Abstract: A circuit board is provided which includes a plurality of signal pairs of connectors. The signal pairs of connectors are disposed in a triangular grouping of three signal pairs of connectors such that a first connector of each signal pair is located at a vertex of the triangular grouping. A second connector of each signal pair is located at a side of the triangular grouping adjacent to the vertex of the first connector. The signal pairs may be differential pairs.
Abstract: Techniques are provided for dynamically adapting the view from a conference endpoint that includes a presentation apparatus, such as a whiteboard. A first signal is received that includes a video signal derived from a video camera that is viewing a room during a conference session in which a person is presenting information on a presentation apparatus. During the video conference, switching is performed between the first signal and a second signal representing content being displayed on the presentation apparatus during the conference session for output and transmission to other conference endpoints of the conference session. The determination as to whether to supply the first signal (for a normal view of the conference room) or the second signal may be based on a position determination of the presenter or may be instead be based on an external view selection command received from another conference endpoint participating in the conference session.
Abstract: A fast channel change (FFC) system including a tuner arrangement to receive at least one transport stream including an aggregated video service (AVS) and TV channels, each video frame of the AVS including some video data of each channel, a demultiplexer arrangement to demultiplex a first channel and the AVS, a FCC buffer to buffer the video frames of the AVS, a decoder arrangement to decode the first channel, a controller to instruct the decoder arrangement to switch from decoding the first channel to decoding the AVS from the FCC buffer, and a graphic engine to extract the video data of a second channel from the AVS yielding a full-screen video, and output the full-screen video to a display device, wherein the controller is operative to instruct the decoder arrangement to switch from decoding the AVS to decoding the second channel. Related apparatus and methods are also described.
Abstract: In one embodiment, once activation of use of a backup tunnel is detected for a primary tunnel, then a level of congestion of the path of the backup tunnel may be determined. In response to the level being greater than a threshold, a head-end node of the primary tunnel is triggered to reroute the primary tunnel (e.g., requesting to a path computation element). Conversely, in response to the level not being greater than the threshold, the backup tunnel is allowed to remain activated.
Abstract: In one embodiment, a router in a non-originating domain receives a signal to establish a tunnel, the signal having an identification (ID) of an originating path computation element (PCE) of an originating domain from where the signal to establish the tunnel originated. In response to determining that establishment of the tunnel fails, the router may signal the failure of the establishment to a local PCE of the non-originating domain, the signaling indicating the ID of the originating PCE to cause the local PCE to provide updated routing information of the non-originating domain to the originating PCE.
Abstract: In order for intermediary WAAS devices to process and accelerate ICA traffic, they must decrypt the ICA traffic in order to examine it. Disclosed is a mechanism by which the ICA traffic may be re-encrypted for transport over the WAN in a manner that does not require explicit configuration by the administrator of the WAAS devices. For example, VDI traffic may be intercepted and all data redundancy elimination messages may be encrypted and sent to a peer network device.
Type:
Application
Filed:
August 20, 2013
Publication date:
December 19, 2013
Applicant:
Cisco Technology, Inc.
Inventors:
Arindam Paul, Hui Wang, Michael A. DeMoney, Arivu Ramasamy
Abstract: Adding a separate communication link between an intelligent midspan Power Source Equipment (PSE) device and a network device (or between the midspan PSE device and a powered device (PD)) enables data communication from the network device to the intelligent midspan PSE device. The communication link provides a communication channel that the intelligent midspan PSE device may use to perform additional functions such as reallocating power, budgeting power, enabling or disabling Power over Ethernet (PoE) for a particular PD, prioritizing PoE management, and the like.
Abstract: A method for communication, including distributing over a communication network multiple channels of digital content, which are encrypted using different, channel- specific control words, and transmitting over the communication network, different, channel-specific entitlement control messages from which the control words are derivable such that each of the different channel-specific control words is derivable from any of the different channel-specific entitlement control messages by authorized receivers of the channels on the communication network. Related methods and apparatus are also included.
Abstract: In one embodiment, a device (e.g., a path computation element, PCE) monitors a tunnel set-up failure rate within a computer network, and determines whether to adjust an accuracy of routing information based on the tunnel set-up failure rate. For instance, the tunnel set-up failure rate being above a first threshold indicates a need for greater accuracy. In response to the tunnel set-up failure rate being above the first threshold, the device may then instruct one or more routers to shorten their routing update interval in the computer network.
Abstract: A method, an apparatus and computer readable storage media facilitate engaging in a web conference session between computing devices over a network, where the web conference session includes audio and video content communicated from at least one computing device to at least one other computing device during the web conference session. A first computing device engages in the web conference session at a first time that is after a start time of the web conference session and while the web conference session is ongoing, and the first computing device displays a time shifted portion of the web conference session prior to the first time and while the web conference session is ongoing.
Type:
Application
Filed:
June 13, 2012
Publication date:
December 19, 2013
Applicant:
CISCO TECHNOLOGY, INC.
Inventors:
Konstas Yannakopoulos, John Russell, Brian Glanville, Dhiren Patel, David Putterman
Abstract: In one embodiment, a particular device in a computer network maintains a locally owned tunnel-state table, and joins a distributed hash table (DHT) ring. In addition, the locally owned tunnel-state table is shared with other devices of the DHT ring to establish a DHT-owned tunnel-state table. The particular device (and other devices) determines ownership of link-state advertisements (LSAs) for a specific portion of a traffic engineering database (TED) according to the DHT ring. As such, when the particular device (or any device) computes a path for a tunnel using a local TED, the particular device may request permission to use resources along the computed path that were advertised in particular LSAs from owners of those particular LSAs when not owned by the particular device.
Type:
Application
Filed:
June 15, 2012
Publication date:
December 19, 2013
Applicant:
Cisco Technology, Inc.
Inventors:
Stefano Previdi, Jean-Philippe Vasseur, Jan Medved, David Ward
Abstract: In one embodiment, a method includes obtaining a first packet included in a flow to be forwarded to a border router, and replicating the first packet to create a duplicate. The first packet is forwarded onto a first set of links, and the duplicate is forwarded onto a second set of links, to the border router. First information relating to the first packet and the first set of links, and second information relating to the duplicate and the second set of links, is obtained. The first information and the second information are used to determine whether to forward the flow on the first set of links. The first set of links is used to forward the flow if it is determined that the first set of links is to be used to forward the flow, otherwise the second set of links is used to forward the flow.
Type:
Application
Filed:
June 18, 2012
Publication date:
December 19, 2013
Applicant:
CISCO TECHNOLOGY, INC.
Inventors:
Sravan Vadlakonda, Pritam Shah, Rahul G. Patel
Abstract: In one embodiment, a method comprises receiving from a user interface, by a computing device, a request for execution of at least one lambda function in an operation of a geospatial application, the geospatial application having lambda functions for operating on at least one of a workflow item or one or more entities of an ad hoc geospatial directory, the workflow item including at least one of the lambda functions for a workflow in the geospatial application; and executing by the computing device the at least one lambda function to form, in the geospatial application, a work entity that associates the workflow item with one of the entities, the work entity defining execution of the workflow on the one entity.
Type:
Grant
Filed:
June 27, 2011
Date of Patent:
December 17, 2013
Assignee:
Cisco Technology, Inc.
Inventors:
Billy Gayle Moon, Bryan Turner, James J. Miner
Abstract: A method and system to detect an evasion attack are provided. The system may include a repository to store signature fragments that together constitute an attack signature, an interceptor to intercept a data packet associated with a network connection, a string-matching module to determine whether the payload of the data packet includes any of the stored signature fragments thereby identifying a match, a responder to perform a prevention action in response to the match, and a detector to detect that a size of the data packet is less than a size threshold. The system may further include a state machine to commence maintaining a state for the network connection in response to the detector determining that the size of the data packet is less than the size threshold.
Type:
Grant
Filed:
October 23, 2006
Date of Patent:
December 17, 2013
Assignee:
Cisco Technology, Inc.
Inventors:
George Varghese, Flavio Giovanni Bonomi, John Andrew Fingerhut
Abstract: User credentials are validated within a network infrastructure element such as a packet data router or switch. The network element has authentication and authorization logic for receiving one or more packets representing an input application message logically associated with OSI network model Layer 5 or above; extracting user credentials from the one or more packets; authenticating an identity associated with the user credentials; authorizing privileges to the identity; and forwarding the application message to an intended destination if the identity is successfully authenticated and/or authorized. The authentication and authorization logic in the network element can invoke extension authentication and authorization methods that may be provisioned after the network element is deployed in a networked system.
Type:
Grant
Filed:
May 26, 2006
Date of Patent:
December 17, 2013
Assignee:
Cisco Technology, Inc.
Inventors:
Sandeep Kumar, Vinod K. Dashora, Subramanian N. Iyer, Yuquan Jiang
Abstract: In one embodiment, a method for securely transferring entitled data from one or more devices in a customer's network to a vendor's network via a public network is described. The data is obtained from a collection module communicatively coupled to the devices. The obtained data is transformed into a format that is recognized by a backend server present in the vendor's network. The transformed data is then assorted by associating the transformed data with corresponding one or more devices. Finally, the assorted data is then encrypted and sent to the backend server securely via the public network along with entitlement attributes corresponding to the one or more devices.
Type:
Grant
Filed:
August 20, 2008
Date of Patent:
December 17, 2013
Assignee:
Cisco Technology, Inc.
Inventors:
Ammar Rayes, Subrata Dasgupta, Tom Deckers, Venkataraman Sivasankaran
Abstract: In one embodiment, a network management system (NMS) determines an intent to initialize a request-response exchange with a plurality of clients in a low power and lossy network (LLN). In response, the NMS adaptively schedules corresponding responses from the clients to distribute the responses across a period of time based on a network state of the LLN. Accordingly, requests may be generated by the NMS with an indication of a corresponding schedule to be used by the clients to respond, and transmitted into the LLN to solicit the responses, which are then received at the NMS according to the indicated schedule.
Type:
Grant
Filed:
July 29, 2011
Date of Patent:
December 17, 2013
Assignee:
Cisco Technology, Inc.
Inventors:
Jonathan W. Hui, Gilman Tolle, Jean-Philippe Vasseur
Abstract: Systems and methods for improving video stutter in high resolution progressive video captured with fast exposure times. In a first approach, digital video is captured with fast shutter speeds that cause each frame of the video to be sharp. A motion blur is not captured for objects moving within the frame. The video codec generates motion information that may be utilized to add an artificial motion blur to each frame of the digital video during processing in a digital video pipeline. In a second approach, the lens assembly of the digital camera includes an electronically actuated filter that attenuates the light reaching an image sensor such that the shutter speeds may be decreased in order to capture motion blur. The electronically actuated filter may be a liquid crystal display (LCD) device that is set to a plurality of different transparency levels based on the voltage applied to the LCD device.
Abstract: In one embodiment, estimating a length of a network connection, determining whether the estimated network connection length deviates from a predetermined threshold range, modifying one or more signal characteristics when it is determined that the estimated network connection length deviates from the predetermined threshold range are provided.
Type:
Grant
Filed:
June 14, 2007
Date of Patent:
December 17, 2013
Assignee:
Cisco Technology, Inc.
Inventors:
James William Edwards, III, Richard L. House
Abstract: In one embodiment, a system that employs IGMP (Internet Group Management Protocol) snooping and client tracking to forward an IP multicast flow between a distribution (e.g., wired or backbone) network and a wireless network without the need to configure a VLAN on either infrastructure. A single IP multicast flow is forwarded natively on the distribution network (e.g., from an IP Multicast enabled router) to an AP, and the AP replicates and forwards the multicast flow to a plurality of domains on the wireless network.
Type:
Grant
Filed:
January 19, 2007
Date of Patent:
December 17, 2013
Assignee:
Cisco Technology, Inc.
Inventors:
Bhawani Sapkota, Tak Ming Francis Pang, Gong Cheng, Kalyan R. Dharanipragada