854 patents
Utility
Upstream Multicast Hop (Umh) Extensions for Anycast Deployments
18 Jan 24
An example egress network device includes at least one computer processor and a memory.
Vinod Kumar N, Robert W. Kebler, Vikram Nagarajan
Filed: 27 Sep 23
Utility
Self-driven and Adaptable Multi-vbng Management Orchestration
18 Jan 24
A broadband network gateway (BNG) controller is described that includes a network subscriber database (NSDB) and one or more core applications.
Sunhil Madhaorao Gandhewar, Nirmal Antoy X
Filed: 25 Sep 23
Utility
Edge Device for Source Identification Using Source Identifier
18 Jan 24
A device comprises processing circuitry configured to identify a telemetry packet indicating telemetry data for a plurality of packets output by a network device of a plurality of network devices and select a source identifier for the network device from a plurality of source identifiers.
Raghuram Malpe Pai, Nilesh Kantilal Simaria, Harsha Lakshmikanth, Sri Ram Sankar
Filed: 27 Sep 23
Utility
Log Analysis In Vector Space
11 Jan 24
The disclosed embodiments provide for identification of a remedial action based on analysis of a system log file.
Jisheng Wang, Gaurav Sunil Nandode, Winson Benedict Fernandes
Filed: 22 Sep 23
Utility
Designating a Primary Multicast Flow and a Backup Multicast Flow for Multicast Traffic
11 Jan 24
A network device may receive a first redundant multicast flow indication from a first network device, and may receive a second redundant multicast flow indication from a second network device.
Vinod Kumar NAGARAJ, Vikram NAGARAJAN, Zhaohui ZHANG
Filed: 11 Jul 22
Utility
Bit Index Explicit Replication (Bier) Advertising with a Route Distinguisher
11 Jan 24
In some implementations, a network device may determine a route distinguisher (RD) that is associated with a bit index explicit replication (BIER) domain, wherein the network device participates in the BIER domain and one or more BIER sub-domains of the BIER domain.
Zhaohui ZHANG
Filed: 21 Dec 22
Utility
Internet Protocol Operations and Management Option
11 Jan 24
A network device may receive an internet protocol (IP) packet that includes an IP packet header.
Ronald BONICA
Filed: 18 Mar 19
Utility
Framework for Automated Application-to-network Root Cause Analysis
4 Jan 24
A computing system comprising a memory and processing circuitry may perform the techniques.
Rahul Gupta, Tarun Banka, Mithun Chakaravarrti Dharmaraj, Thayumanavan Sridhar, Raj Yavatkar
Filed: 30 Jun 23
Utility
Network Device Upgrade Based Group Priority
4 Jan 24
Techniques are disclosed for identifying sets of network devices to which to deploy a software upgrade based on an importance to the network of each network device.
Manoj Gupta, Rupamjyoti Sarma Baruah, Gorakhanath Kathare
Filed: 15 Dec 22
Utility
Software Image Score for Recommending Software Images
4 Jan 24
Techniques are disclosed for recommending particular versions of a software image for installation on a network device.
Manoj Gupta, Gorakhanath Kathare, Rupamjyoti Sarma Baruah
Filed: 28 Dec 22
Utility
Orchestration of Round-trip Time (RTT) Measurements
4 Jan 24
Techniques are described for orchestration of measurements between a plurality of devices in a wireless network.
Mohammad Zohoorian, Christopher Wesley Wright, Nagarjun Srinivasan, Shmuel Shaffer
Filed: 30 Mar 23
Utility
Multi-protocol Service Chaining Among Devices of Interconnected Topology
4 Jan 24
Virtual network controllers are described that automatically generate policies and configuration data for routing traffic through physical network function (PNF) service chains in a multi-tenant data center.
Ankur TANDON, Vivekananda SHENOY, Jacopo PIANIGIANI, Abhinav PANDIT
Filed: 14 Sep 23
Utility
Automatic Generation and Update of Connectivity Association Keys for Media Access Control Security Protocol
28 Dec 23
A first network device may identify a MACsec session between the first network device and a second network device that utilizes a CAK, may determine, using a KDF and one or more KDF input parameters, an additional CAK, may encrypt the one or more KDF input parameters and/or KDF identification information that identifies the KDF and the one or more KDF input parameters to generate encrypted KDF input information, and may send, to the second network device, a first message that includes the encrypted KDF input information.
Nandan DEBNATH
Filed: 23 Jun 22
Utility
Systems and Methods for Replicating Traffic Statistics on Redundant Packet Forwarding Engine System
28 Dec 23
In some implementations, a first processing component of a network device may receive first traffic data obtained by a second processing component of the network device.
Pawankumar HARODE, Parag DUBEY, Anup Yellur RAO
Filed: 6 Sep 23
Utility
Autotuning a Virtual Firewall
28 Dec 23
A device may receive an input associated with deploying a virtual firewall on a computing device.
Antony Ruban ALEXIS, Sai Prashanth RAMANATHAN, Ramasubramaniam GANESAN
Filed: 11 Sep 23
Utility
Internet Protocol (Ip) Version 6 Fragmentation and Reassembly Optimization for Port-aware Ip Translators
28 Dec 23
A network device may receive IPv6 fragments of a flow.
Ashish Suresh GHULE, Alex BABAN, Pratik Pradip VYAS
Filed: 24 Jun 22
Utility
Adjusting a Security Policy Based on System Resource Utilization
28 Dec 23
In some implementations, a security device may identify a resource profile based on a value of a resource utilization metric associated with the security device.
Sravanthi ARIMANDA, Hari Prasad S R
Filed: 28 Jun 22
Utility
Making Transmission Control Protocol (TCP) Sessions Robust In a Socket Replication Environment
28 Dec 23
A network device may execute a master application communicating with another network device via a session, and may receive, by a backup application replication layer, a replicated data object.
Amit ARORA, Erin C. MACNEIL, Harmeet SINGH, Sairam NEELAM
Filed: 22 Jun 22
Utility
Metric Groups for Software-defined Network Architectures
21 Dec 23
In general, techniques are described for an efficient exportation of metrics data within a software defined network (SDN) architecture.
Chunguang Liu, Prasad Miriyala, Jeffrey S. Marshall
Filed: 20 Sep 22
Utility
Quantum Cryptography In an Internet Key Exchange Procedure
21 Dec 23
In some implementations, a first network device may communicate, with a second network device, one or more internet key exchange (IKE) messages to exchange a first identifier associated with the first network device and a second identifier associated with the second network device, and to indicate that a post-quantum preshared key (PPK) is to be used as a shared key for an IKE security association (SA) between the first network device and the second network device.
Ranjan SINHA, Aswin SURENDRAN, Priyabrata SAHA
Filed: 6 Sep 23