Abstract: Systems, methods, apparatus and software can be implemented to provide a debugger agent, either separate form or integrated into the script-based testing platform, to coordinate the selection, activation, and or/operation of debuggers suitable for a particular unit and program under test. Such a debugger agent can provide run time monitoring and debugging activities where previously not possible. The debugger agent is generally independent agent, in that it can work with a variety of types of test scripts, test script handlers, programming languages, and debuggers without customization. Moreover, implementation generally needs no code instrumentation.
Abstract: A virtual private network device enables individual machines at a remote subnet to be visible and addressable from a central site by establishing a private address range for the remote machines, forming a virtual private network tunnel from the virtual private network device to the central site, and communicating the private address range to the central site to enable connections from the central site to individual machines on the remote subnet.
Type:
Grant
Filed:
September 15, 2008
Date of Patent:
May 18, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
John Bazzinotti, Peter Davis, Victor Volpe, Rashmi Pitre, Keith Mader
Abstract: Various embodiments are disclosed relating to the identification of virtual private network (VPN) topologies. In an example embodiment, a plurality of edge routers associated with a network may be discovered, each edge router including one or more virtual routing and forwarding entities (VRFs). One or more route targets (RTs) associated with each of the VRFs may be determined, wherein corresponding RTs between two or more VRFs are associated with connectivity between the two or more VRFs via the network. The VRFs may be sorted into one or more groups based upon the corresponding RTs of the VRFs. A representative VRF (rVRF) may be identified for each of the one or more groups of VRFs. The rVRFs may be sorted into one or more VPNs and a topology for each VPN may be determined.
Abstract: A system detects an application attempting to invoke an administrative utility on a target application for installation of software. In response, the system identifies the administrative utility as an installer launcher. The system then detects the installer launcher invoking execution of the target application, and in response, identifies the target application as an installation application. The system allows classification of applications as installer launchers and installation applications and in response to detecting operation of such programs, enforces installation security profiles during their operations that apply varying levels of access to certain system resources that differ from a level of access normally applied during non-installation activities.
Type:
Grant
Filed:
July 1, 2005
Date of Patent:
May 18, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Mikhail Cherepov, Richard C. Gorton, Jr.
Abstract: In one embodiment a switch has active and standby LAYER 2 switch interfaces coupled, respectively, to device interfaces of first and second LAYER 2/LAYER 3 network devices. The active switch interface is configured to forward all egress traffic and accept all ingress traffic and the standby switch interface is configured to forward only IGMP messages and configured to block all ingress traffic.
Abstract: A system for providing a tree topology for a network having an interior gateway protocol. A first router receives a hello message from all connected routers in the network. The hello messages include tree topology information. The first router then uses the tree topology information to determine a parent of the router. The first router then establishes connections with directly connected routers at the same level in the tree topology. The first router also generates link messages that include all of the prefixes for children of the first router and broadcasts the link messages.
Type:
Grant
Filed:
September 29, 2006
Date of Patent:
May 18, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Vincent Ribiere, Abhay Roy, Pascal Thubert, Patrick Wetterwald
Abstract: A first router is configured for monitoring prescribed attributes of an active path connected to the first router, and supplying an update message to a second router, according to a prescribed routing protocol such as Enhanced Interior Gateway Routing Protocol (EIGRP), that specifies a detected change by the first router in at least one of the prescribed attributes of the connected active path. Hence, the second router, in response to receiving the update message, can update an internal topology table based on the detected change in the active path connected to the first router, and selectively adjust an internal routing table based on the detected change relative to queuing policies for prescribed data flows.
Type:
Grant
Filed:
March 2, 2004
Date of Patent:
May 18, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Donnie Van Savage, Donald Earl Slice, Jr., Roy Michael Brooks, Matthew Henry Birkner
Abstract: In one embodiment, a method includes detecting, by an automated program, an attempt by a recipient of an email addressed to a plurality of addressees that includes the recipient to send a reply-all email. The automated program rejecting the reply-all email based on a pre-set policy rule that limits a number of reply-all email in a thread. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure.
Type:
Grant
Filed:
February 27, 2007
Date of Patent:
May 18, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Joseph F. Khouri, Laurent Philonenko, Mukul Jain
Abstract: In one embodiment, a gateway for a constant delay network identifies a baseband clock that is synchronized by exchanging synchronization messages over a packet switched network. The gateway then generates a strobe by manipulating the identified baseband clock using a custom multiplier that is selected according to transmission variables. The gateway then signals a front end component to process fixed length packets for transfer to a back end component according to the generated strobe, which can reduce or eliminate buffering by the back end component and can improve cable modem operation.
Type:
Grant
Filed:
May 22, 2008
Date of Patent:
May 18, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Michael Healy, Yuen-Wen Lee, Yihuan Sun
Abstract: A hybrid cable modem includes wideband circuitry configured to receive data over multiple different downstream channels at the same time. The wideband circuitry demodulates signals on the different downstream channels and then formats the demodulated signals back into packets or frames for sending out over an Internet Protocol (IP) home network. Narrowband cable modem circuitry is coupled to the wideband circuitry and selectively extracts Data Over Cable Service Interface Specifications (DOCSIS) data from one of the multiple downstream channels being processed by the wideband circuitry.
Type:
Grant
Filed:
May 20, 2005
Date of Patent:
May 18, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
John T. Chapman, David B. Fox, Albert A. Slane
Abstract: A source-synchronous parallel interface divides a wide data bus into clock-groups including a sub-group of the data lines and a clock line carrying a copy of the transmit clock. The traces in a clock-group are located physically close together to minimize skew between the signals carried on the traces of the clock-group. Deskew logic on the receiver compensates for skew between received clock-group signals.
Type:
Grant
Filed:
November 15, 2004
Date of Patent:
May 18, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Dipankar Bhattacharya, Bangalore Priyadarshan, Jaushin Lee, François Gautier-Le Boulch
Abstract: A system for determining reachablity of a neighboring node from a node. A packet is received over a network by node. The packet has a destination address of a node other than the receiving node. The node reads a source address from the packet. The node then determines whether the source address is for a neighboring node in which the node has an interest. The node then determines whether the packet indicates a forward link from the node to the neighboring node. Reachablity information for the neighboring node is then stored in a memory responsive to a determination of the forward link.
Abstract: The present invention facilitates security maintenance in a communication network. Present invention embodiments adjust power level and/or communication permission based upon designated parameters. The designated parameters can include time indications, days of the week, failed access attempts, source and destination indications and/or information content indications. For example, a present invention system and method can reduce and/or turn off power to a wireless communication port during designated intervals (e.g., during non standard work hours) and prevent unauthorized access via the wireless communication port.
Abstract: Programmable network intelligence approaches as disclosed herein provide apparatus, methods and tools to achieve programmable interfaces to a device, or group of devices or a network where native programmable interfaces are not available.
Abstract: A method and apparatus for including network security information in a frame is disclosed. Network security information is included in a secure portion of overhead of a frame. The network security information is configured to facilitate network security. A network device configured to process a frame is also disclosed. The frame includes frame security information and network security information. The frame security information is configured to facilitate securing a portion of overhead of the frame, and the network security information is located in the secure portion of the overhead of the frame and is configured to facilitate network security.
Abstract: An apparatus has at least one processing unit to generate a request having a request privilege level. At least one resource exists in the apparatus to receive the request and determine if the request is allowable. The apparatus includes an error handler that determines the nature of an error and performs a reset based upon the privilege level of the request that cause the error.
Type:
Grant
Filed:
August 30, 2005
Date of Patent:
May 18, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
James A. Markevitch, Earl T. Cohen, John A. Fingerhut, Johannes M. Hoerler
Abstract: Systems and methods for stream processing message data relating to a web service application are described. One system has an input pipe for receiving multiple interrelated session based messages according to an order with which they originate. A processor processes an accumulation of the messages upon reaching a trigger point related to grammar characterizing the messages.
Abstract: A network packet is encapsulated and has at least one field in the header of the encapsulation. A multicast delivery tree is written into a field of the encapsulating header. A method for operating a router to use the multicast delivery tree encapsulated in the header of the network packet has the following steps. The router receives a packet from a computer network, the packet having an encapsulated field. The router then reads a multicast delivery tree from the encapsulated field, the multicast delivery tree having a route to each of a plurality of destination stations. Then, the router forwards the packet to an address selected in response to the multicast delivery tree.
Type:
Grant
Filed:
January 27, 2006
Date of Patent:
May 18, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Dino Farinacci, Joel Bion, Alex Tweedly, Mike Shand
Abstract: Methods, systems and apparatus for suppressing redundancy in data transmission over networks are provided. Data segments are transmitted from a transmitting DPU to a receiving DPU. Initially, only signatures of the transmitted data segments are stored in a cache at the transmitting DPU. A data segment is stored in the cache only if it satisfies a redundancy-suppressing admission policy. Such a data segment is referred to as a redundant data segment. The redundant data segment is also stored in a cache at the receiving DPU. The transmitting DPU transmits the signatures of the redundant data segments to the receiving DPU, which then extracts the redundant data segments from its cache. Therefore, transmission of the redundant data segments is suppressed.