Abstract: A method and apparatus are provided for preventing data-packet loss upon a switchover from an active to a standby PDSN, in a redundant PDSN environment. Data-packet loss is prevented by modifying the checking of the sequence number associated with the data-packets. The first sequence number received upon switchover is used to determine the order of the subsequent GRE frames. The standby PDSN sends keep-alive packets associated with an arbitrary sequence number to a packet control function (PCF). On receiving a response from the PCF, the arbitrary sequence number is used as a starting sequence number for sending the data-packets. Otherwise, keep-alive packets with modified numbers are sent to the PCF. In synchronized communication sessions between the PDSN and the PCF, data-packet loss can be prevented by disabling the checking of the sequence number upon a switchover. In another embodiment, data-packet loss is prevented by excluding the sequence number.
Abstract: In one particular embodiment, the secure media includes information sent using secure real-time transfer protocol (sRTP). Supplementary services may include call transfers, forwards/redirects, call hold with music on hold (MOH), call hold with no MoH, call resume, call park, call pickup, call blast etc. In a call flow, a call request may be received from a first device for a second device. The call request may include at least one set of keys and be ready for establishment of an sRTP call. It is then determined that a supplementary service is needed for the call request. For example, a supplementary service may indicate that a call redirect to a third device is required. The gateway then facilitates a supplementary service call with the third device. This is facilitated without contacting the first device to generate a second key after receiving the initial call request.
Abstract: Methods and systems have been provided for constructing autonomous system (AS)-disjoint Traffic Engineering LSPs for load-balancing and protection purposes using AS-Level topology information in a network. The constructed network paths through a plurality of domains may be disjoint or partially disjoint.
Abstract: Techniques for allowing a home agent to provide location/presence-based services are provided. In one embodiment, a point of attachment of an access network receives a discovery request from a mobile node. A mobile node is associated with a home agent in a home network different from the access network. Location/presence-based information is determined at the point of attachment. The location/presence-based information is added to a registration request at the layer 3 protocol layer. The registration request is then sent from the point of attachment to the home agent. When the registration request is received at the home agent, the home agent parses the registration request to determine the location/presence information from the request. The home agent then performs a location/presence service using the location/presence information.
Type:
Grant
Filed:
June 14, 2006
Date of Patent:
July 6, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Jayaraman Iyer, Anand K. Oswal, Timothy Stammers, Kent Leung
Abstract: Methods and systems have been provided that allow a user to access a file in a computational device. The location of the file is made transparent to the user. The request for the file includes the filename. The filename is mapped to the location of the file in the computational device. The file is returned if it is present in the cache of the computational device. Otherwise, the file is retrieved from a storage device. The cached files are, deleted from the cache on the basis of a policy-based-cache-deletion mechanism.
Type:
Grant
Filed:
December 9, 2005
Date of Patent:
June 29, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Vignesh Dayanand Shetty, Gary Gitelson, Navneet Agarwal
Abstract: A mechanism for providing strong anti-replay protection at a security gateway in a network for protection against an attacker duplicating encrypted packets. The mechanism assigns a unique sequence number to each encrypted packet and a time stamp. A receiving security gateway rejects packets that have a duplicative sequence number or that is too old to protect itself against replay attacks. Each security gateway checks off the sequence numbers as they are received knowing that the sending security gateway assigns sequence numbers in an increasing order. The receiving security gateway remembers the value of the highest sequence number that it has already seen as well as up to N additional sequence numbers. Any packet with a duplicative sequence number is discarded. In addition to the sequence number, each packet also has an associated time stamp that corresponds to an epoch during which it should be received. If the packet is received after the epoch has expired, the packet is rejected.
Abstract: A system and a method are provided to quantitatively analyze the risk for a risk-based testing of software having at least one module. The risk-based testing comprises obtaining behavior of each module to a set of test cases. The method to quantitatively analyze the risk comprises assigning a confidence weight to each test case for each module based on its test history, assigning a confidence weight to each of a plurality of software specific parameters for each module, calculating a raw confidence level for each module based on the assigned confidence weights to the test cases, and calculating a confidence quotient for each module as a weighted sum of the raw confidence level for each module and the confidence weight for each software specific parameter. The confidence quotient indicates the risk of defects in each module. The module with the smallest confidence quotient is assigned the highest priority during the testing of the software.
Abstract: A method and apparatus for secure storage of data by using redundant keys is provided. The method includes encrypting a data set by using a master key, which can be encrypted by different sync keys. Sync keys can be generated by different supervisor cards. Thereafter, the encrypted master key and the encrypted data set can be stored in a memory. Further, credentials stored in one of the supervisor cards can be encrypted and transferred to other supervisor cards, to provide redundancy of supervisor cards.
Abstract: A system and method provide for adaptively monitoring and reporting pulse train characteristics. In one embodiment a DSP operating within a voice media gateway (VMG) is initialized with signal processing criteria, at least one control parameter and, optionally, one or more pulse train characteristic indicators for indicating pulse train characteristics to be determined or reported in accordance with the control parameter or parameters.
Abstract: In one embodiment, techniques for sending a conference invite that provides access to a list of participants in an existing conference are provided. A participant in a conference may decide to send an invite for the existing conference to the user. A request for inviting the user into the existing conference is received. A list of participants in the existing conference is determined. An invite message for the conference is then generated where the invite message includes information for the list of participants. The invite message is then sent to the user where the information for the list of participants is accessible to the user. For example, the list of participants may be displayed as caller ID information when the invite message is received by the user.
Abstract: Techniques for dynamically distribute replication points based on routing metrics are provided. A receiver list may be split based on the routing metrics. For example, the receiver list may be split based on unicast reachability over an interface. If portions of egress routers are reachable over different interfaces, the portions are included together in a sublist. Thus, the list is split into sublists based on the reachability. Point-to-point links are then set up between a head end router and an egress router in each sublist. The sublist is then sent to each egress router, which can perform the process above in setting up a point-to-point link to another egress router in each sublist.
Abstract: A method and apparatus for creating management information specifications in a schema by a user. According to various embodiments of the method, a first file is defined by using a metaschema. The metaschema is represented in a schema definition format. Subsequently, a second file corresponding to the first file is defined. The second file includes directives for depicting various elements of a metaschema. The user is then prompted to fill various fields that correspond to the various elements of the metaschema. As a result, the management information specifications are included in a document corresponding to the metaschema. The management information specifications in the document are then converted to form the management information specifications into a metaschema document. The metaschema document represents a schema. The schema includes the management information specifications.
Type:
Grant
Filed:
November 3, 2005
Date of Patent:
June 8, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Alexander Clemm, Jung Tjong, Eshwar Rao Yedavalli
Abstract: A method for power-efficient configuration of one or more physical ports at a network device in an EtherChannel is provided. Parameters for allocation of the physical ports to a logical port are negotiated with a link partner. Thereafter, bandwidth load at the logical port is compared with the parameter. The physical ports are configured, based on the comparison.
Type:
Grant
Filed:
February 24, 2006
Date of Patent:
June 1, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Kevin J. Ma, Lance Alan McCallum, Brenda J. Thompson
Abstract: In one embodiment, a method can include: (i) connecting to a conference server via a network; (ii) viewing a list of available past meetings and associated forms of access; (iii) selecting a meeting and form of access from the list; and (iv) re-creating the meeting in a context using the form of access. Example forms of access can include a dialing of all meeting participants, re-creating a previous meeting context, summarizing a meeting, displaying action items, and replaying or viewing a portion of a meeting.
Abstract: In one embodiment, a method can include: (i) receiving a new contact in a contact center, where the new contact includes an expressed need; (ii) forming a resource set in response to the expressed need of the new contact, where the resource set includes one or more prospective resources; and (iii) sending a broadcast message to each of the prospective resources in the resource set.
Type:
Grant
Filed:
February 28, 2007
Date of Patent:
June 1, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Kenneth D. Jordan, Lawrence Johnson, Kevin Collins, Michael P. Lepore, Paul Schechinger
Abstract: In one embodiment, an apparatus can include: (i) logic configured to detect an advanced warning indication, such as for a degraded signal condition, on a first link between first and second network devices, where the detection can utilize a number of corrected bits and forward error correction (FEC), for example; and (ii) logic configured to reroute packet traffic from the first link to a second link when the degraded signal condition is detected.
Abstract: Methods, systems and apparatus for suppressing redundancy in data transmission over networks are provided. Data segments are transmitted from a transmitting DPU to a receiving DPU. Initially, only signatures of the transmitted data segments are stored in a cache at the transmitting DPU. A data segment is stored in the cache only if it satisfies a redundancy-suppressing admission policy. Such a data segment is referred to as a redundant data segment. The redundant data segment is also stored in a cache at the receiving DPU. The transmitting DPU transmits the signatures of the redundant data segments to the receiving DPU, which then extracts the redundant data segments from its cache. Therefore, transmission of the redundant data segments is suppressed.
Abstract: Disclosed are systems and methods for persisting management information indexes across multiple network elements. In particular, methods of detecting and curing potential collisions among a peer group of network elements by use of a hashing function can be provided in accordance with embodiments. For example, a method for maintaining persistence across network elements can include: (i) configuring one of the network elements, and providing a configuration string therefrom; (ii) performing a hashing algorithm on the configuration string to provide a hash value; (iii) determining if any collisions exists between the hash value and corresponding values from among a peer group of network elements; and (iv) assigning the hash value as a management table index when no collision is found, or assigning a new value for the management table index when a collision is found.
Type:
Grant
Filed:
August 30, 2006
Date of Patent:
May 11, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Benoit Claise, Emmanuel Tychon, Richard Wellum
Abstract: A method and a system for providing a service in a network, is provided. In one embodiment, a first modem with a first address, which is identical to a second address of a second modem, requests for services in the network. A modem termination system (MTS) checks whether the first modem is a clone of the second modem. If the first modem is identified to be the clone of the second modem, then, the first modem is restricted from obtaining the requested service. However, the second modem is continuously provided services.
Abstract: Methods, systems and apparatus for billing network usage in a network are provided. Statistics of subscribers' network usage and subscriber information are transmitted from a plurality of First Hop Multicast Routers (FHMRs) to a Net Flow Collection Server (NFCS). The NFCS consolidates the statistics received and subscriber information into a report. Thereafter, a Billing Module (BM) prepares subscribers billing information based on the report and policies configured on the BM. Advantageously, subscribers are charged based on their individual network usage.