Cisco Patent Applications

DETERMINING POWER CAPPING POLICIES FOR A COMPUTER DEVICE

Granted: January 19, 2017
Application Number: 20170017288
Aspects of the present disclosure provide techniques for accurately determining maximum and minimum power capping values that may be used to increase power use efficiency (PUE) and reliability of a computing environment (e.g., a data center comprising one or more servers).

INTERFERENCE SUPPRESSION IN FULL DUPLEX CABLE NETWORK ENVIRONMENTS

Granted: January 19, 2017
Application Number: 20170019146
An example method for interference suppression in full duplex cable network environments is provided and includes providing a baseband (BB) reference signal on a first pathway to a signal processor, converting the BB reference signal to a first radio frequency (RF) signal, transmitting the first RF signal on the first pathway, the first RF signal being reflected back on a second pathway, receiving a second RF signal on the second pathway, the second RF signal including interferences from…

SCHEDULING MECHANISMS IN FULL DUPLEX CABLE NETWORK ENVIRONMENTS

Granted: January 19, 2017
Application Number: 20170019239
An example method for scheduling in full duplex cable network environments is provided and includes categorizing a plurality of cable modems in a cable network into interference groups, scheduling upstream transmissions and downstream receptions for cable modems in each interference group, such that no cable modem of any one interference group transmits upstream in a frequency range simultaneously as another cable modem in the same interference group receives downstream in the frequency…

FULL DUPLEX NETWORK ARCHITECTURE IN CABLE NETWORK ENVIRONMENTS

Granted: January 19, 2017
Application Number: 20170019241
An example communication system comprises a media access control (MAC) scheduler in a cable network, and a full band transceiver. The MAC scheduler implements a two-dimensional transmission-reception (T-R) coordination scheme among a plurality of cable modems in the cable network. According to the T-R coordination scheme, the cable modems are categorized into interference groups, such that no cable modem of any one interference group transmits upstream in a frequency range simultaneously…

INTERFERENCE RELATIONSHIP CHARACTERIZATION IN FULL DUPLEX CABLE NETWORK ENVIRONMENTS

Granted: January 19, 2017
Application Number: 20170019242
An example method for characterizing interference relationships in full duplex cable network environments is provided and includes generating a global interfered list for a plurality of cable modems in the cable network and for a plurality of frequency ranges, generating a global interfering list for the plurality of cable modems and for the plurality of frequency ranges, assigning respective downstream reception frequency ranges and upstream transmission frequency ranges for the…

SYNCHRONIZING NETWORK CONVERGENCE AND VIRTUAL HOST MIGRATION

Granted: January 19, 2017
Application Number: 20170019328
A system and a method are disclosed for synchronizing network convergence and virtual host migration in a network environment. An exemplary method includes upon receiving a message indicating that a mobile host manger will migrate a virtual host from a source node to a destination node in a network, pre-calculating a route for the virtual host at the destination node; and upon receiving a message indicating that the mobile host manager will freeze the virtual host, activating the…

BID/ASK PROTOCOL IN SCALE-OUT NVME STORAGE

Granted: January 19, 2017
Application Number: 20170019475
A method is provided in one example embodiment and includes receiving by first network device a request for storage resources from a second network device; evaluating a willingness of the first network device to provide the requested storage resources and assigning a willingness score based on the evaluating; determining whether the willingness score is greater than a minimum value; and if the willingness score is greater than the minimum value, providing a response to the request from…

SYSTEM AND METHOD TO MANAGE NETWORK UTILIZATION ACCORDING TO WIRELESS BACKHAUL AND RADIO ACCESS NETWORK CONDITIONS

Granted: January 19, 2017
Application Number: 20170019811
An example method is provided in one example embodiment and may include monitoring a plurality of wireless backhaul links associated with a radio access network (RAN); receiving an indication of a change in operating conditions for a first wireless backhaul link of the plurality of wireless backhaul links; determining utilization of the first wireless backhaul link based on the indication of the change in operating conditions; assessing an available capacity of each of the plurality of…

PROVISIONING STORAGE DEVICES IN A DATA CENTER

Granted: January 12, 2017
Application Number: 20170010874
In one embodiment, a fabric interconnect device accesses a software inventory of a storage device comprising a plurality of hardware components including at least one storage controller and a plurality of storage mediums. At least one entry of the software inventory identifies a hardware component of the storage device and an indication of at least one version of software installed for use by the hardware component or an indication that no software is installed for use by the hardware…

INTERACTIVE MECHANISM TO VIEW LOGS AND METRICS UPON AN ANOMALY IN A DISTRIBUTED STORAGE SYSTEM

Granted: January 12, 2017
Application Number: 20170010930
A method for assisting evaluation of anomalies in a distributed storage system is disclosed. The method includes monitoring at least one system metric of the system and creating a mapping between values and/or patterns of the system metric and one or more services configured to generate logs for the system. The method further includes detecting a potential anomaly in the system based on the monitoring, the potential anomaly being associated with a value and/or a pattern of the monitored…

CORRECTLY IDENTIFYING POTENTIAL ANOMALIES IN A DISTRIBUTED STORAGE SYSTEM

Granted: January 12, 2017
Application Number: 20170010931
A method for assisting evaluation of anomalies in a distributed storage system is disclosed. The method includes a step of monitoring at least one system metric of the distributed storage system. The method further includes steps of maintaining a listing of patterns of the monitored system metric comprising patterns which previously did not result in a failure within one or more nodes of the distributed storage system, and, based on the monitoring, identifying a pattern (i.e., a time…

OAM and Time Slot Control in a Vertical Ladder Topology Network

Granted: January 12, 2017
Application Number: 20170013621
In one embodiment, a network of nodes is configured to communicate according to a configuration of a vertical ladder topology as well as monitoring communication in the network, and/or selectively controls whether or not provisioned particular links will be used. One embodiment colors nodes of the network (e.g., a wireless deterministic network) along different paths through the network and marks packets with the color of each traversed node to track a path taken by a packet. One…

INTERCONNECTING VIRTUAL PRIVATE NETWORKS

Granted: January 5, 2017
Application Number: 20170005831
In one embodiment, a method includes receiving at a first network device in a first virtual private network, a packet destined for a second network device in communication with a second virtual private network, and transmitting the packet over the second network, wherein the packet is encapsulated for transmittal on a tunnel extending from the first network device to the second network device. The first network device is in communication with a system operable to map and encapsulate the…

CROWD-SOURCE CALENDAR SHARING

Granted: December 29, 2016
Application Number: 20160379171
In one embodiment, a network interface receives a first calendar meeting report from a first user and a second calendar meeting report from a second user. The first user and the second user are located on an internal network. The first calendar meeting report comprises first meeting attendees and a first calendar meeting time. The second calendar meeting report comprises second meeting attendees and a second calendar meeting time. A processor determines a common meeting attendee from the…

VIRTUAL PRIVATE NETWORK FORWARDING AND NEXTHOP TO TRANSPORT MAPPING SCHEME

Granted: December 29, 2016
Application Number: 20160380823
A method is provided in one example embodiment and includes configuring on a network element a first tunnel from the network element to a first network, wherein the configuring comprises mapping a nexthop address of the local network element to a transport address of the tunnel on the network to create a first nexthop-to-transport mapping for the network element; and advertising the first nexthop-to-transport mapping along with routing information for the network element to remote…

NETWORK WIDE SOURCE GROUP TAG BINDING PROPAGATION

Granted: December 29, 2016
Application Number: 20160380864
In one embodiment, a method includes generating at a network device, a trace packet comprising an IP (Internet Protocol) to Source Group Tag (SGT) binding, transmitting the trace packet from the network device to an SGT capable device, wherein at least one non-SGT capable device is interposed in a path between the network device and the SGT capable device, and receiving at the network device, a reply packet from the SGT capable device in response to the trace packet, the reply packet…

Enhanced Packet Flow Monitoring in a Network

Granted: December 29, 2016
Application Number: 20160380869
In one embodiment, enhanced packet flow monitoring is performed by packet switching devices in a network. A packet switching device is configured to monitor a flow of packets passing through the packet switching device, including detecting a gap in consecutive packets of the flow of packets, and attributing the gap as not being dropped one or more packets based on a particular time duration between a last received packet of the flow of packets before said detected gap and a first…

ASSOCIATION RULE ANALYSIS AND DATA VISUALIZATION FOR MOBILE NETWORKS

Granted: December 29, 2016
Application Number: 20160381580
Embodiments are provided for using association rule mining to analyze performance counters of a mobile network, including converting a plurality of performance counters of a mobile network into a plurality of key performance indicators (KPIs), quantizing each KPI into one value of a set of values associated with that KPI, creating a set of items having multiple subsets corresponding to respective KPIs, where each item of a subset corresponds to a respective value of a particular set of…

APPARATUS, SYSTEMS, AND METHODS FOR PROVIDING INTERWORKING GATEWAY

Granted: December 29, 2016
Application Number: 20160381725
Systems and methods are provided that allow inter-working between communication networks for the delivery of service to mobile nodes. A gateway is provided that communicates with a femto cell to extend service to an area that otherwise does not receive coverage from a service provider. The femto cell is a small scale base station used to provide coverage over a small area (such as a home or business), and connect to a home or enterprise network. The femto cell provides service for a…

SYSTEM AND METHOD TO FACILITATE SERVICE HAND-OUTS USING USER EQUIPMENT GROUPS IN A NETWORK ENVIRONMENT

Granted: December 22, 2016
Application Number: 20160373970
An example method is provided in one example embodiment and may include grouping a plurality of user equipment served by a serving cell radio into one or more groups based on an approximate location of each of the plurality of user equipment and a proximity of each of the plurality of user equipment in relation to each other; selecting a master user equipment for each group; receiving inter-frequency measurement information or inter-Radio Access Technology (RAT) measurement information…