-
公开(公告)号:US11057308B2
公开(公告)日:2021-07-06
申请号:US16565044
申请日:2019-09-09
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , David John Zacks
IPC: H04L12/851 , H04L12/833 , H04L12/725 , H04L12/727 , H04L12/813
Abstract: Systems, methods, and devices are disclosed for personalizing quality of service for network traffic. A user priority is assigned to a specific user and an application priority is assigned to a type of application. A header including an identifier is added to a packet from a client device associated with the type of application and the specific user in order to generate a modified packet. The identifier is based on a combination of the user priority associated with the specific user and an application priority. The modified packet is forwarded end to end through a network that is personalized to the specific user and the type of application by mapping a treatment policy to the identifier.
-
公开(公告)号:US10819572B2
公开(公告)日:2020-10-27
申请号:US16366968
申请日:2019-03-27
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , David John Zacks , Peter Geoffrey Jones
IPC: H04L12/24 , H04L12/947
Abstract: Systems and methods provide for performing performance analytics processing of network traffic by copying packets of network traffic to a switch CPU based on a flag. The systems and methods disclosing receiving network traffic comprising one or more packet, generating a network traffic flow record associated with the received network traffic, the network traffic flow record including a copy-to-CPU bit and one or more function flag bits, setting the copy-to-CPU bit to an on configuration, processing the one or more packets by one or more functions to generate network flow analytics, wherein the one or more function flag bits are set in response to the one or more functions generating network flow analytics, and setting the copy-to-CPU bit to an off configuration.
-
公开(公告)号:US20200162319A1
公开(公告)日:2020-05-21
申请号:US16366968
申请日:2019-03-27
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , David John Zacks , Peter Geoffrey Jones
IPC: H04L12/24 , H04L12/947
Abstract: Systems and methods provide for performing performance analytics processing of network traffic by copying packets of network traffic to a switch CPU based on a flag.
-
公开(公告)号:US12267328B2
公开(公告)日:2025-04-01
申请号:US17695265
申请日:2022-03-15
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Carlos M. Pignataro , John Matthew Swartz , Paul Brian Giralt , David John Zacks , Gonzalo Salgueiro
IPC: H04L9/40
Abstract: Methods are provided in which a network device hosts distinct network access resources that are managed by different entities. The method includes obtaining a request for partitioning one or more network resources of an on-premise network device for connecting one or more endpoints to a first network managed by a first entity. The on-premise network device connects one or more endpoints to a second network managed by a different entity. The method further involves partitioning, based on the request, the one or more network resources and connecting the one or more endpoints to the first network using the one or more network resources. The one or more network resources are managed by the first entity while at least one other network resource of the on-premise network device is managed by the different entity and is associated with connecting the one or more endpoints to the second network.
-
公开(公告)号:US20250097739A1
公开(公告)日:2025-03-20
申请号:US18470653
申请日:2023-09-20
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , David John Zacks , Robert Edgar Barton , Jeff Apcar
Abstract: Techniques for a proxy to replicate traffic being communicated between a client device and a destination device based on determining an outage or impairment in a LEO satellite network. The proxy may be communicating a traffic stream between a source device and a destination device using a primary WAN that includes the LEO satellite network. However, the proxy may determine that the primary WAN has experienced or will experience an outage or other impairment. In such examples, the proxy may then replicate the traffic stream and send the replicated traffic stream over a backup communication link. The backup communication link may a different path through the primary WAN, and/or may be a communication path through a secondary WAN. Once the outage or impairment has cleared, the proxy may stop replicating the traffic and again use the primary WAN to communicate traffic.
-
公开(公告)号:US12218931B2
公开(公告)日:2025-02-04
申请号:US17168301
申请日:2021-02-05
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , Stefano Giorcelli , Frank Michaud , David John Zacks
Abstract: Disclosed are methods, systems, and non-transitory computer-readable media for utilizes a collaboration application to provide data beneficial to the authentication of the user. The present application discloses receiving at least one item of personal identifying information for a user from a primary multi-factor authentication device. The present application further discloses receiving at least one item of personal identifying information for a user from a conferencing service in which the user is engaged in a conference. The present application also discloses determining whether to authenticate the user based on the items of personal identifying information from the primary multi-factor authentication device and from the conferencing service.
-
公开(公告)号:US20240396829A1
公开(公告)日:2024-11-28
申请号:US18323134
申请日:2023-05-24
Applicant: Cisco Technology, Inc.
Abstract: Provided herein are techniques to facilitate multi-level performance tracing for a mobile network environment. In one instance, a method may include obtaining, by a mobile network, a trigger from an enterprise to initiate an underlay-level trace for a wireless device of the enterprise, wherein the trigger includes a correlation identifier that correlates the underlay-level trace with an enterprise-level trace for the wireless device and providing the underlay-level trace for a session of the wireless device by including a first trace flag for IP packets for the session and including a second trace flag for encapsulations of the IP packets for the session in which the first and second trace flag are unique to the session of the wireless device and enable elements of the mobile network to provide underlay trace information for the underlay-level trace for the session of the wireless device to a trace.
-
公开(公告)号:US12015629B2
公开(公告)日:2024-06-18
申请号:US17034241
申请日:2020-09-28
Applicant: Cisco Technology, Inc.
Inventor: Qihong Shao , David John Zacks , Yue Liu , Xinjun Zhang
IPC: H04L9/40 , G06F18/211 , G06F40/30 , G06N3/02 , H04L43/065
CPC classification number: H04L63/1433 , G06F18/211 , G06F40/30 , G06N3/02 , H04L43/065
Abstract: A method, computer system, and computer program product are provided for network risk analysis. A plurality of risk reports relating to a network device in a network are obtained, wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the network device in the network. A count of the plurality of risk reports is determined for each dimension of the plurality of dimensions of risk. A regression model is applied to determine a risk value for the network device in the network based on the count of the plurality of risk reports for each dimension and based a role of the network device in the network.
-
公开(公告)号:US20240171451A1
公开(公告)日:2024-05-23
申请号:US17989830
申请日:2022-11-18
Applicant: Cisco Technology, Inc.
Inventor: Rachana Anubhav Soni , David John Zacks
IPC: H04L41/0631 , H04L41/16 , H04L43/02
CPC classification number: H04L41/0645 , H04L41/16 , H04L43/02
Abstract: In one embodiment, a method herein may comprise: determining, by a process, a disruptive activity within a particular computer network of a plurality of computer networks; determining, by the process, telemetry data for the particular computer network, the telemetry data being time-relevant to the disruptive activity; determining, by the process, a set of expected reactions that the particular computer network is expected to experience due to the disruptive activity in correlation to the telemetry data for the particular computer network; and sharing, from the process, the set of expected reactions with a management device of the particular computer network to cause the management device to distinguish between the set of expected reactions and any unexpected events during the disruptive activity.
-
公开(公告)号:US20240073177A1
公开(公告)日:2024-02-29
申请号:US17897745
申请日:2022-08-29
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Carlos M. Pignataro , David John Zacks , Thomas Szigeti
IPC: H04L61/4511 , H04L61/2514 , H04L61/3015 , H04L67/1036
CPC classification number: H04L61/4511 , H04L61/2514 , H04L61/3015 , H04L67/1036
Abstract: Methods are provided to perform a name resolution triggered monitoring agent selection for full stack observability. The methods involve obtaining a name resolution request for an enterprise service to be accessed by an endpoint device. A plurality of service instances are configured to provide the enterprise service. The methods further involve determining, based on the name resolution request, a monitoring agent from a plurality of monitoring agents of a monitoring service that monitors performance of the enterprise service and selecting a service instance, from the plurality of service instances, that is associated with the monitoring agent in a name resolution record. The methods further involve providing, to the endpoint device, location information for accessing the service instance and provisioning the monitoring agent to monitor the performance of the enterprise service executed by the service instance for the endpoint device.
-
-
-
-
-
-
-
-
-