Abstract: In some implementations, a head Level 2 (L2) node of an intermediate system-intermediate system (IS-IS) flood reflection (FR) network may determine an end-to-end path from the head L2 node to a tail L2 node of the IS-IS FR network. The IS-IS FR network includes a plurality of L2 nodes and a plurality of FR clusters that each comprise a plurality of Level 1 (L1) nodes and a plurality of L1 and L2 (L1/L2) nodes connected by a plurality of L1 links. The head L2 node may send information associated with the end-to-end path to another node identified in the end-to-end path to cause a label switched path (LSP) to be established from the head L2 node to the tail L2 node, wherein the LSP traverses one or more L1 links within an FR cluster of the IS-IS FR network.
Abstract: A fast-path node of a packet processing service receives a packet of a forward-direction flow. The node obtains an exception-path routing rule from an exception-path routing rule source. The node sends a query to an exception-path cell of the service based on the routing rule, and receives a packet rewriting rule in response to the query. The rewriting rule is used to send a rewritten version of the packet to a destination.
Abstract: Responsive to matching a site prefix to IPv6 network traffic from clients, the traffic as intended, and responsive to not matching the site prefix, classifying the corresponding traffic as unintended. An initial rate of packet occurrence and predict load caused by intended traffic and predicting load caused by unintended traffic is calculated, based on an initial rate of packet occurrence. The predicted traffic loads are fed back by configuring behavior of network modules according to the predictions of intended traffic load and unintended traffic load. Packet processing traffic at the network modules is based on traffic classification from the outcome of the AI-neuron.
Abstract: A method by which a terminal transmits an uplink channel in a wireless communication system comprises steps of: receiving, from a base station, first information, which is information related to a time division duplex (TDD) configuration; and repeatedly transmitting, to the base station, an uplink channel on a resource determined on the basis of the first information.
Type:
Grant
Filed:
August 31, 2023
Date of Patent:
January 28, 2025
Assignee:
WILUS INSTITUTE OF STANDARDS AND TECHNOLOGY INC.
Abstract: A communication device includes a master component and a plurality of slave components. The master component comprises an antenna. The plurality of slave components comprises a first antenna, a second antenna, and a frequency converter. The first antenna communicates with an external device by a beamforming operation on a first carrier frequency, and receives first signals from the external device. The second antenna communicates with the antenna of the master component by the beamforming operation on a second carrier frequency, and receives second signals from the master component. The frequency converter converts the first signals received through the second antenna from the second carrier frequency of the external device into the first carrier frequency of the first master component and converts the second signals received through the first antenna from the first carrier frequency of the first master component into the second carrier frequency of the external device.
Abstract: A server has a processor and a memory storing a message thread module with instructions executed by the processor to maintain a message thread between users of client devices. The message thread module serves a message thread with a new text entry to a client device in response to a request for the message thread from a user. Message thread state change is collected from the client device, where the message thread state change represents an indication to automatically delete the new text entry of the message thread after the duration of a transitory display period on the client device unless an indication of a gesture applied to a display screen presenting the new text entry of the message thread is received from the client device during the transitory display period. The message thread state change is queued at the server along with additional message thread state changes associated with the collecting operation performed for additional users associated with the message thread.
Abstract: Automated techniques for converting network devices from a Layer 2 (L2) network into a Layer 3 (L3) network in a hierarchical manner are described herein. The network devices may be configured to boot such that their ports are in an initialization mode in which the ports are unable to transmit locally generated DHCP packets. When a network device detects that a neighbor (or “peer”) device has acquired an IP address or has been configured by a network controller, then the port on which the neighbor device is detected can then be transitioned from the initialization mode into a forwarding mode. In the forwarding mode, the port can be used to transmit packets to obtain an IP address. Thus, the network devices are converted from an L2 device to an L3 device in a hierarchical order such that upstream devices are discovered and converted into L3 devices before downstream devices.
Abstract: An authorization device obtains a registration request associated with an end device, the registration request including a new randomized media access control (MAC) address associated with the end device; determines whether the end device is authorized to use the new randomized MAC address; transmits a message to the end device with a first randomly generated number when it is determined that the end device is authorized to use the new randomized MAC address; obtains integrity information associated with the end device, the first integrity information being computed based on the first randomly generated number; transmits a request to a validation system to validate the end device based on the first integrity information; obtains an indication that the end device is validated; determines policies associated with the end device when it is determined that the end device is validated; and applies the policies to the end device.
Type:
Grant
Filed:
February 29, 2024
Date of Patent:
January 28, 2025
Assignee:
CISCO TECHNOLOGY, INC.
Inventors:
Nagendra Kumar Nainar, Carlos M. Pignataro, Robert E. Barton, Jerome Henry
Abstract: Techniques herein facilitate a device address rotation management protocol that may be implemented for a wireless local area network (WLAN), which can be used to influence when wireless client devices or stations may rotate their Media Access Control (MAC) addresses, how to perform such rotations, and/or the like. In one example, a method may include providing, by an access point (AP), a first communication indicating that the AP supports a MAC address rotation management protocol; obtaining, by the AP, a second communication from a wireless station (STA) indicating that the STA intends to perform a MAC address rotation; and transmitting, by the AP, a third communication to influence the MAC address rotation of the STA, the third communication comprising a rotation status indicator and timing information.
Type:
Grant
Filed:
July 26, 2024
Date of Patent:
January 28, 2025
Assignee:
CISCO TECHNOLOGY, INC.
Inventors:
Jerome Henry, Robert E. Barton, Stephen Michael Orr
Abstract: Techniques and architecture are described for providing a service, e.g., a security service such as a firewall, across different virtual networks/VRFs/VPN IDs. The techniques and architecture provide modifications in enterprise computing fabrics by modifying pull-based overlay protocols such as, for example, locator/identifier separation protocol (LISP), border gateway protocol ethernet virtual private network (BGP EVPN), etc. A map request carries additional information to instruct a map-server that even though mapping (destination prefix and firewall service RLOC for the destination) is known within the map-server's own virtual network/VRF for firewall service insertion, the map-server still should do a lookup across virtual networks/VRFs and discover the final destination's DGT (destination group tag) and include that in the map reply.
Inventors:
Sam Prentice, David Keating, Jo-Yun Wang, Matthew Innes, Alexia Delhoume, Tristan Taylor, Roderick Philip, Aki Laine, Francesca Alyssum Quaglia
Inventors:
Jody Akana, Molly Anderson, Bartley K. Andre, Shota Aoyagi, Anthony Michael Ashcroft, Marine C. Bataille, Jeremy Bataillou, Abidur Rahman Chowdhury, Clara Geneviève Marine Courtaigne, Markus Diebel, Alexandre B. Girard, Jonathan Gomez Garcia, M. Evans Hankey, Anne-Marie Heck, Moises Hernandez Hernandez, Julian Hoenig, Richard P. Howarth, Jonathan P. Ive, Julian Jaede, Duncan Robert Kerr, Kainoa Kwon-Perez, Nicolas Pedro Lylyk, Marc A. Newson, Peter Riering-Czekalla, Peter Russell-Clarke, Benjamin Andrew Shaffer, Joe Sung-Ho Tan, Robert V. Tang, Clement Tissandier, Eugene Antony Whang