Patents Assigned to Cisco Technology
-
Publication number: 20140211632Abstract: In one embodiment, a node in a communication network receives a label switched path (LSP) request and in response, the node determines at least two equal cost paths, each path having one or more path-nodes. The node may then further determine a total bandwidth-based transition value for each path of the at least two equal cost paths and selects the path having a lower total transition value. Once selected, the node may establish the requested LSP over the selected path.Type: ApplicationFiled: January 30, 2013Publication date: July 31, 2014Applicant: Cisco Technology, Inc.Inventors: Tarek Saad, Sherif Saeed Awad, Zafar Ali, Michel Taillon
-
Publication number: 20140211793Abstract: An example method for increasing multi-destination scale in a network environment is provided and includes receiving a packet at a pair of switches comprising a first switch and a second switch in a network environment, where the first switch is configured as an elected forwarder, and the second switch is configured as a standby forwarder. A fabric extender (FEX) is connected to the first switch and the second switch with a virtual PortChannel. The method further includes forwarding the packet to a host connected to the FEX. The elected forwarder is configured with substantially all multi-destination virtual interfaces (VIFs) on the FEX in a forwarding table. The standby forwarder forwards the packet to the elected forwarder. In specific embodiments, the elected forwarder programs the FEX with the VIFs.Type: ApplicationFiled: January 31, 2013Publication date: July 31, 2014Applicant: CISCO TECHNOLOGY, INC.Inventors: Bhuvan Mital, Rajagopal Subramaniyan, Narasimhan Gomatam Mandeyam
-
Publication number: 20140211616Abstract: Data flow mobility to a user equipment may be provided. An access routing rule may be received at the user equipment. The access routing rule may include a plurality of packet filters and at least one target access corresponding to each of the plurality of packet filters. A first data packet to be routed may be received at the user equipment. A first packet filter associated with the first data packet may be determined. A first target access corresponding to the first packet filter may be determined from the access routing rule. The first data packet may be routed through the first target access.Type: ApplicationFiled: October 12, 2013Publication date: July 31, 2014Applicant: Cisco Technology, Inc.Inventors: Nirav Kirtikumar Salot, Rajeev Koodli, Maulik Vijay Vaidya, Aeneas Dodd-Noble
-
Publication number: 20140215580Abstract: In one implementation, security configuration is automated based on information gathered using autonomic neighbor discovery. The neighbor discovery establishes a realm of trust between neighbors, such as determining that some neighbors may be trusted and others may not be trusted. A dynamic security barrier is created using the trust where devices on the network border protect the entire network. Differences in trust result in differential security configuration.Type: ApplicationFiled: January 25, 2013Publication date: July 31, 2014Applicant: CISCO TECHNOLOGY, INC.Inventors: Michael Behringer, Yves Hertoghs, Bruno Klauser, Steinthor Bjarnason
-
Publication number: 20140214402Abstract: A method is provided in one example embodiment and includes extracting sentences from data, which comprises a speech transcript; tokenizing the plurality of sentences to develop for each of the plurality of sentences a sentence vector and at least one feature vector; and performing topic segmentation on the speech transcript using the sentence vectors and feature vectors, the topic segmentation resulting in a listing of segments corresponding to the speech transcript. In certain embodiments, the feature vector may be at least one of a cue word feature vector, a speaker change feature vector, and a scene change feature vector.Type: ApplicationFiled: January 25, 2013Publication date: July 31, 2014Applicant: CISCO TECHNOLOGY, INC.Inventors: Qian Diao, Venkata Ramana Rao Gadde
-
Publication number: 20140215091Abstract: In one embodiment, methods are described for recovering lost customer premises equipment (CPE) information on a cable modem termination system (CMTS) in the presence of only Dynamic Host Control Protocol Version 6 (DHCPv6) CONFIRM. A CMTS purges routing information for an Internet Protocol Version 6 (IPv6) node, such as a CPE router, in response to detecting an interface reset for the IPv6 node. IPv6 addresses and prefixes information for the IPv6 node is gleaned from a DHCPv6 CONFIRM message received from the IPv6 node. By sending portions of the IPv6 addresses and prefixes information within a DHCPv6 LEASEQUERY message, a DHCPv6 CONFIRM message with an embedded DHCPv6 LEASEQUERY message, or a DHCPv6 CONFIRM message with an Interface-ID option, a reply message can be received that contains the purged routing information for the IPv6 node.Type: ApplicationFiled: January 31, 2013Publication date: July 31, 2014Applicant: CISCO TECHNOLOGY, INC.Inventors: Hemant Singh, William Beebee, Madhu Sudan, Bernard E. Volz, Chad Mikkelson
-
Publication number: 20140215051Abstract: A method is provided in one example embodiment and includes receiving a request for content from a source in a network; determining a geographic service region for the source; determining a status of a plurality of content delivery networks in the service region. The status is indicative of at least whether each of the plurality of content delivery networks is active or impaired. The method can also include selecting a particular one of the content delivery networks having a corresponding status as active to service the request for content.Type: ApplicationFiled: January 30, 2013Publication date: July 31, 2014Applicant: CISCO TECHNOLOGY, INC.Inventors: John A. Schlack, Qin Zang
-
Publication number: 20140215491Abstract: A system includes an on-board unit (OBU) in communication with an internal subsystem in a vehicle on at least one Ethernet network and a node on a wireless network. A method in one embodiment includes receiving a message on the Ethernet network in the vehicle, encapsulating the message to facilitate translation to Ethernet protocol if the message is not in Ethernet protocol, and transmitting the message in Ethernet protocol to its destination. Certain embodiments include optimizing data transmission over the wireless network using redundancy caches, dictionaries, object contexts databases, speech templates and protocol header templates, and cross layer optimization of data flow from a receiver to a sender over a TCP connection. Certain embodiments also include dynamically identifying and selecting an operating frequency with least interference for data transmission over the wireless network.Type: ApplicationFiled: April 1, 2014Publication date: July 31, 2014Applicant: CISCO TECHNOLOGY, INC.Inventors: Sateesh K. Addepalli, Ashok K. Moghe, Flavio Bonomi, Marc Jean-Philippe Girardot, Vijaynarayanan Subramanian, Lillian Lei Dai, Rong Pan, Preethi Natarajan, Xiaoqing Zhu, Pascal Thubert, Chiu Ngok Eric Wong
-
Publication number: 20140211681Abstract: A method is provided in one example and can include receiving a source data stream, generating a base layer sub-stream from the source data stream, and generating an enhancement layer sub-stream from the source data stream. The method further includes communicating the base layer sub-stream to a client device using a first communication protocol, and communicating the enhancement layer sub-stream to the client device using a second communication protocol. In a particular example, the one-to-many communication protocol is a multicast communication protocol and the second communication protocol is a unicast communication protocol. In another example, the base layer sub-stream is sent to the client device via a first network connection and the enhancement layer sub-stream is sent to the client device via a second network connection.Type: ApplicationFiled: January 25, 2013Publication date: July 31, 2014Applicant: CISCO TECHNOLOGY, INC.Inventors: Douglas S. Chan, Xiaoqing Zhu, Flavio Bonomi
-
Publication number: 20140215216Abstract: In one embodiment, apparatus and methods for a rekey process are disclosed. In certain rekey embodiments, when a key-generation protocol exchange is executed, instead of generating a single new security relationship, such as a Security Association or SA, a multiple set (e.g., 10) of new security relationships (e.g., SAs) are generated. An authorized device can then individually use these security relationships (e.g., SAs) as needed to securely communicate with each other. For example, a set of SAs can be efficiently programmed into an 802.1ae protocol ASIC for handling transmitted and received data packets. In the description herein, embodiments of the invention are described with respect to SA's, and this “SA” term is generally defined as any type of security relation that can be formed to allow a particular node to securely transmit packets or frames to another receiving node.Type: ApplicationFiled: March 30, 2014Publication date: July 31, 2014Applicant: Cisco Technology, Inc.Inventor: Chandan Mishra
-
Publication number: 20140215028Abstract: In one implementation, a protocol for dissemination of information, such as configuration information, in a computer network is provided. The dissemination of the payload or content is separated from the dissemination of the fact that a new revision of that payload or content exists. The availability of a new revision of the payload or content is signaled prior to the transfer. Only nodes receiving the notice of existence of the new revision and requesting the new revision receive the payload or content. While the payload or content revision notifications potentially arrive at a receiving node from many different neighbors, the payload or content is only requested once by the receiving node and transmitted once over links between neighbors. This scheme may result in low end-to-end delays and in resiliency.Type: ApplicationFiled: January 25, 2013Publication date: July 31, 2014Applicant: CISCO TECHNOLOGY, INC.Inventors: Paul Donner, Alexander Clemm
-
Publication number: 20140211651Abstract: In one embodiment, a router selects a particular peer from an original update group used with an Exterior Gateway Protocol (EGP) such as Border Gateway Protocol (BGP). The original update group includes a plurality of peers of the router that share a same outbound policy and that receive common update messages, from the router, of routing table information. The router determines that the particular peer is a potential slow peer based on a first type of indicia, wherein a slow peer is a peer that cannot keep up with a rate at which the router generates update messages over a prolonged period of time. The router confirms that one or more second types of indicia are consistent with the particular peer being a slow peer. In response to the confirmation, the router determines that the particular peer is a slow peer.Type: ApplicationFiled: March 31, 2014Publication date: July 31, 2014Applicant: Cisco Technology, Inc.Inventors: Balaji Pitta Venkatachalapathy, Isidor Kouvelas, Keyur P. Patel, Anantha Ramaiah
-
Publication number: 20140215085Abstract: A method is provided in one example embodiment and includes receiving media data at an adaptive streaming client; updating an estimated available bandwidth associated with a media stream associated with the media data; filtering the estimated available bandwidth; mapping the filtered estimated available bandwidth to a media bitrate for the media stream; and updating a target segment delay that is to control time intervals between consecutive segment downloads of the media stream.Type: ApplicationFiled: January 25, 2013Publication date: July 31, 2014Applicant: CISCO TECHNOLOGY, INC.Inventors: Zhi Li, Xiaoqing Zhu, Rong Pan, Joshua B. Gahm, Ali C. Begen, David R. Oran
-
Publication number: 20140211641Abstract: In one embodiment, a first routing device establishes a virtual channel with a remote routing device in a G.8032 protocol Ethernet network ring. The first routing device and the remote routing device each being linked to a multi-homed routing device having Layer 2 connectivity to a core network. The multi-homed routing device is not configured with the G.8032 protocol. The first routing device identifies a link state from the first routing device to the multi-homed routing device. Layer 2 connectivity of the first routing device to the core network is controlled based upon the identified link state of the first routing device.Type: ApplicationFiled: January 29, 2013Publication date: July 31, 2014Applicant: Cisco Technology, Inc.Inventors: Pravin Gohite, Samer Salam
-
Publication number: 20140211629Abstract: A system and method for advertising out-of-resources (OOR) conditions for entities, such as nodes, line cards and data links, in a manner that does not involve using a maximum cost to indicate the entity is “out-of-resources.” According to the technique, an OOR condition for an entity is advertised in one or more type-length-value (TLV) objects contained in an advertisement message. The advertisement message is flooded to nodes on a data network to inform them of the entity's OOR condition. Head-end nodes that process the advertisement message may use information contained in the TLV object to determine a path for a new label switched path (LSP) that does not include the entity associated with the OOR condition.Type: ApplicationFiled: March 28, 2014Publication date: July 31, 2014Applicant: Cisco Technology, Inc.Inventors: Sami Boutros, Muthurajah Sivabalan, David D. Ward, Stefano B. Previdi, Jean-Philippe Vasseur, Rodolphe Figaro, Reshad A. Rahman
-
Publication number: 20140214914Abstract: A method is provided in one example and includes receiving data from a network element, determining a candidate data processing task for the received data based upon a first similarity metric between the received data and data currently associated with the candidate data processing task, and sending the received data to the candidate data processing task.Type: ApplicationFiled: January 25, 2013Publication date: July 31, 2014Applicant: Cisco Technology, Inc.Inventors: Arun C. Alex, Rajesh P. Velandy, Pradeep K. Dakshayani Raghavan, Xiangfu Chen, Vijay Gaur, Wenxing Zheng
-
Patent number: 8793312Abstract: Techniques are provided herein for obtaining network usage information about a plurality of users, analyzing the network usage information to detect a plurality of subjects and determine a set of relationship scores describing the strength of the relationship between users and subjects, and analyzing the sets of relationship scores to detect a plurality of virtual communities formed among the users. The virtual communities are used to detect subjects to recommend to members of the virtual communities, such as topics or content items that other users of the community have found of interest.Type: GrantFiled: May 20, 2011Date of Patent: July 29, 2014Assignee: Cisco Technology, Inc.Inventors: Yicheng Tao, Stephen Daniel Bochinski, Sonali Mihir Sambhus
-
Patent number: 8791788Abstract: A method and system for fingerprinting a content item is described, the content item including a set of content item elements E, providing information uniquely associated with a single user including a string of bits S0, parsing S0 into a plurality of substrings which are functions of S0, providing a matrix of content item replacement elements, each row of which includes, for each member of E, an array of content item replacement elements for Ei, uniquely associating each substring of S0 so that for every substring there exists a corresponding element of E, for every substring, replacing at least one instance of the corresponding element E in the content item with one substitute matrix element for the corresponding substring, and outputting a replacement content item including the result of the replacing, the substitute matrix elements being chosen according to at least one similarity criterion.Type: GrantFiled: June 21, 2010Date of Patent: July 29, 2014Assignee: Cisco Technology Inc.Inventors: Arnold Zucker, Perry Smith, Yossi Tsuria, Harel Cain, Hillel Solow, Steve Epstein, Shabtai Atlow
-
Patent number: 8792502Abstract: Various systems and methods for detecting media access control (MAC) address conflicts are described herein. An indication to create a virtual machine on the host device is received at a host device of a plurality of host devices. A MAC address to assign to the virtual machine is identified, and a message is transmitted to at least one of the plurality of host devices, with the message including the identified MAC address. The MAC address is assigned to the virtual machine in the absence of a response from the at least one of the plurality of host devices indicating a potential conflict with the MAC address.Type: GrantFiled: August 7, 2012Date of Patent: July 29, 2014Assignee: Cisco Technology, Inc.Inventors: Supriya Rajamanickam, Sudarshana Kandachar Sridhara Rao, Rajasekhar Manam
-
Patent number: 8792384Abstract: A method is provided in one example embodiment and includes establishing a communication pathway between a first network node and a second network node coupled to a network; forming an adjacency to a new network node coupled to the network, where a designated intermediate system (DIS) election operation is executed after the adjacency is formed in order to determine that the new network node is a newly identified DIS for the network; and communicating a message advertising connectivity to both a previously identified DIS and the newly identified DIS, where the message is communicated during a specified time interval.Type: GrantFiled: February 22, 2011Date of Patent: July 29, 2014Assignee: Cisco Technology, Inc.Inventors: Ayan Banerjee, Veena Raghavan, Abhay Roy