Patents Assigned to Cisco Technology, Inc., a California Corporation
  • Publication number: 20080089247
    Abstract: A solution is provided wherein the interfaces between multiple chassis (e.g., edge switches) in a network of layer 2 devices and a spanning tree device are treated as a single emulated switch. This emulated switch effectively enables two different views to the two different sides. Thus, frames from the network of layer 2 switches destined to any port of the emulated switch may take any of the links (through any of the physical switches), thereby enabling effective load-balancing for frames traveling from the layer 2 network side into the spanning tree device. Meanwhile the spanning tree device does not recognize an illegal loop in its connection to two different edge switches as it views the two links as a single logical EtherChannel.
    Type: Application
    Filed: October 16, 2006
    Publication date: April 17, 2008
    Applicant: Cisco Technology, Inc., A California Corporation
    Inventors: Sanjay Sane, Lawrence Kreeger, Thomas Edsall, Elango Ganesan, Soei-Shin Hang, Ramana Mellacheruvu
  • Publication number: 20080069138
    Abstract: A system for managing bandwidth use in a device. In a specific embodiment, the device is a network device that includes a first data scheduler that is adapted to initially share available device bandwidth among a first type of traffic and a second type of traffic on an as-needed basis. A traffic monitor communicates with the first scheduler and causes the first data scheduler to guarantee predetermined transmission characteristics for the second type of traffic. The first data scheduler includes one or more routines for prioritizing first type of traffic above the second type of traffic when the network device is in a first operational mode, and prioritizing the second type of traffic above the first type of traffic when the network device is in a second operation al mode. The minimum transmission characteristics include a minimum service rate and a minimum latency for the second type of traffic.
    Type: Application
    Filed: September 19, 2006
    Publication date: March 20, 2008
    Applicant: Cisco Technology, Inc. (a California Corporation)
    Inventors: Dipankar Bhatt Acharya, Hugh Holbrook, Fusun Ertemalp
  • Publication number: 20080059620
    Abstract: Disclosed are systems and methods for persisting management information indexes across multiple network elements. In particular, methods of detecting and curing potential collisions among a peer group of network elements by use of a hashing function can be provided in accordance with embodiments. For example, a method for maintaining persistence across network elements can include: (i) configuring one of the network elements, and providing a configuration string therefrom; (ii) performing a hashing algorithm on the configuration string to provide a hash value; (iii) determining if any collisions exists between the hash value and corresponding values from among a peer group of network elements; and (iv) assigning the hash value as a management table index when no collision is found, or assigning a new value for the management table index when a collision is found.
    Type: Application
    Filed: August 30, 2006
    Publication date: March 6, 2008
    Applicant: Cisco Technology, Inc. (a California Corporation)
    Inventors: Benoit Claise, Emmanuel Tychon, Richard Wellum
  • Publication number: 20080052582
    Abstract: Disclosed are, inter alia, methods, apparatus, data structures, computer-readable media, mechanisms, and means for providing a JTAG to system bus interface for accessing embedded analysis system(s). JTAG commands are received and converted into commands sent out a bus to a device including an embedded analysis instrument, with results received over the bus forwarded out the JTAG interface to an external device. Such a JTAG to system bus interface may eliminate the need to provide separate JTAG TAP interfaces on each ASIC of a board, and/or eliminate the need to daisy chain multiple TAP interfaces of multiple ASICs in order to provide a single TAP interface for accessing the multiple embedded testing instruments.
    Type: Application
    Filed: July 26, 2006
    Publication date: February 28, 2008
    Applicant: CISCO TECHNOLOGY, INC., A CALIFORNIA CORPORATION
    Inventors: Hongshin Jun, Gyaneshwar S. Saharia, William Eklow
  • Publication number: 20080040306
    Abstract: Techniques for routing content requests are provided. In one embodiment, a first device at a network device sends a request from a first device at a first site for content to a second device at a second site. The second device determines if the request should be redirected to a third device in a third site. For example, a content server in the second site may decide that a request is better serviced by a third site. This may be because the third site may be closer to the first site, the second site may be overloaded or down, etc. If the request should be redirected, the second device determines a rule for sending further requests for the content to the third site. Signaling is then sent to the network device such that the rule may be installed where further requests for the content are sent to the third site. The further requests are sent to the third site without going through the second site.
    Type: Application
    Filed: August 2, 2006
    Publication date: February 14, 2008
    Applicant: Cisco Technology, Inc. (a California Corporation)
    Inventor: Kevin Ma
  • Publication number: 20080025214
    Abstract: A multilevel coupled policer is configured to police packets using at least two policing levels, including a first-level of class policers and a second-level aggregate policer. The multilevel coupled policer is configured to share bandwidth of the aggregate policer among packet traffic corresponding to the class policers based on the packet traffic. The multilevel coupled policer is configured to apply a particular class policer corresponding to a particular packet to identify a tentative policing action. The multilevel coupled policer is configured to apply the second-level aggregate policer to the particular packet based on the identified the tentative policing action and a result of a comparison operation of the number of tokens in one or more token buckets associated with the second-level aggregate policer and the length of the particular packet in order to determine a final policing action for marking and/or applying to the particular packet.
    Type: Application
    Filed: July 27, 2006
    Publication date: January 31, 2008
    Applicant: CISCO TECHNOLOGY, INC., A CALIFORNIA CORPORATION
    Inventors: John H.W. Bettink, David J. Tsiang, Clarence Filsfils
  • Publication number: 20070261110
    Abstract: One or more firewalls are used to perform firewall functionality on packets based on the entry and exit accesses of each of the one or more firewalls being applied to a packet. For example, when firewalls are included in a router, the interfaces of the router are typically mapped to virtual firewalls and access thereof. Based on the determined routing of a particular packet, the firewalls to apply and their corresponding entry and exit accesses are identified. In order to decouple the application by the firewall itself of the security policies from the network topology and routing architecture (e.g., the network routing address information which is typically relied upon by current firewalls), the firewall functionality is defined based on the identified entry and exit accesses of a firewall, rather than based on network defined addresses, for example.
    Type: Application
    Filed: May 2, 2006
    Publication date: November 8, 2007
    Applicant: CISCO TECHNOLOGY, INC., A CALIFORNIA CORPORATION
    Inventors: Doron Oz, Nir Ben-Dvora, Eldad Eli
  • Publication number: 20070258446
    Abstract: Disclosed are, inter alia, methods, apparatus, data structures, computer-readable media, mechanisms, and means for supporting a large number of virtual local area networks (VLANS) in a bridged network. Packets are received that include 802.1Q Virtual Local Area Network (VLAN) identifiers (VIDs). However, rather than accessing the VLAN forwarding information directly based on the VID as conventionally performed, the VLAN forwarding information to use for a particular packet is determined based on an interface (e.g., virtual or physical interface, port, MPLS label, GRE tunnel or other abstraction of the interface). In other words, the interface associated with the packet identifies a context for determining the VLAN forwarding information based on the VID included in the packet. Therefore, network bridging devices can support more VLANs than that imposed by the 4096 possible values of a VID.
    Type: Application
    Filed: May 2, 2006
    Publication date: November 8, 2007
    Applicant: CISCO TECHNOLOGY, INC., A CALIFORNIA CORPORATION
    Inventors: Michael Smith, Gyaneshwar Saharia, Gaetano Borgione, Atul Rawat
  • Publication number: 20070249410
    Abstract: In on embodiment, techniques for providing alerts to a user when a communication frequency pattern between a user and a contact has not occurred during a pre-determined amount of time are provided. Communication records between the contact and the user can be analyzed to determine if the communication frequency pattern with the contact during the pre-determined amount of time does not meet pre-determined criteria. For example, the criteria may be generate an alert if communications do not occur in the last month, generate an alert if less than five communications occur in the last six months, or any other communication pattern. Also, the content of a communication may be analyzed to determine if a certain topic has been discussed. If a certain topic has not been discussed during the pre-determined amount of time, an alert may also be generated reminding the user that the topic has not been discussed.
    Type: Application
    Filed: April 20, 2006
    Publication date: October 25, 2007
    Applicant: Cisco Technology, Inc., a california corporation
    Inventors: Labhesh Patel, Sanjeev Kumar, Joseph Khouri, Mukul Jain
  • Publication number: 20070248110
    Abstract: Streams of packets are dynamically switched among dedicated and shared queues. For example, when a packet stream is in a maintenance mode (such as to keep a tunnel or packet stream associated with a server active) all packet traffic received over a packet stream is directed into the shared queue while the packet stream is not associated with one of the dedicated queues. In response to a detected change in the packet activity status of packet traffic (e.g., the establishment of a call or an increase in packet traffic, especially desirous of individualized quality of service) over a particular packet stream of the packet streams, the particular packet stream is associated with a particular group of dedicated queues such that at least non-control data traffic received over the particular packet stream is subsequently directed into the particular group of dedicated queues while the particular packet stream remains associated with the particular group of dedicated queues.
    Type: Application
    Filed: April 20, 2006
    Publication date: October 25, 2007
    Applicant: CISCO TECHNOLOGY, INC., A CALIFORNIA CORPORATION
    Inventors: Doron Oz, Earl Cohen, Eyal Oren
  • Publication number: 20070206490
    Abstract: Disclosed are, inter alia, methods, apparatus, data structures, computer-readable media, mechanisms, and means for applying features to packets in an order specified by a selected feature order template. By providing multiple feature order templates, a network device manufacturer can provide the user of the network device the ability to select among a variety of orders in which features are applied, while limiting the possible selectable orderings such as to those capable by the hardware and software of the network device, and/or to a subset of orderings thereof which has been thoroughly tested. Some devices further allow a user to define new feature order templates via a user interface.
    Type: Application
    Filed: March 6, 2006
    Publication date: September 6, 2007
    Applicant: CISCO TECHNOLOGY, INC., A CALIFORNIA CORPORATION
    Inventors: Sarel Altshuler, Nisim Levi, Nir Ben-Dvora, Doron Oz
  • Publication number: 20070171824
    Abstract: Out-of-profile rate-limited traffic is sampled to provide data for analysis, such as for, but not limited to, identifying a threat condition such as a denial-of-service or other malicious attack, or a non-malicious attack such as an error in configuration. A rate limiter including at least three states is typically used, with one of these states being an out-of-profile sampling state wherein the packet traffic is sampled to identify one or more sampled packets on which analysis can be performed, with defensive action possibly taken in response to the analysis.
    Type: Application
    Filed: January 25, 2006
    Publication date: July 26, 2007
    Applicant: CISCO TECHNOLOGY, INC. A CALIFORNIA CORPORATION
    Inventors: Natale Ruello, Farrukh Naqvi, Anusankar Elangovan, Gaetano Borgione, Suran De Silva
  • Publication number: 20070121530
    Abstract: Disclosed are conferencing systems, devices, architectures, and methods for managing a conference spanning system to facilitate participation in a plurality of conferences at the same time. An exemplary system having devices and/or structures in accordance with embodiments can include: (i) a plurality of conferences, each conference being configured to support a plurality of media modes; (ii) a presentation mechanism configured to support the plurality of media modes from the plurality of conferences; and (iii) a selector for selecting a conference from the plurality of conferences and designating the selected conference as an active conference and designating non-selected conferences as background conferences, wherein the active conference is assigned at least one enhanced media mode in the presentation mechanism.
    Type: Application
    Filed: November 29, 2005
    Publication date: May 31, 2007
    Applicant: Cisco Technology, Inc. (a California corporation)
    Inventors: Sravan Vadlakonda, Shantanu Sarkar, Ashish Chotai, Aseem Asthana, Glenn Inn
  • Publication number: 20070091802
    Abstract: Class-based bandwidth partitioning of a sequence of packets of varying packet classes is performed, such as, but not limited to determining whether or not to admit a packet to a queue based on a probability corresponding to a class of packets associated with the packet, with this probability being based on measured arrival traffic and a fair share based on the length of the queue. Data path processing is performed on each packet to determine whether to admit or drop the packet, and to record the measured received traffic. Control path processing is periodically performed to update these probabilities based on determined arrival rates and fair shares for each class of packets. In this manner, a relatively small amount of processing and resources are required to partition bandwidth for a scalable number of classes of packets.
    Type: Application
    Filed: October 24, 2005
    Publication date: April 26, 2007
    Applicant: CISCO TECHNOLOGY, INC., A CALIFORNIA CORPORATION
    Inventors: Rong Pan, Stanley Trimble, Flavio Bonomi
  • Publication number: 20070091899
    Abstract: Stored in the leaf nodes of a data structure that can be used for identifying the longest prefix matching an address are corresponding values from multiple forwarding information bases. A single common address lookup data structure (e.g., a tree, trie, etc.) can be used, and a leaf node can contain information from multiple forwarding information bases. If lookup operations are performed for a single address in multiple forwarding information bases, the single common address lookup data structure may only need to be traversed once. For example, the forwarding information for another forwarding information base may be stored in the same leaf, further down in the data structure requiring traversal from the current position, or above requiring traversal from the root of the lookup data structure. Information can be stored in the leaf node to indicate which traversal option is appropriate for a particular forwarding information base.
    Type: Application
    Filed: October 21, 2005
    Publication date: April 26, 2007
    Applicant: CISCO TECHNOLOGY, INC., A CALIFORNIA CORPORATION
    Inventors: David Ward, Pawan Uberoy, John Bettink, Shyamsundar Maniyar
  • Publication number: 20070088909
    Abstract: A content-addressable memory entry is identified as being matched if it matches all bit positions of a lookup word or does not match for less than a predetermined number of bit positions. A match line of the content-addressable memory entry is precharged. During a subsequent matching phase, each of the bit positions of the content-addressable memory entry provides a discharge path for the precharged match line. Whether or not the content-addressable memory should be identified as being matched is then determined typically by comparing the match reference voltage of the match line to a predetermined voltage level at a predetermined time, with the predetermined voltage level and predetermined time selected for the allowed number of bit positions that do not have to be matched while still considering the content-addressable memory entry to have been matched, and the implementation technology of the embodiment.
    Type: Application
    Filed: October 18, 2005
    Publication date: April 19, 2007
    Applicant: CISCO TECHNOLOGY, INC., A CALIFORNIA CORPORATION
    Inventors: Sriram Chitoor Krishnan, Sunil Parthasarathy
  • Publication number: 20070088910
    Abstract: Associative memory bit cells are disclosed for selectively producing binary or ternary content-addressable memory lookup results. Associative memory bit cells are grouped together to act as n binary content-addressable memory cells (CAM) bits or m ternary content-addressable memory (TCAM) bits, with n>m>0. Based on the programming of the associative memory bit cells and the selective application of search values (based on whether they are acting as CAM or TCAM bit cells), the appropriate determination is made as to whether or not to signal a hit or a miss based on the current input search values. These associative memory bit cells can also be combined to provide error protection for either of their operating modes. Error protection can be used to enable a correct result when e bit errors occur in the stored values in the associative memory bit cells.
    Type: Application
    Filed: August 2, 2006
    Publication date: April 19, 2007
    Applicant: CISCO TECHNOLOGY, INC., A CALIFORNIA CORPORATION
    Inventors: Sunil Parthasarathy, Sriram Krishnan
  • Publication number: 20070086227
    Abstract: Ternary content-addressable memory (TCAM) entries are disclosed for use in performing error-protected lookup operations by allowing an error budget of u deviations in values stored in each entry. Each TCAM entry is configured to identify a hit condition (else a miss condition) with an input lookup word if its stored value matches each bit of the lookup word with the exception of zero to u of its cells not matching. This determination may be made, for example, using discrete logic or based a voltage level of one or more match lines. Furthermore, it is possible to store at least 2u+1 copies of a data value desired to be protected in a such a TCAM entry among its said t TCAM cells.
    Type: Application
    Filed: June 1, 2006
    Publication date: April 19, 2007
    Applicant: CISCO TECHNOLOGY, INC., A CALIFORNIA CORPORATION
    Inventors: Sriram Krishnan, Rina Panigrahy, Sunil Parthasarathy
  • Publication number: 20070014276
    Abstract: Disclosed are, inter alia, methods, apparatus, data structures, computer-readable media, and mechanisms, for a route processor adjusting admission control policies for packets destined for the route processor and enforced on line cards. Individual line cards can identify offending packet flows that pass through them. However, for example, it is possible that an attack on the route processor might comprise packets being forwarded to the route processor from different line cards, with these packets belonging to a same or different packet flow. By monitoring and identifying offending packet flows, the route processor can inform at least the line cards corresponding to these offending packet flows in order to adjust their corresponding admission control policies to combat such an attack, while typically allowing legitimate traffic to continue to flow at the desired rate to the route processor.
    Type: Application
    Filed: July 12, 2005
    Publication date: January 18, 2007
    Applicant: Cisco Technology, Inc., A California Corporation
    Inventors: John Bettink, David Ward, Jianyu Chen, Paul Mattes, Norbert Brotz
  • Publication number: 20070014275
    Abstract: Disclosed are, inter alia, methods, apparatus, data structures, computer-readable media, and mechanisms, for identifying admission control policies and enforcement of these admission control policies on packets destined for a route processor. A typical routing device includes: a route processor, a forwarding lookup mechanism for identifying packets destined for the route processor; a lookup mechanism for identifying admission control parameters for packets destined for the route processor; and an admission control enforcement mechanism for enforcing the identified admission control policy parameters for the packets.
    Type: Application
    Filed: July 12, 2005
    Publication date: January 18, 2007
    Applicant: Cisco Technology, Inc. A California Corporation
    Inventors: John Bettink, David Ward, Jianyu Chen, Paul Mattes, Norbert Brotz