Patents by Inventor Chuanwei Li
Chuanwei Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11909545Abstract: In one embodiment, a method comprises: identifying, by a low power and lossy network (LLN) device in a low power and lossy network, a minimum distance value and a distance limit value for limiting multicast propagation, initiated at the LLN device, of a multicast data message in the LLN; and multicast transmitting, by the LLN device, the multicast data message with a current distance field specifying the minimum distance value and a distance limit field specifying the distance limit value, the multicast transmitting causing a receiving LLN device having a corresponding rank in the LLN to respond to the multicast data message by: (1) determining an updated distance based on adding to the current distance field a rank difference between the receiving LLN device and the LLN device, and (2) selectively retransmitting the multicast data message if the updated distance is less than the distance limit value.Type: GrantFiled: July 18, 2022Date of Patent: February 20, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Pascal Thubert, Huimin She, Chuanwei Li, Lele Zhang
-
Publication number: 20230362654Abstract: A method includes determining a number of drops of a plurality of messages sent to a first node of a plurality of nodes within a mesh network. Based at least in part on the number of drops of the plurality of messages exceeding a threshold number of drops for a time period, decrementing a first rating assigned to the first node to a second rating assigned to the first node. Based at least in part on the second rating being below a rating threshold, determining that the first node is a potentially malicious node. Based at least in part on a first distance to the first node being larger than a distance threshold, identifying that the first node is a malicious node. The method may further include ending communications with the first node.Type: ApplicationFiled: July 17, 2023Publication date: November 9, 2023Applicant: Cisco Technology, Inc.Inventors: Lele Zhang, Yajun Xia, Chuanwei Li, Li Zhao
-
Patent number: 11811648Abstract: Techniques for distributed sub-controller permission for control of data-traffic flow within software-defined networking (SDN) mesh networks to limit control plane traffic of the network are described herein. A technique described herein includes a network node of a data-traffic path of an SDN mesh network obtaining SDN sub-controller permission from a border controller of the SDN mesh network. Further, the technique includes suppression of data traffic from sibling and children nodes of data-traffic path allied nodes to the data-traffic path allied nodes. The data-traffic path allied nodes include network nodes that are part of the data-traffic path of the SDN mesh network. Further still, the technique includes the transmission of data across the data-traffic path.Type: GrantFiled: September 6, 2022Date of Patent: November 7, 2023Assignee: Cisco Technology, Inc.Inventors: Li Zhao, Chuanwei Li, Lele Zhang, Haibo Dong, Akram Ismail Sheriff
-
Patent number: 11811636Abstract: In one embodiment, a technique comprises monitoring data transfer over a radio frequency (RF) link between a first device and a second device in a mesh network where the second device is a descendent node and the first device is a parent node. The technique further transfers the data over a power link communication (PLC) when the RF link is inactive. The method also includes broadcasting, by the second device, RF link availability to at least a third device in the mesh network when the RF link with the first device is inactive where the third device has an active link with the second device and the third device is a descendent node of the second device. The method then includes communicating, between the second device and the third device, through the active RF link.Type: GrantFiled: August 24, 2021Date of Patent: November 7, 2023Assignee: Cisco Technology, Inc.Inventors: Yinfang Wang, Yajun Xia, Feiliang Wang, Chuanwei Li
-
Patent number: 11799751Abstract: In one embodiment, a method comprises: joining, by a network device, a network topology rooted by a root network device in a data network, and in response transmitting an advertisement indicating a position of the network device in the network topology; suppressing a second transmission based on initiating a deferred transmission operation in response to transmitting the advertisement; maintaining the deferred transmission operation to enable a prescribed minimum number of other network devices to join the network topology at respective identified lower positions than the position of the network device; and changing, by the network device, from the deferred transmission operation to an accelerated operation in response to expiration of a prescribed deferral interval or detecting the prescribed minimum number of other network devices having the respective identified lower positions, the accelerated operation enabling the network device to initiate transmission of a data packet before the other network devices.Type: GrantFiled: August 24, 2021Date of Patent: October 24, 2023Assignee: Cisco Technology, Inc.Inventors: Pascal Thubert, Li Zhao, Huimin She, Chuanwei Li
-
Patent number: 11706625Abstract: A method includes identifying a potentially malicious node using a rating assigned to nodes within the network and decrementing the rating based on detected dropped messages to identify a potentially malicious node. The malicious node is identified based on location information obtained from the nodes within the network and comparable distances from the potentially malicious node. The method further includes ending communications with the malicious node and selecting a new parent node based on a presumption that any of the plurality of nodes other than the malicious node are non-malicious.Type: GrantFiled: September 3, 2020Date of Patent: July 18, 2023Assignee: Cisco Technology, Inc.Inventors: Lele Zhang, Yajun Xia, Chuanwei Li, Li Zhao
-
Patent number: 11653220Abstract: Systems, methods, and computer-readable media for identifying a deployment scheme for forming a wireless mesh network based on environmental characteristics and an optimum deployment scheme. In some examples, a geographical area for deployment of a wireless mesh network is identified. Additionally, environmental information of the geographical area can be collected. Network characteristics of an optimum deployment scheme for forming the wireless mesh network can be defined. As follows, a deployment scheme for forming the wireless mesh network can be identified based on the network characteristics of the optimum deployment scheme and the environmental information of the geographical area.Type: GrantFiled: April 4, 2019Date of Patent: May 16, 2023Assignee: Cisco Technology, Inc.Inventors: Li Zhao, Chuanwei Li, Lele Zhang, Huimin She
-
Publication number: 20230139002Abstract: The present disclosure provides a hierarchical method of identifying unauthorized network traffic in a network by applying, at one of a first plurality of nodes of a network, a first level of network traffic analysis to identify received network traffic as one of authorized or suspicious network traffic, the one of the first plurality of nodes having a first path for traffic routing and a second path to one of a second plurality of nodes of the network, the second path being used for forwarding the suspicious network traffic to the one of the second plurality of nodes; tagging the received network traffic as the suspicious network traffic; and sending the suspicious network traffic to the one of the second plurality of nodes over the second path, the second network node applying a second level of network analysis to determine if the received network traffic is authorized, unauthorized or remains suspicious.Type: ApplicationFiled: October 29, 2021Publication date: May 4, 2023Inventors: Lele Zhang, Li Zhao, Chuanwei Li, Feiliang Wang
-
Publication number: 20230068112Abstract: In one embodiment, a method comprises: joining, by a network device, a network topology rooted by a root network device in a data network, and in response transmitting an advertisement indicating a position of the network device in the network topology; suppressing a second transmission based on initiating a deferred transmission operation in response to transmitting the advertisement; maintaining the deferred transmission operation to enable a prescribed minimum number of other network devices to join the network topology at respective identified lower positions than the position of the network device; and changing, by the network device, from the deferred transmission operation to an accelerated operation in response to expiration of a prescribed deferral interval or detecting the prescribed minimum number of other network devices having the respective identified lower positions, the accelerated operation enabling the network device to initiate transmission of a data packet before the other network devices.Type: ApplicationFiled: August 24, 2021Publication date: March 2, 2023Inventors: PASCAL THUBERT, LI ZHAO, HUIMIN SHE, CHUANWEI LI
-
Publication number: 20220417135Abstract: Techniques for distributed sub-controller permission for control of data-traffic flow within software-defined networking (SDN) mesh networks to limit control plane traffic of the network are described herein. A technique described herein includes a network node of a data-traffic path of an SDN mesh network obtaining SDN sub-controller permission from a border controller of the SDN mesh network. Further, the technique includes suppression of data traffic from sibling and children nodes of data-traffic path allied nodes to the data-traffic path allied nodes. The data-traffic path allied nodes include network nodes that are part of the data-traffic path of the SDN mesh network. Further still, the technique includes the transmission of data across the data-traffic path.Type: ApplicationFiled: September 6, 2022Publication date: December 29, 2022Inventors: Li Zhao, Chuanwei Li, Lele Zhang, Haibo Dong, Akram Sheriff
-
Publication number: 20220353103Abstract: In one embodiment, a method comprises: identifying, by a low power and lossy network (LLN) device in a low power and lossy network, a minimum distance value and a distance limit value for limiting multicast propagation, initiated at the LLN device, of a multicast data message in the LLN; and multicast transmitting, by the LLN device, the multicast data message with a current distance field specifying the minimum distance value and a distance limit field specifying the distance limit value, the multicast transmitting causing a receiving LLN device having a corresponding rank in the LLN to respond to the multicast data message by: (1) determining an updated distance based on adding to the current distance field a rank difference between the receiving LLN device and the LLN device, and (2) selectively retransmitting the multicast data message if the updated distance is less than the distance limit value.Type: ApplicationFiled: July 18, 2022Publication date: November 3, 2022Inventors: PASCAL THUBERT, HUIMIN SHE, CHUANWEI LI, LELE ZHANG
-
Patent number: 11489762Abstract: Techniques for distributed sub-controller permission for control of data-traffic flow within software-defined networking (SDN) mesh networks to limit control plane traffic of the network are described herein. A technique described herein includes a network node of a data-traffic path of an SDN mesh network obtaining SDN sub-controller permission from a border controller of the SDN mesh network. Further, the technique includes suppression of data traffic from sibling and children nodes of data-traffic path allied nodes to the data-traffic path allied nodes. The data-traffic path allied nodes include network nodes that are part of the data-traffic path of the SDN mesh network. Further still, the technique includes the transmission of data across the data-traffic path.Type: GrantFiled: June 2, 2020Date of Patent: November 1, 2022Assignee: Cisco Technology, Inc.Inventors: Li Zhao, Chuanwei Li, Lele Zhang, Haibo Dong, Akram Ismail Sheriff
-
Patent number: 11463350Abstract: In one embodiment, a method comprises: determining, by a network device that is configured for joining a local directed acyclic graph (DAG) instance in a data network, an unreachability by the network device to any member of the local DAG instance; generating and broadcasting, by the network device, a request message that identifies the network device requesting to join the local DAG instance, the request message causing a neighboring network device in a global DAG instance of the data network to rebroadcast the request message for reception by a member of the local DAG instance, the neighboring network device a non-member of the local DAG instance; and receiving, by the network device, a reply message indicating a member of the local DAG instance is reachable via the neighboring network device in the global DAG instance.Type: GrantFiled: November 23, 2020Date of Patent: October 4, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Ling Wei, Wenjia Wu, Nan Yi, Chuanwei Li
-
Patent number: 11431518Abstract: In one embodiment, a method comprises: identifying, by a low power and lossy network (LLN) device in a low power and lossy network, a minimum distance value and a distance limit value for limiting multicast propagation, initiated at the LLN device, of a multicast data message in the LLN; and multicast transmitting, by the LLN device, the multicast data message with a current distance field specifying the minimum distance value and a distance limit field specifying the distance limit value, the multicast transmitting causing a receiving LLN device having a corresponding rank in the LLN to respond to the multicast data message by: (1) determining an updated distance based on adding to the current distance field a rank difference between the receiving LLN device and the LLN device, and (2) selectively retransmitting the multicast data message if the updated distance is less than the distance limit value.Type: GrantFiled: February 13, 2020Date of Patent: August 30, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Pascal Thubert, Huimin She, Chuanwei Li, Lele Zhang
-
Patent number: 11362937Abstract: Techniques for utilizing Software-Defined Field-Area Network (SD-FAN) controllers to receive a geographic location and transmission power of individual nodes and generate a geographic location topology of a Field-Area Network (FAN) to provide nodes with location-aware route paths for data transmission. One or more SD-FAN controller(s) may maintain a geographic location database to store the geographic location and transmission power of the individual nodes. Each node may utilize a Destination Address Object to advertise its geographic location and transmission power to the SD-FAN controller. The SD-FAN controller(s) may utilize the geographic location table to generate the geographic location topology of the FAN and determine a location-aware route path for optimized data transmission between nodes in the FAN.Type: GrantFiled: March 20, 2020Date of Patent: June 14, 2022Assignee: Cisco Technology, Inc.Inventors: Huimin She, Lele Zhang, Shiwei Gao, Xiaoguang Jason Chen, Chuanwei Li
-
Publication number: 20220166707Abstract: In one embodiment, a method comprises: determining, by a network device that is configured for joining a local directed acyclic graph (DAG) instance in a data network, an unreachability by the network device to any member of the local DAG instance; generating and broadcasting, by the network device, a request message that identifies the network device requesting to join the local DAG instance, the request message causing a neighboring network device in a global DAG instance of the data network to rebroadcast the request message for reception by a member of the local DAG instance, the neighboring network device a non-member of the local DAG instance; and receiving, by the network device, a reply message indicating a member of the local DAG instance is reachable via the neighboring network device in the global DAG instance.Type: ApplicationFiled: November 23, 2020Publication date: May 26, 2022Inventors: LING WEI, WENJIA WU, NAN YI, CHUANWEI LI
-
Publication number: 20220070672Abstract: A method includes identifying a potentially malicious node using a rating assigned to nodes within the network and decrementing the rating based on detected dropped messages to identify a potentially malicious node. The malicious node is identified based on location information obtained from the nodes within the network and comparable distances from the potentially malicious node. The method further includes ending communications with the malicious node and selecting a new parent node based on a presumption that any of the plurality of nodes other than the malicious node are non-malicious.Type: ApplicationFiled: September 3, 2020Publication date: March 3, 2022Inventors: Lele Zhang, Yajun Xia, Chuanwei Li, Li Zhao
-
Publication number: 20220038360Abstract: In one embodiment, a technique comprises monitoring data transfer over a radio frequency (RF) link between a first device and a second device in a mesh network where the second device is a descendent node and the first device is a parent node. The technique further transfers the data over a power link communication (PLC) when the RF link is inactive. The method also includes broadcasting, by the second device, RF link availability to at least a third device in the mesh network when the RF link with the first device is inactive where the third device has an active link with the second device and the third device is a descendent node of the second device. The method then includes communicating, between the second device and the third device, through the active RF link.Type: ApplicationFiled: August 24, 2021Publication date: February 3, 2022Inventors: Yinfang Wang, Yajun Xia, Feiliang Wang, Chuanwei Li
-
Publication number: 20210377157Abstract: Techniques for distributed sub-controller permission for control of data-traffic flow within software-defined networking (SDN) mesh networks to limit control plane traffic of the network are described herein. A technique described herein includes a network node of a data-traffic path of an SDN mesh network obtaining SDN sub-controller permission from a border controller of the SDN mesh network. Further, the technique includes suppression of data traffic from sibling and children nodes of data-traffic path allied nodes to the data-traffic path allied nodes. The data-traffic path allied nodes include network nodes that are part of the data-traffic path of the SDN mesh network. Further still, the technique includes the transmission of data across the data-traffic path.Type: ApplicationFiled: June 2, 2020Publication date: December 2, 2021Inventors: Li Zhao, Chuanwei Li, Lele Zhang, Haibo Dong, Akram Ismail Sheriff
-
Patent number: 11159430Abstract: In one embodiment, a technique for load balancing of throughput for multi-PHY networks using decision trees is provided. A first device of a mesh communication network may collect at least one transmission metric indicative of a primary link and a secondary link between the first device and a second device of the mesh communication network. The first device may provide the at least one transmission metric as input to one or more decision trees comprising one or more attributes that are each indicative of a threshold for a corresponding transmission metric. The first device may obtain an output from the decision tree comprising a selection of either the primary link or the secondary link. The first device may send, based on the output from the decision tree, one or more packets to the second device using the selected link.Type: GrantFiled: July 22, 2019Date of Patent: October 26, 2021Assignee: Cisco Technology, Inc.Inventors: Lele Zhang, Chuanwei Li, Li Zhao, Yajun Xia