Cisco Systems, Inc. is an American multinational corporation headquartered in San Jose, California, that designs, manufactures, and sells networking equipment. The stock was added to the Dow Jones Industrial Average on June 8, 2009, and is also included in the S&P 500 Index, the Russell 1000 Index, NASDAQ-100 Index and the Russell 1000 Growth Stock Index. Wikipedia.
Cisco Systems | Date: 2017-03-01
In one embodiment, a slot-filler blanking tray (24) includes a vented blanking panel (26) including a vented front panel (28), the vented blanking panel (26) for fitting over an entrance to one slot (12) of a computer equipment rack (10) including support rails (14), and a panel arrangement including partition panels (38) to form a slot partition (40) for reversibly inserting into the one slot (12), supported by the support rails (14), the slot partition (40) being formed either by unfolding the partition panels (38) or fitting the partition panels (38) together, wherein (a) the vented blanking panel (26) and at least one partition panel of the partition panels (38) are mechanically connected together, or (b) the vented blanking panel (26) includes a first connecting element (50) and the at least one partition panel (38) includes a second connecting element (52) to mechanically connect the vented blanking panel (26) and the at least one partition panel (38) together. Related apparatus and methods are also described.
Cisco Systems | Date: 2017-02-01
A method is provided in one example embodiment and may include calculating, by one or more of a plurality of small cell radios, one or more sets of candidate power control parameters using a first interference constraint for uplink user equipment (UE) transmissions for UE served by the one or more of the plurality of small cell radios; determining, at a central management entity, whether an average of a sum of an expected interference for UE associated with the plurality of small cell radios violates a second interference constraint for any of the one or more sets of candidate power control parameters; and generating one or more messages for each of the plurality of small cell radios identifying one or more particular sets of power control parameters that provide for meeting the second interference constraint.
Cisco Systems | Date: 2017-01-25
Present disclosure relates to methods for preparing BGP update messages for transmission and processing received update messages. The methods are based on grouping path attributes common to a plurality of IP address prefixes into respective sets identified with respective set identifiers and, instead of duplicating path attributes in each BGP update message, including a respective identifier referring to a certain set of path attributes provided in an earlier BGP update message when sending subsequent update messages. Grouping of path attributes into individual sets associated with respective identifiers provides significant advantages by enabling re-use of the results of previous processing on both the sending and receiving sides associated with transmission of BGP update messages. In addition, such an approach limits the amount of information transmitted in the control plane because duplicate sets of path attributes may only be transmitted once and merely be referred to in subsequent update messages.
Cisco Systems | Date: 2017-01-18
An example method is provided in one example embodiment and may include monitoring a plurality of wireless backhaul links associated with a radio access network (RAN); receiving an indication of a change in operating conditions for a first wireless backhaul link of the plurality of wireless backhaul links; determining utilization of the first wireless backhaul link based on the indication of the change in operating conditions; assessing an available capacity of each of the plurality of wireless backhaul links; and adjusting cellular loading in the RAN based, at least in part, on the utilization of the first wireless backhaul link and the available capacity of each of the plurality of wireless backhaul links.
Cisco Systems | Date: 2017-02-08
Melting information of a client device is described. The device melting includes receiving a melt message (402) at an inbox of a client device. A source of the melt message is authenticated (404) using identification information of the melt message. The client device automatically deletes client state information of the client device hi response to authenticating the source of the melt message.
Cisco Systems | Date: 2017-01-25
A method is provided in one example embodiment and may include training a statistical model representing radio access point loads or load changes for radio access points, wherein the statistical model is trained using, at least in part, historical measurement data associated with previous user equipment (UE) handovers among the radio access points and wherein the historical measurement data used to train the statistical model is gathered before and after the previous UE handovers; collecting current measurement data associated with a source radio access point and a target radio access point; and calculating a predicted load or load change for the target radio access point for one or more potential UE handovers from the source radio access point to the target radio access point for one or more UE based, at least in part, on application of the current measurement data to the trained statistical model.
Cisco Systems | Date: 2017-01-11
In one embodiment, an electronic device maintains one or more tunnel-based overlays for a communication network. The communication network includes two or more physical provider networks. The device maintains a mapping between a particular application and the one or more overlays for the communication network. The device adjusts the mapping between the particular application and the one or more overlays for the communication network. The device causes one or more routers in the communication network to route traffic for the particular application according to the adjusted mapping between the application and the one or more overlays for the communication network.
Cisco Systems | Date: 2017-04-19
In one embodiment, a method comprises detecting a traffic condition by a network device in a loop-free routing topology comprising routing arcs for reaching a destination device, each routing arc comprising a first edge, a second edge, and at least a third network device configured for routing any network traffic along the routing arc toward the destination device and exiting via any one of the first or second edges of the routing arc, the traffic condition proximate to the first edge of at least one of the routing arcs in which the network device is positioned; and the network device initiating load balancing based on sending a management frame over a data plane of the at least one routing arc toward the corresponding second edge, the management frame requesting a change in load balancing for at least one of an identified traffic class based on the detected traffic condition.
Agency: Cordis | Branch: H2020 | Program: RIA | Phase: EUJ-03-2016 | Award Amount: 2.06M | Year: 2016
Information access on the Internet is exploding. Usage is shifting to multimedia applications, social networking and IoE. Cellular networks are moving to the next generation. Networking technology is shifting towards virtualization, with SDN and NFV likely to change the infrastructure landscape. The cloud concept is transforming the Internet to a network of data centers, with a communication model consisting of computer-to-cloud-to-computer interactions. Security concerns are leading to an encryption of all traffic, wreaking havoc with established network mechanisms. In this scenario with dramatic growth and evolution, where abstractions and interfaces become fundamental, ICN is just the perfect solution. ICN2020 will build on the wealth of studies performed on ICN with six main aims: a) design and develop a set of innovative applications such as video delivery, interactive videos and social networks to exploit ICN; b) augment ICN with IoT features and cloud/CDN/virtualization services; c) accordingly enhance existing ICN solutions/architectures; d) build local and global test-bed(s) to experiment the applications, services and ICN enhancements; e) contribute to common APIs and standards, by continuing the work that project partners are already doing; and f) Industry POCs of products and services exploiting ICN. The ICN2020 consortium includes leading experts in ICN and contributors to ICN testbeds in EU, Japan and USA, thus making the goal of federating them a credible one. Partners are also coordinators of running projects on 5G and Cloud topics, allowing fruitful cooperation with fellow projects of the EU-JP1, EU-JP2 calls and increasing the overall expected impact of the EU-Japan cooperation. In a time when 5G networks are being designed, with foreseen unprecedented flexibility due to the virtualization and slice concepts, the development of compelling demonstrations of ICN for real-world use-cases will encourage critical industry investment of resources.
Agency: GTR | Branch: EPSRC | Program: | Phase: Research Grant | Award Amount: 4.56M | Year: 2016
Today we use many objects not normally associated with computers or the internet. These include gas meters and lights in our homes, healthcare devices, water distribution systems and cars. Increasingly, such objects are digitally connected and some are transitioning from cellular network connections (M2M) to using the internet: e.g. smart meters and cars - ultimately self-driving cars may revolutionise transport. This trend is driven by numerous forces. The connection of objects and use of their data can cut costs (e.g. allowing remote control of processes) creates new business opportunities (e.g. tailored consumer offerings), and can lead to new services (e.g. keeping older people safe in their homes). This vision of interconnected physical objects is commonly referred to as the Internet of Things. The examples above not only illustrate the vast potential of such technology for economic and societal benefit, they also hint that such a vision comes with serious challenges and threats. For example, information from a smart meter can be used to infer when people are at home, and an autonomous car must make quick decisions of moral dimensions when faced with a child running across on a busy road. This means the Internet of Things needs to evolve in a trustworthy manner that individuals can understand and be comfortable with. It also suggests that the Internet of Things needs to be resilient against active attacks from organised crime, terror organisations or state-sponsored aggressors. Therefore, this project creates a Hub for research, development, and translation for the Internet of Things, focussing on privacy, ethics, trust, reliability, acceptability, and security/safety: PETRAS, (also suggesting rock-solid foundations) for the Internet of Things. The Hub will be designed and run as a social and technological platform. It will bring together UK academic institutions that are recognised international research leaders in this area, with users and partners from various industrial sectors, government agencies, and NGOs such as charities, to get a thorough understanding of these issues in terms of the potentially conflicting interests of private individuals, companies, and political institutions; and to become a world-leading centre for research, development, and innovation in this problem space. Central to the Hub approach is the flexibility during the research programme to create projects that explore issues through impactful co-design with technical and social science experts and stakeholders, and to engage more widely with centres of excellence in the UK and overseas. Research themes will cut across all projects: Privacy and Trust; Safety and Security; Adoption and Acceptability; Standards, Governance, and Policy; and Harnessing Economic Value. Properly understanding the interaction of these themes is vital, and a great social, moral, and economic responsibility of the Hub in influencing tomorrows Internet of Things. For example, a secure system that does not adequately respect privacy, or where there is the mere hint of such inadequacy, is unlikely to prove acceptable. Demonstrators, like wearable sensors in health care, will be used to explore and evaluate these research themes and their tension. New solutions are expected to come out of the majority of projects and demonstrators, many solutions will be generalisable to problems in other sectors, and all projects will produce valuable insights. A robust governance and management structure will ensure good management of the research portfolio, excellent user engagement and focussed coordination of impact from deliverables. The Hub will further draw on the expertise, networks, and on-going projects of its members to create a cross-disciplinary language for sharing problems and solutions across research domains, industrial sectors, and government departments. This common language will enhance the outreach, development, and training activities of the Hub.