Ganesh Sundaram
Vikram Devdas, Hitesh Amin, John Diab, Marc Bennett, Ganesh Sundaram, Thomas Eric Ryle: Method and system for efficient flow control for client data frames over GFP across a SONET/SDH transport path. Cisco Technology, Ritter Lang & Kaplan, January 6, 2005: US20050002338-A1

A method and system for flow control of GFP-encapsulated client data frames over SONET/SDH transport networks is described. Transport interfaces, in the form of port cards, have FIFO buffers for receiving the GFP frames. In acknowledgment of the received frames, a transmitting transport interface re ...

Silvano Gai, Keith McCloghrie: Method and apparatus for defining and implementing high-level quality of service policies in computer networks. Cisco Technology, Cesari and McKenna, December 26, 2000: US06167445 (583 worldwide citation)

A computer network having multiple, dissimilar network devices includes a system for implementing high-level, network policies. The high-level policies, which are generally device-independent, are translated by one or more policy servers into a set of rules that can be put into effect by specific ne ...

James A Aviani Jr: Data transmission over the internet using a cache memory file system. Cisco Technology, Beyer & Weaver, September 7, 1999: US05950205 (552 worldwide citation)

A method for storing a plurality of multimedia objects in a cache memory is described. First ones of the multimedia objects are written into the cache memory sequentially from the beginning of the cache memory in the order in which they are received. When a first memory amount from a most recently s ...

Robert E Gleichauf, William A Randall, Daniel M Teal, Scott V Waddell, Kevin J Ziese: Method and system for adaptive network security using network vulnerability assessment. Cisco Technology, Baker Botts L, October 9, 2001: US06301668 (435 worldwide citation)

A method and system for adaptive network security using network vulnerability assessment is disclosed. The method comprises directing a request onto a network. A response to the request is assessed to discover network information. A plurality of analysis tasks are prioritized based upon the network ...

Scott L Wiegel: Graphical network security policy management. Cisco Technology, Hickman Palermo Truong & Becker, November 19, 2002: US06484261 (406 worldwide citation)

A method of establishing a representation of an abstract network security policy is disclosed. The representation is established in the form of a decision tree that is constructed by assembling graphical symbols representing policy actions and policy conditions. A user modifies properties of the gra ...

Steven D Shanklin, Thomas E Bernhard, Gerald S Lathem: Intrusion detection signature analysis using regular expressions and logical operators. Cisco Technology, Baker Botts L, November 26, 2002: US06487666 (392 worldwide citation)

A method of describing intrusion signatures, which are used by an intrusion detection system to detect attacks on a local network. The signatures are described using a “high level” syntax having features in common with regular expression and logical expression methodology. These high level signature ...

John C Mayes, Brantley W Coile: Security system for network address translation systems. Cisco Technology, Beyer & Weaver, August 11, 1998: US05793763 (384 worldwide citation)

A system and method are provided for translating local IP addresses to globally unique IP addresses. This allows local hosts in an enterprise network to share global IP addresses from a limited pool of such addresses available to the enterprise. The translation is accomplished by replacing the sourc ...

Serene Fan, Steve Truong: Access control for networks. Cisco Technology, Bever Weaver & Thomas, April 17, 2001: US06219706 (349 worldwide citation)

An access control system (a firewall) controls traffic to and from a local network. The system is implemented on a dedicated network device such as a router positioned between a local network and an external network, usually the Internet, or between one or more local networks. In this procedure, acc ...


Kent K Leung: Mobile IP mobility agent standby protocol. Cisco Technology, Beyer Weaver & Thomas, February 27, 2001: US06195705 (332 worldwide citation)

Disclosed is a method and apparatus for automatically backing up a Home Agent in Mobile IP. The method employs important components of the widely-used Hot Standby Router Protocol, but extends it to include synchronization of the mobility binding table between an active Home Agent and a standby Home ...

Click the thumbnails below to visualize the patent trend.