-
公开(公告)号:US20190124541A1
公开(公告)日:2019-04-25
申请号:US15792477
申请日:2017-10-24
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Mark Allen Webb , Indermeet Singh Gandhi , John Martin Graybeal
IPC: H04W28/02 , H04L12/813
Abstract: A method for providing enhanced visibility in heterogeneous network. The method comprises receiving, at a networking device housing a cellular base station and a WLAN access point, cellular network traffic from an electronic device. The method further comprises receiving, at the networking device, WLAN traffic from the electronic device and encapsulating, at the networking device, the cellular network traffic and the WLAN traffic using a common protocol. The method further comprises transmitting the encapsulated cellular traffic and the encapsulated WLAN traffic to a controller.
-
公开(公告)号:US20180343177A1
公开(公告)日:2018-11-29
申请号:US15602928
申请日:2017-05-23
Applicant: Cisco Technology, Inc.
Inventor: Mahyar Fazlyab , Mehdi Nikkhah , Mark Allen Webb
IPC: H04L12/26 , H04L12/721
Abstract: A network computing device determines a network topology for at least one network flow path between at least one ingress network border device and at least one egress network border device. The network computing device receives a message containing data indicating flow statistics for the at least one ingress network border device. The network computing device generates flow statistics for at least one network device along the at least one network flow path from the network topology and the flow statistics for the at least one ingress network border device. The network computing device generates the flow statistics for at least one network device along the at least one network flow path without receiving flow statistics from the at least one network device along the at least one network flow path.
-
公开(公告)号:US11750610B2
公开(公告)日:2023-09-05
申请号:US17136426
申请日:2020-12-29
Applicant: Cisco Technology, Inc.
Inventor: Gangadharan Byju Pularikkal , Mark Grayson , Santosh Ramrao Patil , Jerome Henry , Bart Brinckman , Mark Allen Webb
CPC classification number: H04L63/10 , H04L63/083 , H04W12/06 , H04W12/08 , H04W76/10 , H04L2463/082 , H04W36/14 , H04W88/06 , H04W88/10
Abstract: Various implementations disclosed herein enable controlling access to networks. In various implementations, a method of controlling access to a network is performed by a computing device including one or more processors, and a non-transitory memory. In various implementations, the method includes obtaining an indication that a mobile device having access to a first network utilizing a first radio access technology (RAT) has requested access to a second network utilizing a second RAT. In some implementations, the method includes determining whether the access to the first network satisfies an authentication criterion associated with the second network. In some implementations, the method includes granting the mobile device access to the second network in response to determining that the access to the first network satisfies the authentication criterion associated with the second network. In some implementations, accessing the second network via the authentication criterion satisfies an operating threshold associated with the mobile device.
-
公开(公告)号:US10608930B2
公开(公告)日:2020-03-31
申请号:US15602928
申请日:2017-05-23
Applicant: Cisco Technology, Inc.
Inventor: Mahyar Fazlyab , Mehdi Nikkhah , Mark Allen Webb
IPC: H04L12/721 , H04L12/751 , H04L12/24 , H04L12/26
Abstract: A network computing device determines a network topology for at least one network flow path between at least one ingress network border device and at least one egress network border device. The network computing device receives a message containing data indicating flow statistics for the at least one ingress network border device. The network computing device generates flow statistics for at least one network device along the at least one network flow path from the network topology and the flow statistics for the at least one ingress network border device. The network computing device generates the flow statistics for at least one network device along the at least one network flow path without receiving flow statistics from the at least one network device along the at least one network flow path.
-
公开(公告)号:US20210120000A1
公开(公告)日:2021-04-22
申请号:US17136426
申请日:2020-12-29
Applicant: Cisco Technology, Inc.
Inventor: Gangadharan Byju Pularikkal , Mark Grayson , Santosh Ramrao Patil , Jerome Henry , Bart Brinckman , Mark Allen Webb
Abstract: Various implementations disclosed herein enable controlling access to networks. In various implementations, a method of controlling access to a network is performed by a computing device including one or more processors, and a non-transitory memory. In various implementations, the method includes obtaining an indication that a mobile device having access to a first network utilizing a first radio access technology (RAT) has requested access to a second network utilizing a second RAT. In some implementations, the method includes determining whether the access to the first network satisfies an authentication criterion associated with the second network. In some implementations, the method includes granting the mobile device access to the second network in response to determining that the access to the first network satisfies the authentication criterion associated with the second network. In some implementations, accessing the second network via the authentication criterion satisfies an operating threshold associated with the mobile device.
-
公开(公告)号:US10911453B2
公开(公告)日:2021-02-02
申请号:US15854155
申请日:2017-12-26
Applicant: Cisco Technology, Inc.
Inventor: Gangadharan Byju Pularikkal , Mark Grayson , Santosh Ramrao Patil , Jerome Henry , Bart Brinckman , Mark Allen Webb
Abstract: Various implementations disclosed herein enable controlling access to networks. In various implementations, a method of controlling access to a network is performed by a computing device including one or more processors, and a non-transitory memory. In various implementations, the method includes obtaining an indication that a mobile device having access to a first network utilizing a first radio access technology (RAT) has requested access to a second network utilizing a second RAT. In some implementations, the method includes determining whether the access to the first network satisfies an authentication criterion associated with the second network. In some implementations, the method includes granting the mobile device access to the second network in response to determining that the access to the first network satisfies the authentication criterion associated with the second network. In some implementations, accessing the second network via the authentication criterion satisfies an operating threshold associated with the mobile device.
-
公开(公告)号:US10897722B2
公开(公告)日:2021-01-19
申请号:US15792477
申请日:2017-10-24
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Mark Allen Webb , Indermeet Singh Gandhi , John Martin Graybeal
Abstract: A method for providing enhanced visibility in heterogeneous network. The method comprises receiving, at a networking device housing a cellular base station and a WLAN access point, cellular network traffic from an electronic device. The method further comprises receiving, at the networking device, WLAN traffic from the electronic device and encapsulating, at the networking device, the cellular network traffic and the WLAN traffic using a common protocol. The method further comprises transmitting the encapsulated cellular traffic and the encapsulated WLAN traffic to a controller.
-
公开(公告)号:US10548109B2
公开(公告)日:2020-01-28
申请号:US15631535
申请日:2017-06-23
Applicant: Cisco Technology, Inc.
Inventor: Mark Allen Webb
Abstract: In one embodiment, a method comprises a network device receiving one or more unsolicited data packets output by a plurality of source network devices, each unsolicited data packet comprising a corresponding link layer header and a corresponding network layer header; the network device parsing, from each unsolicited data packet within at least one of its corresponding link layer header or corresponding network layer header, a time type-length-value (TLV) element specifying a corresponding transmission time of the data packet from one or more corresponding source network devices, and a location TLV element specifying a corresponding location of the corresponding one or more source network devices; and the network device determining its corresponding location based on the time TLV elements and the location TLV elements parsed from the respective unsolicited data packets.
-
公开(公告)号:US20190199725A1
公开(公告)日:2019-06-27
申请号:US15854155
申请日:2017-12-26
Applicant: Cisco Technology, Inc.
Inventor: Gangadharan Byju Pularikkal , Mark Grayson , Santosh Ramrao Patil , Jerome Henry , Bart Brinckman , Mark Allen Webb
CPC classification number: H04L63/10 , H04L63/083 , H04L2463/082 , H04W12/06 , H04W12/08 , H04W76/10 , H04W88/06 , H04W88/10
Abstract: Various implementations disclosed herein enable controlling access to networks. In various implementations, a method of controlling access to a network is performed by a computing device including one or more processors, and a non-transitory memory. In various implementations, the method includes obtaining an indication that a mobile device having access to a first network utilizing a first radio access technology (RAT) has requested access to a second network utilizing a second RAT. In some implementations, the method includes determining whether the access to the first network satisfies an authentication criterion associated with the second network. In some implementations, the method includes granting the mobile device access to the second network in response to determining that the access to the first network satisfies the authentication criterion associated with the second network. In some implementations, accessing the second network via the authentication criterion satisfies an operating threshold associated with the mobile device.
-
公开(公告)号:US10225190B2
公开(公告)日:2019-03-05
申请号:US15244952
申请日:2016-08-23
Applicant: Cisco Technology, Inc.
Inventor: Mark Allen Webb
IPC: H04W28/06 , H04L12/741 , H04W4/021
Abstract: In one embodiment, a method comprises: acquiring a data structure containing a virtualized path identifier, the virtualized path identifier specifying a path determination method and a destination identifier that identifies a destination that is reachable according to the path determination method; determining in a route method database based on the virtualized path identifier, from among distinct types of available path determination methods identified in the route method database, a routing context for reaching the destination according to the corresponding path determination method; and causing reaching of the destination in response to executing the path determination method on the destination identifier according to the routing context obtained from the route method database.
-
-
-
-
-
-
-
-
-