Abstract: A system and method for implementing a Quality of Service (QoS) fallback using Resource Reservation Protocol (RSVP) includes initiating a communication session with a QoS precondition between a first domain and a second domain. It is determined whether the second domain supports the QoS precondition. Intra-domain RSVP is established in the first domain if the second domain does not support the QoS precondition.
Type:
Grant
Filed:
March 29, 2007
Date of Patent:
June 8, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Jeffrey A. Hewett, Subhasri Dhesikan, John K. Restrick, Jr., Martin W. Wu
Abstract: Systems, methods, devices and techniques can be used in networks including resilient packet ring networks and other types of ring topology networks to accelerate the learning of bridge/client mapping information. Once certain bridge/client mapping information is learned, and indicator can be set to cause subsequent transmissions to particular clients to be flooded to all stations on a ring network instead of being transmitted directly to the target station. Additionally, forced flooding can be triggered at regular or irregular intervals to further enhance the learning process.
Abstract: Disclosed are methods and apparatus for handling data sent from a first public network to a second or same public network via a private network. In general terms, network translation address mechanisms are provided within the edge routers of the private network. When a first processing node sends a request to an edge router to access another processing node which resides in a public network, the edge router forms a binding based on two addresses associated with the first processing node. A first private address is initially associated with the first processing node, and the first processing node uses this private address to communicate with the private network. A second public address is also allocated to the first processing node based on the first processing node's request to communicate with a public node. The first processing node uses the allocated second public address to communicate with the requested public node.
Type:
Grant
Filed:
July 10, 2007
Date of Patent:
June 8, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Mahadev Somasundaram, Siva S. Jayasenan, Mark A. Denny
Abstract: Apparatus for providing cable-management comprising at least one bracket having a support member and a plurality of extensions protruding from the support member, where at least one pair of adjacent extensions define at least one receptacle. At least one cable holder is removably inserted into the at least one receptacle.
Abstract: Nodes in an Internet Protocol (IP) network receive probe packets configured to travel over particular IP media paths. The probe packets cause the network nodes to send media path reports to a logging system. The media path reports contain information identifying the different nodes in the media path. The logging system can reconstruct the network topology of a particular media path from the media path reports which can then be used for debugging purposes. In one embodiment the probe packets are Resource Reservation Setup Protocol (RSVP) packets configured for media path probing.
Type:
Grant
Filed:
June 8, 2004
Date of Patent:
June 8, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Cullen Jennings, David R. Oran, Shiva J. Shankar, Vishal Kumar Singh
Abstract: A method for suppressing data is provided that includes receiving a first packet communicated by an end user and identifying a difference in a comfort noise level associated with a second packet received as compared to the first packet. The second packet may be communicated without a data payload in cases where the difference in comfort noise level associated with the second packet as compared to the first packet is below a predetermined threshold.
Type:
Grant
Filed:
December 10, 2003
Date of Patent:
June 8, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Alain Charles Brainos, II, Mohammad A. Ahmed-Khan, Malcolm M. Smith
Abstract: Methods and devices are provided for controlling congestion in a network such as a Fibre Channel network. According to some implementations, a node within a network fabric detects congestion caused by an edge device outside of the fabric and notifies the edge device of the congestion. The edge device applies a congestion reaction mechanism in response to the notification. In some implementations, the congestion reaction mechanism is applied on a per-exchange basis, in order to mitigate congestion caused by a particular operation.
Type:
Grant
Filed:
February 11, 2004
Date of Patent:
June 8, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Davide Bergamasco, Claudio De Santi, Robert L. Hoffmann
Abstract: A system for device registration replication in a packet-based network includes a first call manager and a second call manager that are coupled to the packet-based network. The first and second call managers each control one or more devices and store composite registration information associated with the devices. The first call manager communicates status information to the second call manager in response to a change in the control status of a device controlled by the first call manager. The second call manager updates the composite registration information stored by the second call manager in response to receiving status information from the first call manager.
Abstract: A universal serial bus (USB) remote host control driver includes a connection to a local network, a network protocol stack and a memory for storing network addresses of USB device adapters and USB devices on the network. A USB device adapter has one or more USB ports, a network connection, a network address, and a network protocol stack. Together, the USB remote host control driver and the USB device adapter enable interaction between a network computer and peripheral USB devices on the network.
Type:
Grant
Filed:
July 19, 2000
Date of Patent:
June 8, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Brian Lo Bue, Darrell Shively, Larry Nadeau, Thomas A. Roden
Abstract: A method and system for call admission and preemption in a network having an ingress node and an egress node defining an ingress/egress node pair, and one or more core nodes located in a path between the ingress node and the egress node and configured to mark packets exceeding an admission threshold. The method includes calculating a sustainable preemption rate based on a rate of traffic received at the egress node from the ingress node that passed through the one or more core nodes without being marked, and a ratio between a preemption threshold and the admission threshold. If a traffic load to the egress node is greater than the sustainable preemption rate, at least some traffic is dropped so that the traffic load does not exceed the sustainable preemption rate for the ingress/egress node pair.
Abstract: A layer-2 virtual-private-network (L2-VPN) service with automatic discovery and connection establishment is provided within a wide-area, multiple-autonomous-system (AS) network according to one of two approaches. In the first approach, inter-AS tunnels are used to connect pairs of provider edge (PE) routers of different ASes, and the PE routers then establish signaling connections to each other which are used to create pseudowires that implement the layer-2 connectivity. A second approach utilizes so-called “pseudowire switching” in which separate pseudowires are created within each AS and between ASes, and then the separate pseudowires are stitched together to form end-to-end connections. The first approach has the benefit of transparent operation provided by the tunnel, while the second approach requires fewer inter-AS signaling connections.
Type:
Grant
Filed:
August 31, 2005
Date of Patent:
June 8, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Bruce S. Davie, Luca Martini, Eric C Rosen
Abstract: A system is disclosed as including a power supply, a secondary capacitive storage device connected to the power supply, and multiple network devices powered by the power supply. The system further includes a designated device for transmitting a power loss condition over a network, where upon detection of an imminent interruption of power from the power supply the secondary capacitive storage device exclusively powers the designated device during transmission of the power loss condition, and the multiple network devices are intentionally powered off.
Abstract: A method for detecting within a networked computer a target vulnerability such as a Trojan Horse residing therein is disclosed, wherein the vulnerability is characterized by a signature response to an encrypted query. The method includes encrypting a plurality of query data packets in accordance with a plurality of encryption keys, each encrypted query data packet including a defined query field specific to the target vulnerability. The method further includes storing the plurality of encrypted query data packets in a memory. The method further includes thereafter scanning the networked computer for a target vulnerability residing within the networked computer by sending successive ones of the encrypted-and-stored query data packets to the host computer and analyzing responses thereto from the host computer with respect to the characteristic signature. Preferably, the encrypting is performed for substantially all of the encryption keys within a defined key space.
Abstract: Optical transceiver modules with multiple channel connection with connectors on a motherboard of a line card for network devices, such as a switch, router, crossconnect and the like, are presented. The modules have staggered electronic boards which can engage the connectors which are laterally displaced on the motherboard. The connectors are also arranged so that one of them can engage an optical transceiver module in an SFP connection so that the motherboard connectors are compatible with multiple channel and single channel (SFP) connections.
Abstract: A method for monitoring information in a network environment is provided that includes receiving one or more packets from a communication flow initiated by an end user. The information associated with the communication flow is then selectively communicated to a plurality of client-aware network elements.
Type:
Grant
Filed:
July 3, 2006
Date of Patent:
June 8, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Thomas R Bakita, Chris O'Rourke, Dwight R Frye, Frank W Pittenger, John G White, Keith R Schomburg, Robert A Mackie, Walter G Dixon
Abstract: An automatic retransmission system offering good latency and overhead characteristics combined with programmable tradeoffs among overhead, latency, and error performance. ARQ (Automatic Repeat reQuest) blocks present at both ends of a link coordinate to automatically attempt to re-send data if that data was not received properly the first time it was sent. Re-transmission from the transmitter (transmitter) is requested by the receiver (Receiver) via a highly reliable “Repeat Request” (RR) mechanism. This RR scheme carries sufficient information back to the transmitter for it to determine which previous transmissions need to be re-sent.
Type:
Grant
Filed:
March 31, 2008
Date of Patent:
June 8, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Vincent K. Jones, Gregory G. Raleigh, David P. Bokaie, Joseph Middleton, Ali Raissinia
Abstract: A method and system for linking a web page to a portion of a video is provided. Users can enter comments into a video that include a start and end time index for identifying a portion of a video. Comments are indexed to the media presentations such that they may be searched and located, thus media playback can be executed from any comment. The system allocates a unique comment track to each user that can be turned on and off at will by users during playback.
Type:
Grant
Filed:
March 27, 2007
Date of Patent:
June 8, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Michael Lanza, Naicu Octavian, Michael Rutchik
Abstract: A graph based on a data traffic matrix represents the occupancy of a set of virtual output queues to an optical crosspoint packet data switch. Edges in the graph are assigned to a matching in order of decreasing weight, provided that the edges do not conflict with other edges previously placed in the matching. If a conflict is found for a particular edge, a new matching is created and the conflicting edge is placed in the new matching. The process iterates until all edges are covered, resulting in creating a collection of matchings. The collection of matchings is transformed into a schedule such that each matching defines a switch configuration and the weight of the heaviest edge determines its holding time. The length of the obtained schedule equals the total cost of the collection. The cost of the collection is the total weight of the matchings plus the product of the re-configuration delay and the number of matchings.
Abstract: A method for processing data includes generating one or more binary results based on one or more inputs and receiving one or more of the binary results. One or more conditional carryout signals may then be generated based on one or more of the binary results. The method also includes communicating one or more of the conditional carryout signals via one or more propagate cells. One or more carryout signals may be generated and received. A sum may then be generated based on the received carryout signals, the sum being communicated to a next destination.
Abstract: In one embodiment, a first network device receives a control message in a first protocol from a client, the control message in the first protocol being addressed to a second network device. The first network device identifies an existing connection in a second protocol that is associated with the second network device. The first network device establishes a connection in the first protocol with the client according to a status of the existing connection in the second protocol that is associated with the second network device.
Type:
Grant
Filed:
June 12, 2007
Date of Patent:
June 8, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Rohini Kasturi, Alpesh S. Patel, Sravan Vadlakonda, Kenneth Durazzo