Abstract: A router is configured for dynamically applying an address prefix value, during execution of a router command, based on retrieving the address prefix value for an address prefix identifier specified in the router command. For example, the router may generate au IP address, for use in executing a router command, based on detecting an address prefix identifier specified in the router command, retrieving a prefix value for the address prefix identifier, and adding the prefix value to an address suffix specified in the router command. Hence, the address prefix identifier in the router command enables global reconfiguration and renumbering of all commands specifying the address prefix identifier, merely by changing the prefix value associated with the address prefix identifier.
Abstract: A mobile handset transmits a radio frequency (RF) signal. The mobile handset determines when it is in close proximity to a Voice over Internet Protocol (VoIP) capable device. If the mobile handset is in close proximity to a VoIP capable device, then the RF signal to the base station is disabled and a communications link is established with the VoIP capable device such that a call can be made by the mobile handset and routed as VoIP packets through the VoIP capable device.
Type:
Grant
Filed:
September 20, 2006
Date of Patent:
May 4, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Larry Schessel, Sam Hague, Paul Norwood Booth, Jennifer Kay Walker
Abstract: A technique enables Traffic Engineering (TE) on paths between customer edge devices (CEs) across a provider network (“CE-CE paths”) in a computer network. According to the novel technique, TE is configured on a link from a sending provider edge device (PE) to a first CE (“PE-CE link”), e.g., a CE of one or more virtual private networks (VPNs). The sending PE conveys TE information of the PE-CE link to one or more receiving PEs in the provider network. Upon receiving the TE information, each receiving PE expands a TE database (TED) for information regarding the provider network (i.e., a “core TED”) to include TE-configured PE-CE links, e.g., by updating one or more corresponding VPN TEDs (VTEDs) for each VPN maintained by the receiving PE. Once the receiving PEs have the TE information for configured PE-CE links from the provider network, one or more TE techniques may be applied to paths from a second CE of the receiving PE to the first CE (a CE-CE path) to thereby facilitate, e.g.
Abstract: A system and method for a communication terminal to manage memory and maintain a current application version for multiple applications are provided. The system and method provide for managing memory in a communication terminal coupled to a server device enabling the communication terminal to provide memory capacity for storing in a memory and executing on the communication terminal a plurality of applications downloaded from the server device. Prior to downloading an application, the communication terminal determines an amount of memory capacity required by an application client to be downloaded from the server device. The communication terminal then attempts to allocate the memory capacity. If memory cannot be allocated from the system heap, the communication terminal purges data contained in the memory according to a dynamic list of priorities to create memory capacity in the memory for the application client.
Type:
Grant
Filed:
June 13, 2007
Date of Patent:
May 4, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Dean F. Jerding, Arturo A. Rodriquez, John M. Schlarb, Frank Domina
Abstract: According to one embodiment of the invention, a method includes determining, at a base station, at least one usability factor providing a relative measure of the desirability of receiving control of a mobile unit. The method also includes communicating, from a base station to a remote controller, the determined at least one usability factor for comparison to at least one usability factor of another base station as determined at the other base station and communicated to the remote controller. The method also includes taking control, by the base station, of the mobile unit in response to receiving a signal from a controller to take control of the mobile unit in response to comparison of the controller of the at least one usability factor determined by the base station and the at least one usability factor determined by the other base station.
Abstract: A VoIP device has at least one programmable button to enable the user to initiate a VoIP or SIP call to another device. The button can be programmed by the device user, the device manufacturer, and/or a VoIP service provider. The VoIP device does not have a dial pad, visual numbers display, or other certain standard features on a SIP phone. Thus, the VoIP device allows simplified dedicated communication. Numerous uses are possible, which result in advantages over conventional SIP phones.
Abstract: A method for preventing movement in a telepresence system, includes a plurality of cameras. Each camera has a respective field of vision for viewing one or more users. The fields of vision each have lateral boundaries. The system also includes a plurality of restrictive elements. Each restrictive element is positioned along a respective lateral boundary of a field of vision of the fields of vision of the plurality of cameras such that viewed users each positioned within a field of vision of the plurality of cameras are restricted by the plurality of restrictive elements from moving outside of the field of vision in which each viewed user is positioned.
Type:
Grant
Filed:
July 10, 2006
Date of Patent:
May 4, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Marthinus F. De Beer, Philip R. Graham, Randy K. Harrell, Ashok T. Desai, Philip E. Marechal, Andrew D. Grunes, Tark Abed, Martin Leugers, Joshua T. Druker, Feng Hao Yu, Peter H. J. How
Abstract: Methods and apparatus for processing a failure and a subsequent recovery in a ten Gigabit Ethernet (GE) optical transport network (OTN) wave division multiplexing (WDM) ring are disclosed. According to one aspect of the present invention, a device includes a plurality of ports, a sensing arrangement, and a processing arrangement. The ports include a first port that is initially configured to be in a forwarding state, and the sensing arrangement identifies whether the first port is facing or interfaced with a failure associated with the network ring. The processing arrangement being generates at least a first G.709 frame, and inserts at least one bit into the first G.709 frame that indicates that the failure associated with the network ring has been identified if the first port is facing a failure. The processing arrangement forwards the first G.709 frame through the second port.
Abstract: A technique is provided for graceful restart of a Border Gateway Protocol (BGP) router that uses a local store on the restarting router that stores prefixes on all routes or the “group best path” information on all BGP peers having a common Autonomous System (AS) number. This local store is used to run best path computations on the restarting router, rather than first awaiting receipt of route information from peers to speed the restart process. Updates are then transmitted to peers using the best path data and an end-of-Routing Information Base (RIB) message it transmitted by the restarting router to indicate that all information has now been sent by the restarting router. Thereafter the restarting router processes incoming updates from peers as received (or these peers routes are timed-out), remaining stale paths are deleted and any changed best paths, based upon the newly received updates, are then transmitted to peers.
Type:
Grant
Filed:
August 16, 2005
Date of Patent:
May 4, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
David D. Ward, John Galen Scudder, Pranav Mehta
Abstract: A remote survivable DHCP technique is described for facilitating communications between nodes of a computer network. According to a specific embodiment, the network include a remote survivable DHCP (RSD) system adapted to enable a DHCP relay agent to temporarily respond, during at least a portion of times when the DHCP server is down or unreachable, to DHCP-related requests from clients that have already received a valid DHCP lease offer from a DHCP server during at least a portion of times when the DHCP server is down or unreachable.
Abstract: Method and system for providing a dynamic network configuration and management based on defining and applying high level administrative intents including retrieving one or more attributes associated with one or more logical groups in a network, determining one or more network policies based on the one or more retrieved attributes, associating the one or more logical groups to a respective network group identifier, and generating a network group list associated with the one or more network group identifiers, is disclosed.
Type:
Grant
Filed:
September 5, 2006
Date of Patent:
May 4, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Robert Andrews, Navindra Yadav, Shree Murthy
Abstract: Several different spanning trees are calculated for a network. The network has several different ingress points via which packets can enter the network. Each of the spanning trees is associated with (at least) one of the ingress points, such that different spanning trees are associated with different ingress points. Packets that enter the network via a particular ingress point are forwarded through the network according to the spanning tree associated with that particular ingress point.
Abstract: A source endpoint connected via a Virtual Local Area Network to a first access port and a destination endpoint connected to a second access port. Two or more network processing devices indirectly connected through a backplane interconnect to transmit data between the source and destination endpoints according to a protected port status of the first and second access ports.
Abstract: A system and method automatically configures the interfaces of an intermediate network device. A discovery process operating at the device detects the identity or type of network entities actually coupled to the device's interfaces. Utilizing the identity or type of detected entities, a look-up is performed to obtain a configuration macro specially defined for each detected network entity. The retrieved configuration macros are executed and applied at the respective interfaces. During operation, the intermediate network device continues to monitor the identity and type of entities actually coupled to its interfaces. If a change is detected, such as an entity moving from a first to a second interface, the specially defined configuration macro for that entity floats from the first to the second interface where it is executed and applied.
Type:
Grant
Filed:
September 20, 2005
Date of Patent:
May 4, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Norman W. Finn, Jacob Jensen, John M. Schnizlein
Abstract: A management scheme compares a source address included in a received solicitation with an address for a registered endpoint. A communication including a management prefix is communicated to the endpoint when the source address matches the registered address.
Type:
Grant
Filed:
February 1, 2006
Date of Patent:
May 4, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Ciprian P. Popoviciu, Adeel Ahmed, Ralph E. Droms, Salman Asadullah, Madhu Sudan, Anthony L. Hain
Abstract: In one embodiment, egress provider edge devices (PEs) send advertisements to ingress PEs for address prefixes of a first multi-homed customer network that desires path diversity through a service provider network to a second customer network. A first ingress PE receives the advertisements, and determines whether a second ingress PE is multi-homed with the first ingress PE to the second customer network. If so, the first ingress PE computes a plurality of diverse paths within the service provider network from the first and second multi-homed ingress PEs to a corresponding egress PE. If a plurality of diverse paths exists, the first ingress PE employs one of those paths to establish a first tunnel from itself to a first egress PE, and the second ingress PE employs another of the paths to establish a second tunnel from itself to a second egress PE that is diverse from the first tunnel.
Abstract: A method and apparatus for detecting errors and improving quality in real-time data transmissions is provided. In one embodiment, the packet header checksum field is turned off to allow uninterrupted transmission of data packet payloads. A checksum added to each independent data segment in the datagram payload permits each data packet to be examined separately, resulting in improved transmission quality.
Abstract: A file system for nonvolatile memory media is disclosed, based on the assumptions that the file system structure is flat (i.e., does not contain directories), and that a relatively small amount of memory space is available. The nonvolatile memory medium is divided into logical blocks of predetermined size, depending on the typical file size expected for each particular implementation. Each of these logical blocks includes a header describing the contents of the block. For example, the block header may comprise a magic number indicating whether the block is a valid file system block or a free block, the name of the file to which the current block belongs, a flag indicating whether the current block is the first or last block of the file, the block number of the next block of the current file, if any, and the length of valid data in the present block.
Type:
Grant
Filed:
July 2, 2003
Date of Patent:
May 4, 2010
Assignee:
Cisco Technology, Inc.
Inventors:
Robert Charles Monsen, Sudhakar Mamillaplli
Abstract: An apparatus for providing link layer security in a Physical Layer Transceiver (PHY) is disclosed. In one embodiment, the apparatus may comprise analog circuitry configured to interface with a data transmission medium, digital circuitry configured to interface with a Media Access Controller (MAC); and a crypto engine coupled to the digital circuitry. Single interface and multiple interface schemes are provided to control both PHY and crypto functions. Embodiments are disclosed where the PHY controls the crypto device, and where the crypto device controls the PHY.
Abstract: Methods and apparatus are disclosed for dynamically allocating bandwidth to a plurality of client devices coupled over a network to a physical layer device (PHY). The PHY is preferably configured to utilize a connection criteria, such as bandwidth requirement for the client devices, to negotiate and connect the devices to a host device in a desired order.