11
Ganesh Sundaram
Vikram Devdas, Hitesh Amin, John Diab, Marc Bennett, Ganesh Sundaram, Thomas Eric Ryle: Method and system for efficient flow control for client data frames over GFP across a SONET/SDH transport path. Cisco Technology, Ritter Lang & Kaplan, January 6, 2005: US20050002338-A1

A method and system for flow control of GFP-encapsulated client data frames over SONET/SDH transport networks is described. Transport interfaces, in the form of port cards, have FIFO buffers for receiving the GFP frames. In acknowledgment of the received frames, a transmitting transport interface re ...


12
Silvano Gai, Keith McCloghrie: Method and apparatus for defining and implementing high-level quality of service policies in computer networks. Cisco Technology, Cesari and McKenna, December 26, 2000: US06167445 (585 worldwide citation)

A computer network having multiple, dissimilar network devices includes a system for implementing high-level, network policies. The high-level policies, which are generally device-independent, are translated by one or more policy servers into a set of rules that can be put into effect by specific ne ...


13
James A Aviani Jr: Data transmission over the internet using a cache memory file system. Cisco Technology, Beyer & Weaver, September 7, 1999: US05950205 (560 worldwide citation)

A method for storing a plurality of multimedia objects in a cache memory is described. First ones of the multimedia objects are written into the cache memory sequentially from the beginning of the cache memory in the order in which they are received. When a first memory amount from a most recently s ...


14
Robert E Gleichauf, William A Randall, Daniel M Teal, Scott V Waddell, Kevin J Ziese: Method and system for adaptive network security using network vulnerability assessment. Cisco Technology, Baker Botts L, October 9, 2001: US06301668 (440 worldwide citation)

A method and system for adaptive network security using network vulnerability assessment is disclosed. The method comprises directing a request onto a network. A response to the request is assessed to discover network information. A plurality of analysis tasks are prioritized based upon the network ...


15
Scott L Wiegel: Graphical network security policy management. Cisco Technology, Hickman Palermo Truong & Becker, November 19, 2002: US06484261 (410 worldwide citation)

A method of establishing a representation of an abstract network security policy is disclosed. The representation is established in the form of a decision tree that is constructed by assembling graphical symbols representing policy actions and policy conditions. A user modifies properties of the gra ...


16
Steven D Shanklin, Thomas E Bernhard, Gerald S Lathem: Intrusion detection signature analysis using regular expressions and logical operators. Cisco Technology, Baker Botts L, November 26, 2002: US06487666 (401 worldwide citation)

A method of describing intrusion signatures, which are used by an intrusion detection system to detect attacks on a local network. The signatures are described using a “high level” syntax having features in common with regular expression and logical expression methodology. These high level signature ...


17
John C Mayes, Brantley W Coile: Security system for network address translation systems. Cisco Technology, Beyer & Weaver, August 11, 1998: US05793763 (388 worldwide citation)

A system and method are provided for translating local IP addresses to globally unique IP addresses. This allows local hosts in an enterprise network to share global IP addresses from a limited pool of such addresses available to the enterprise. The translation is accomplished by replacing the sourc ...


18
Serene Fan, Steve Truong: Access control for networks. Cisco Technology, Bever Weaver & Thomas, April 17, 2001: US06219706 (361 worldwide citation)

An access control system (a firewall) controls traffic to and from a local network. The system is implemented on a dedicated network device such as a router positioned between a local network and an external network, usually the Internet, or between one or more local networks. In this procedure, acc ...


19

20
Shankar Natarajan, Andrew G Harvey, Hsuan Chung Lee, Vipin Rawat, Leo Pereira: Technique for providing dynamic modification of application specific policies in a feedback-based, adaptive data network. Cisco Technology, Beyer Weaver & Thomas, July 20, 2004: US06765864 (339 worldwide citation)

A feedback-based adaptive network is described wherein at least a portion of the network elements report operating information relating to network conditions to a centralized data store. The information which is reported to the data store is analyzed by a policy engine which includes a plurality of ...