-
公开(公告)号:US11496597B2
公开(公告)日:2022-11-08
申请号:US17339298
申请日:2021-06-04
Applicant: Cisco Technology, Inc.
Inventor: Rajiv Asati , Humberto Jose La Roche , Eric C. Friedrich
IPC: H04L67/568 , H04L67/02 , H04L61/4511 , H04L65/61 , H04L65/75
Abstract: A method is performed at a mobile core, including assigning a first cache servicing a client device in response to a first request for a media content item based at least in part on a first IP address of the client device associated with a first edge location. The method further includes providing a first portion of the media content item from the first cache. The method additionally includes triggering a plurality of caches at edge locations proximate to the first edge location to retrieve a second portion of the media content item. The method also includes receiving a continuation request from the client device with a second IP address associated with a second edge location. The method further includes selecting a second cache from the plurality of caches based at least in part on the second IP address and continuing providing the media content item from the second cache.
-
52.
公开(公告)号:US11336567B2
公开(公告)日:2022-05-17
申请号:US16853331
申请日:2020-04-20
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Carlos M. Pignataro , Alejandro Eguiarte , Rajiv Asati
IPC: H04L45/00 , H04L12/46 , H04L45/745 , H04L45/02
Abstract: Techniques for defining a service flow definition among container pods that provide services in a network. The techniques may include an orchestrator of a computer network platform of the network determining which container pods need to communicate with which container pods. The service flow definition thus indicates needed paths between the container pods. In configurations, a cluster topology may be determined where the cluster topology indicates corresponding nodes of the network in which each container pod is located, as well as end points of the network with which the corresponding nodes communicate. Based at least in part on the service flow definition and the cluster topology, corresponding route distribution policies may be determined for the end points. The corresponding route distribution policies may be applied to the end points.
-
公开(公告)号:US11245751B1
公开(公告)日:2022-02-08
申请号:US16580082
申请日:2019-09-24
Applicant: Cisco Technology, Inc.
Inventor: Rajiv Asati , Arghya Mukherjee , Carlos M. Pignataro , Richard Montgomery Plane
IPC: H04L29/08
Abstract: Techniques are described to provide service or network function workload preemption. In one example, a method includes identifying a network location at which a first function can be instantiated; determining whether compute resources are available at the network location to instantiate the first function; based on determining that compute resources are available, instantiating the first function; based on determining that compute resources are not available, determining whether preemption of a second function can be performed at the network location, wherein determining whether preemption of the second function can be performed is based, at least in part, on a comparison between a setup priority of the first function and a holdover priority of the second function; and, based on determining that preemption of the second function at the network location can be performed, performing preemption of the second function and instantiating the first function at the network location.
-
公开(公告)号:US11210126B2
公开(公告)日:2021-12-28
申请号:US16408634
申请日:2019-05-10
Applicant: Cisco Technology, Inc.
Inventor: Santanu Dasgupta , Chandragupta Ganguly , Ian Wells , Rajiv Asati , Om Prakash Suthar , Vinod Pandarinathan , Ajay Kalambur , Yichen Wang , John Wei-I Wu
Abstract: A system is provided that includes one management cluster to manage network function virtualization infrastructure (NFVI) resources lifecycle in more than one edge POD locations, where resources include hardware and/or software, and where software resources lifecycle includes software development, upgrades, downgrades, logging, monitoring etc. Methods are provided for decoupling storage from compute and network functions in each virtual machine (VM)-based NFVI deployment location and moving it to a centralized location. Centralized storage could simultaneously interact with more than one edge PODs, and the security is built-in with periodic key rotation. Methods are provided for increasing NFVI system viability by dedicating (fencing) CPU core pairs for specific controller operations and workload operations, and sharing the CPU cores for specific tasks.
-
55.
公开(公告)号:US20210328913A1
公开(公告)日:2021-10-21
申请号:US16853331
申请日:2020-04-20
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Carlos M. Pignataro , Alejandro Eguiarte , Rajiv Asati
IPC: H04L12/721 , H04L12/751 , H04L12/741 , H04L12/46
Abstract: Techniques for defining a service flow definition among container pods that provide services in a network. The techniques may include an orchestrator of a computer network platform of the network determining which container pods need to communicate with which container pods. The service flow definition thus indicates needed paths between the container pods. In configurations, a cluster topology may be determined where the cluster topology indicates corresponding nodes of the network in which each container pod is located, as well as end points of the network with which the corresponding nodes communicate. Based at least in part on the service flow definition and the cluster topology, corresponding route distribution policies may be determined for the end points. The corresponding route distribution policies may be applied to the end points.
-
公开(公告)号:US11038979B2
公开(公告)日:2021-06-15
申请号:US16184220
申请日:2018-11-08
Applicant: Cisco Technology, Inc.
Inventor: Rajiv Asati , Humberto Jose La Roche , Eric C. Friedrich
Abstract: A method is performed at a mobile core, including assigning a first cache servicing a client device in response to a first request for a media content item based at least in part on a first IP address of the client device associated with a first edge location. The method further includes providing a first portion of the media content item from the first cache. The method additionally includes triggering a plurality of caches at edge locations proximate to the first edge location to retrieve a second portion of the media content item. The method also includes receiving a continuation request from the client device with a second IP address associated with a second edge location. The method further includes selecting a second cache from the plurality of caches based at least in part on the second IP address and continuing providing the media content item from the second cache.
-
公开(公告)号:US10958506B2
公开(公告)日:2021-03-23
申请号:US15834284
申请日:2017-12-07
Applicant: Cisco Technology, Inc.
Inventor: Carlos M. Pignataro , Nagendra Kumar Nainar , Rajiv Asati
IPC: H04L12/24 , H04L12/851
Abstract: A system and method predict risks of failure or performance issues in a network to predictively position traffic flows in the network. For a traffic flow through a network, first data accumulated in a header of packets for the traffic flow is obtained, which header is populated by network elements along a path of the traffic flow through the network. Second data is obtained about the network in general including other network elements not along the path of the traffic flow. Machine learning analysis is performed to derive rules that characterize failure or performance risk issues in the network. The rules and topology data describing a topology of the network are applied to a model to create a topological graphical representation indicating failure or performance issues in the network that affect the traffic flow. A path for the traffic flow is modified based on the topological graphical representation.
-
公开(公告)号:US10924283B2
公开(公告)日:2021-02-16
申请号:US15620015
申请日:2017-06-12
Applicant: Cisco Technology, Inc.
Inventor: Rajiv Asati , Nagendra Kumar Nainar , Carlos M. Pignataro
Abstract: Techniques for use in generating a dynamically-changing IoT device identity with robust blockchain validation are provided. When entering a communication network, an IoT device performs a procedure for registration. The procedure includes communicating, in a transaction, data associated with the IoT device to a network device (e.g. a fog router). The data includes, amongst other data items, an identity for addressing communications to and from the IoT device. A transaction number associated with the transaction is received based on a blockchain registration of the transaction. An updated identity of the IoT device is then derived based on the transaction number. In one example, the updated identity of the IoT device may be derived by combining a static address of the IoT device and the transaction number. The steps may be repeated by the device for each one of a plurality of network registrations.
-
59.
公开(公告)号:US20200267049A1
公开(公告)日:2020-08-20
申请号:US16278787
申请日:2019-02-19
Applicant: Cisco Technology, Inc.
Inventor: Raghavendra Suryanarayanarao , Om Prakash Suthar , Aeneas Sean Dodd-Noble , Vivek Agarwal , Rajiv Asati , Carlos M. Pignataro
IPC: H04L12/24 , H04W72/10 , H04W76/10 , H04L12/803
Abstract: Techniques are presented in which a new information element signaling priority of a management entity is included in a setup (e.g., S1-Setup) response or configuration update message sent by a management entity to a base station entity. The base station entity interprets this priority information along with the relative capacity information in an appropriate way to load-distribute the traffic/calls to highly preferable management entity instances (at a local site) when they are available, and switchover/failover to lower preference management entity instances (at a remote site) when there is a local site outage/failure or insufficient capacity in a geo-resilient pooled network.
-
公开(公告)号:US20200052982A1
公开(公告)日:2020-02-13
申请号:US16102395
申请日:2018-08-13
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Carlos M. Pignataro , Rajiv Asati
Abstract: The present technology is directed to a system and method for automatic triggering of relevant code segments corresponding to a sequence of code segments or function codes having a preferred execution order. The automatic triggering action is based on the snooping of a response generated from an execution of a previous code segment. Information with respect to the next code segment in the preferred execution order may be obtained by directing a network proxy, such as Envoy to snoop the Uniform Resource Identifier (URI) field of a response packet being forwarded to a client entity. In this way, a network proxy may preemptively spawn and instantiate the following function codes (pointed to by the snooped Uniform Resource Identifier) prior to receiving the corresponding client request. As such, by the time a client request for the subsequent function code is received the code ready for execution.
-
-
-
-
-
-
-
-
-