-
公开(公告)号:US11758436B2
公开(公告)日:2023-09-12
申请号:US17839875
申请日:2022-06-14
Applicant: Cisco Technology, Inc.
Inventor: Bincy Baburaj Narath , Padmaraj Ramanoudjam , Arun Gunasekaran , Raghavendra Suryanarayanarao Vidyashankar , Om Prakash Suthar
Abstract: When a packet data session is established for a user equipment (UE), a comparative assessment of load information factors from different sets of load information factors associated with a plurality of user plane function (UPF) instances may be performed. Each set of load information factors of a UPF instance may include predicted load information factors indicative of a predicted load at the UPF instance. A UPF instance may be selected for the packet data session of the UE based on the comparative assessment. The comparative assessment may additionally consider a predicted load contribution of the packet data session to be established for the UE. A data analytics function may utilize a model (e.g. a multiple linear regression model) to calculate predicted load contribution factors, where the model is derived based on historical usage data from previous sessions of one or more UEs, for example, data from charging data records (CDRs).
-
公开(公告)号:US11729608B2
公开(公告)日:2023-08-15
申请号:US17306330
申请日:2021-05-03
Applicant: Cisco Technology, Inc.
Inventor: Aeneas Sean Dodd-Noble , Raghavendra Vidyashankar Suryanarayanarao , Ryo Watanabe , Vivek Agarwal , Rajiv Asati , Om Prakash Suthar , Santanu Dasgupta
CPC classification number: H04W8/26 , H04L61/4511 , H04W4/025 , H04W8/08 , H04W76/12 , H04W76/10 , H04W84/042
Abstract: A solution for selecting an optimal user Plane entity (with Control and User Plane Separation (CUPS)) per UE during seamless roaming. In one embodiment, a method is provide that is performed by a control plane entity in a mobile core network that supports inter public land mobile network (PLMN) roaming among two or more PLMNs. The method includes obtaining a create session request from an entity in a second PLMN to which a user equipment has roamed from a first PLMN; selecting a particular user plane entity among a plurality of user plane entities based on one or more user equipment related parameters; and establishing a session with the particular user plane entity to serve user plane traffic in the mobile core network for the user equipment.
-
公开(公告)号:US11714672B2
公开(公告)日:2023-08-01
申请号:US17521381
申请日:2021-11-08
Applicant: Cisco Technology, Inc.
Inventor: Santanu Dasgupta , Chandragupta Ganguly , Ian Wells , Rajiv Asati , Om Prakash Suthar , Vinod Pandarinathan , Ajay Kalambur , Yichen Wang , John Wei-I Wu
CPC classification number: G06F9/45558 , H04L41/04 , H04L41/046 , H04L41/40 , H04W28/00 , H04W76/10 , G06F2009/4557 , G06F2009/45591 , G06F2009/45595 , H04L67/10
Abstract: A system is provided that includes one management cluster to manage network function virtualization infrastructure (NFVI) resources lifecycle in more than one edge POD locations, where resources include hardware and/or software, and where software resources lifecycle includes software development, upgrades, downgrades, logging, monitoring etc. Methods are provided for decoupling storage from compute and network functions in each virtual machine (VM)-based NFVI deployment location and moving it to a centralized location. Centralized storage could simultaneously interact with more than one edge PODs, and the security is built-in with periodic key rotation. Methods are provided for increasing NFVI system viability by dedicating (fencing) CPU core pairs for specific controller operations and workload operations, and sharing the CPU cores for specific tasks.
-
公开(公告)号:US11706617B2
公开(公告)日:2023-07-18
申请号:US16546826
申请日:2019-08-21
Applicant: Cisco Technology, Inc.
Inventor: Om Prakash Suthar , Rajiv Asati , Santanu Dasgupta
IPC: G06F16/182 , H04L9/40 , H04W12/041 , H04W12/06 , H04W60/00 , H04W76/25
CPC classification number: H04W12/06 , G06F16/1824 , H04L63/101 , H04W12/041 , H04W60/00 , H04W76/25
Abstract: Blockchain technology is used to provide distributed authentication, entitlements and trust among different virtual Radio Access Network (vRAN) elements. An enterprise blockchain with interfaces enables multi-vendor vRAN deployment across multiple service providers. In another embodiment, a method is provided for authenticating entities in a virtualized radio access network to ensure various entitles are in fact entitled to participate in various radio access network operations.
-
公开(公告)号:US11632312B2
公开(公告)日:2023-04-18
申请号:US17522390
申请日:2021-11-09
Applicant: Cisco Technology, Inc.
Inventor: Om Prakash Suthar , Arghya Mukherjee , Santanu Dasgupta
IPC: H04L41/5054 , H04L41/5041 , H04W88/08 , G06F9/455 , H04L41/0893
Abstract: In one example, a Network Functions Virtualization Orchestrator (NFVO) obtains a radio service descriptor defining communication parameters for a radio in a virtual Radio Access Network (vRAN). Based on the radio service descriptor, the NFVO determines whether a virtual Distributed Unit (vDU) that is configured in accordance with the communication parameters and a virtual Centralized Unit (vCU) that is configured in accordance with the communication parameters are already instantiated in the vRAN. If it is determined that the vDU or the vCU is not already instantiated, the NFVO automatically instantiates the vDU or the vCU in the vRAN.
-
公开(公告)号:US11469912B2
公开(公告)日:2022-10-11
申请号:US17062833
申请日:2020-10-05
Applicant: Cisco Technology, Inc.
Inventor: Arun Gunasekaran , Raghavendra Suryanarayanarao Vidyashankar , Om Prakash Suthar , Rajaneesh Sudhakar Shetty , Vivek Agarwal
Abstract: Techniques are provided to communicate the serving Radio Access Network (RAN) element information to the packet core network to enable operators to provide differential treatment for fifth generation (5G) subscribers. The techniques presented herein fill these gaps and help drive faster adoption of Dual Connectivity New Radio (DCNR) subscribers by service operator to offer customized policy and quota management to address different business requirements in the 5G Non-Stand Alone (NSA) architecture.
-
公开(公告)号:US11449748B2
公开(公告)日:2022-09-20
申请号:US16172724
申请日:2018-10-26
Applicant: Cisco Technology, Inc.
Inventor: Om Prakash Suthar , Anwin P. Kallumpurath , Rajiv Asati
Abstract: Techniques for adaptive thresholding are provided. First and second data points are received. A plurality of data points are identified, where the plurality of data points corresponds to timestamps associated with the first and second data points. At least one cluster is generated for the plurality of data points based on a predefined cluster radius. Upon determining that the first data point is outside of the cluster, the first data point is labeled as anomalous. A predicted value is generated for the second data point, based on processing data points in the cluster using a machine learning model, and a deviation between the predicted value and an actual value for the second data point is computed. Upon determining that the deviation exceeds a threshold, the second data point is labeled as anomalous. Finally, computing resources are reallocated, based on at least one of the anomalous data points.
-
公开(公告)号:US11356513B2
公开(公告)日:2022-06-07
申请号:US17024465
申请日:2020-09-17
Applicant: Cisco Technology, Inc.
Inventor: Aeneas Sean Dodd-Noble , Om Prakash Suthar , Ianik Semco
Abstract: A network function (NF) entity in a communication network receives User Plane Function (UPF) registration information for a plurality of UPFs, the registration information including a respective network attribute for each UPF. The NF entity associates each UPF with a corresponding network based on the respective network attribute, and map one or more User Equipment (UE) to the corresponding network based on a security policy to create a UE-to-network table. The NF further receives a request to establish a session for a subsequent UE, the request including a subsequent UE identifier, and determine an access permission for the subsequent UE to access the corresponding network based on the subsequent UE identifier and the UE-to-network table. The NF selects one UPF from the plurality of UPF to service the session for the subsequent UE based on the access permission, and an association between the one UPF and the corresponding network.
-
49.
公开(公告)号:US20220116854A1
公开(公告)日:2022-04-14
申请号:US17068031
申请日:2020-10-12
Applicant: Cisco Technology, Inc.
Abstract: Techniques are provided to inform a mobile packet core of the access network/radio access technology (AN/RAT) change with the use of in-band signaling along the user plane and hence reduce signaling between radio access network and mobile packet core network. A new extension header content is defined to signal the AN/RAT change information, Cell Group changes and acknowledging the same. Further still, a method is provided to handle AN change notification for split bearer scenarios by introducing a split bearer flag for the mobile packet core to be notified of the predominant access type serving the subscriber data session in 5G Non-Stand Alone (NSA) Option-3, Option-3A and Option-3X, so that static or dynamic configurations can be applied by the mobile core network accordingly.
-
公开(公告)号:US20210271506A1
公开(公告)日:2021-09-02
申请号:US17003563
申请日:2020-08-26
Applicant: Cisco Technology, Inc.
Inventor: Chandragupta Ganguly , Om Prakash Suthar , Alec Hothan , Vivek Agarwal , John Wei-I Wu , Ajay Kalambur , Devendra Kumar Vishwakarma
Abstract: A first virtual machine executing on a centralized management node provides a first image file to a first computing entity arranged within a first point of delivery. The first image file includes a first boot configuration file or a first ramdisk file. A second virtual machine provides a second image file to a second computing entity arranged within a second point of delivery different from the first point of delivery. The second image file includes a second boot configuration file or a second ramdisk file. The first virtual machine provides a third image file to the first computing entity. The third image file comprises a first operating system installation file. The second virtual machine provides a fourth image file to the second computing entity. The fourth image file comprises a second operating system installation file.
-
-
-
-
-
-
-
-
-