on a physical random access channel of a transmission made by a device of the plurality of devices. The method includes assigning the IoT devices to a separate network segment within the enterprise network.
-
公开(公告)号:US20210084658A1
公开(公告)日:2021-03-18
申请号:US16569416
申请日:2019-09-12
Applicant: Cisco Technology, Inc.
Inventor: Akram Sheriff , Santosh Ramrao Patil , Gangadharan Byju Pularikkal , Mark Grayson
Abstract: Systems, methods, and computer-readable media for radio resource management in a Citizens Broadband Radio Service (CBRS) network include one or more CBRS devices (CBSDs) which can obtain a group type associated with the CBSDs and their associated Radio Environment Map (REM) reports of one or more frequency channels of the CBRS network. The group type and the REM reports may be provided to a Self-Organizing Network (SON) manager of the CBRS network, where the SON manager may determine and provide to the CBSDs, one or more of a channel utilization information, transmission power, or mobility load management information for the CBSD, based on the group type and the REM reports.
-
公开(公告)号:US20210051478A1
公开(公告)日:2021-02-18
申请号:US16539428
申请日:2019-08-13
Applicant: Cisco Technology, Inc.
Inventor: Raghavaiah Avula , Akram Ismail Sheriff , Santosh Ramrao Patil , Gangadharan Byju Pularikkal
Abstract: In one example, a wireless Access Point (AP) is configured to provide network connectivity between a User Equipment (UE) and a private wireless network. The wireless AP obtains, from the private wireless network, an indication that the UE is unregistered with the private wireless network. In response to the indication that the UE is unregistered with the private wireless network, the wireless AP provides, to the private wireless network, an indication to initiate an emergency attach procedure with respect to the UE. In response to the indication to initiate the emergency attach procedure, the wireless AP obtains, from the private wireless network, an indication that the UE is authorized to access the private wireless network. In response to the indication that the UE is authorized to access the private wireless network, the wireless AP provides guest access to the private wireless network on behalf of the UE.
-
公开(公告)号:US10924480B2
公开(公告)日:2021-02-16
申请号:US15907297
申请日:2018-02-28
Applicant: Cisco Technology, Inc.
Inventor: Santosh Ramrao Patil , Gangadharan Byju Pularikkal , Sourav Chakraborty , Madhusudan Nanjanagud
IPC: H04L29/06
Abstract: In one embodiment, an IoT server includes: processing circuitry, an I/O module operative to communicate with at least an IoT device and a vendor network server, and an onboarding application and operative to at least: receive an onboarding request from the IoT device via the I/O module, send a confirmation request to the vendor network server via the I/O module, where the confirmation request indicates a request to confirm an identity of the IoT device according to a connection to a network device authenticated by the vendor network server, receive a confirmation response from the vendor network server via the I/O module, where the confirmation response indicates whether the IoT device is connected to the network device, and if the confirmation response is a positive confirmation response that indicates that the IoT device is connected to the network device, onboard the IoT device for participation in an IoT-based system.
-
公开(公告)号:US10743199B1
公开(公告)日:2020-08-11
申请号:US16265036
申请日:2019-02-01
Applicant: Cisco Technology, Inc.
Abstract: Techniques for optimizing performance of narrowband Internet-of-Things (NB-IoT) devices in a wireless wide area network (WWAN) are described. In one embodiment, a method includes providing a NB-IoT base station in an in-band deployment mode to operate within a WWAN. The NB-IoT base station is configured to use a physical resource block of the WWAN for communicating with a plurality of NB-IoT devices. The method includes causing a reduction of a power level for a transmission from an initial power level to a first reduced power level. The method includes obtaining parameters associated with performance and throughput for the WWAN and comparing the parameters to a quality threshold. Based on the comparison of the parameters to the threshold, the method includes determining whether or not to reduce the power level for the physical resource block from the first reduced power level to a second reduced power level.
-
38.
公开(公告)号:US20200186477A1
公开(公告)日:2020-06-11
申请号:US16788652
申请日:2020-02-12
Applicant: Cisco Technology, Inc.
Inventor: Gangadharan Byju Pularikkal , Santosh Ramrao Patil , Mark Grayson , Swaminathan Anantha , Sourav Chakraborty
IPC: H04L12/857 , H04L29/06 , H04L12/927 , H04L12/725
Abstract: Systems, methods, and devices are disclosed for providing a quality of service between nodes. A service provider can receive, from a first node of a customer network to an ingress node of a service provider network, packets bound for a second node on the customer network that is remote from the first node. The packets are mapped to a network segment according to a traffic type based on an identifier associated with the packets that identifies the traffic type of the packets. The packets are sent via their mapped network segment to an egress node with connectivity to the second node of the customer network according to a quality of service associated with the traffic type identified by the identifier.
-
公开(公告)号:US10375100B2
公开(公告)日:2019-08-06
申请号:US15795670
申请日:2017-10-27
Applicant: Cisco Technology, Inc.
Inventor: Mark Grayson , Santosh Ramrao Patil , Gangadharan Byju Pularikkal
Abstract: Various implementations disclosed herein enable identifying anomalies in a network. For example, in various implementations, a method of identifying anomalies in a network is performed by a network node. In various implementations, the network node includes one or more processors, and a non-transitory memory. In various implementations, the method includes generating a characteristic indicator that characterizes a device type based on communications associated with a first device of the device type. In various implementations, the method includes determining, based on communications associated with the first device, a performance indicator that indicates a performance of the first device. In various implementations, the method includes synthesizing an anomaly indicator as a function of the performance indicator in relation to the characteristic indicator.
-
公开(公告)号:US20190036888A1
公开(公告)日:2019-01-31
申请号:US15854181
申请日:2017-12-26
Applicant: Cisco Technology, Inc.
Abstract: In various implementations, a method includes receiving a request to establish an end-to-end encrypted session between a device in an enterprise network and an external entity that is outside the enterprise network. In some implementations, the end-to-end encrypted session allows encrypted packets to be transmitted between the device and the external entity. In various implementations, the method includes determining whether the request satisfies an enterprise security criterion for establishing the end-to-end encryption session. In various implementations, the method includes in response to determining that the request satisfies the enterprise security criterion, triggering the establishment of the end-to-end encrypted session between the device in the enterprise network and the external entity that is outside the enterprise entity.
-
-
-
-
-
-
-
-
-