Cisco Technology, Inc. patent applications published on November 30th, 2023

From WikiPatents
Revision as of 06:58, 4 December 2023 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Contents

Patent applications for Cisco Technology, Inc. on November 30th, 2023

BROADBAND OPTICAL COUPLING USING DISPERSIVE ELEMENTS (18448429)

Main Inventor

Shiyi CHEN


Brief explanation

The patent application describes a system for coupling a fiber to a photonic chip using a collimating lens and an optical grating.
  • The system includes a collimating lens that takes light from a light source and makes it parallel.
  • An optical dispersion element separates the collimated light into multiple beams and directs each beam to a different section of the grating.
  • Each beam is diffracted at a different wavelength, and the angle at which it hits the grating is based on its wavelength.
  • This allows for optimal coupling between the fiber and the photonic chip.

Abstract

Embodiments include a fiber to photonic chip coupling system including a collimating lens which collimate a light transmitted from a light source and an optical grating including a plurality of grating sections. The system also includes an optical dispersion element which separates the collimated light from the collimating lens into a plurality of light beams and direct each of the plurality of light beams to a respective section of the plurality of grating sections. Each light beam in the plurality of light beams is diffracted from the optical dispersion element at a different wavelength a light beam of the plurality of light beams is directed to a respective section of the plurality of grating sections at a respective incidence angle based on the wavelength of the light beam of the plurality of light beams to provide optimum grating coupling.

ADMISSION CONTROL BASED ON UNIVERSAL REFERENCES FOR HARDWARE AND/OR SOFTWARE CONFIGURATIONS (17826411)

Main Inventor

Eric A. Voit


Brief explanation

- The patent application describes a method, computer system, and computer program product for performing admission control tasks.

- The invention involves obtaining a universal reference for an executing application, which identifies the components of the application using additional universal references. - The executing application is described by enumerating each additional universal reference and sub-component, providing a comprehensive identification of all components and sub-components. - The identified components and sub-components are then assessed to perform an admission control operation between the executing application and a second application.

Abstract

A method, computer system, and computer program product are provided for performing admission control tasks. A universal reference for an executing application is obtained, wherein the universal reference identifies one or more components of the executing application by additional universal references assigned to the one or more components. A description of the executing application is determined by enumerating each additional universal reference of the one or more components and additional sub-components, wherein the description exhaustively identifies components and sub-components of the executing application. The identified one or more components and sub-components are assessed to perform an admission control operation between the executing application and a second application.

DYNAMIC CLASSIFICATION AND OPTIMIZATION OF COMPUTING RESOURCE UTILIZATION (17826444)

Main Inventor

Vikas Nigam


Brief explanation

The patent application describes a process that monitors the access pattern of database objects on a user-connection basis and calculates a wait-time metric for database sessions for these objects.
  • The process classifies the database objects into two categories: often-used objects and not-recently-used objects.
  • It also classifies the wait-time metric for the database sessions into three levels: acceptable, warning-level, and critical-level.
  • The process generates a graphical interface that displays the wait-time metric and its classification for each user-connection pairing in the database.
  • The graphical interface also shows the number of often-used objects and not-recently-used objects associated with each user-connection pairing.

Abstract

In one embodiment, a process: monitors an access pattern of database objects on a user-connection basis; calculates a wait-time metric for database sessions for the objects; classifies a first number of often-used objects and a second number of not-recently-used objects; classifies the wait-time metric for the database sessions as a wait-time classification that is one of either: an acceptable wait-time metric, a warning-level wait-time metric, or a critical-level wait-time metric; and generates a graphical interface that indicates, for each user-connection pairing of the particular database, an associated wait-time metric and a graphical indication of an associated wait-time classification, as well as an associated first number of often-used objects and an associated second number of not-recently-used objects.

MACHINE LEARNING FOR MANAGEMENT OF POSITIONING TECHNIQUES AND RADIO FREQUENCY USAGE (17804513)

Main Inventor

Gino M. CORLETO


Brief explanation

The patent application describes techniques for improving networking in a physical space using mobile devices.
  • The system receives an indication that a mobile device is in a specific region of the physical space.
  • It determines one or more current external factors that may affect the positioning accuracy in the physical space.
  • A machine learning model is used to predict the accuracy of different positioning techniques based on the indication and external factors.
  • The system then selects the most accurate positioning technique from a set of available techniques.
  • The innovation aims to enhance networking capabilities in different physical spaces by optimizing the selection of positioning techniques.

Abstract

Techniques for improved networking are provided. An indication that a mobile device is in a first region of a physical space is received, and one or more current exogenous factors are determined for the physical space. Positioning technique accuracy is predicted for each respective positioning technique of a plurality of positioning techniques by processing the indication of the first region and the one or more current exogenous factors using a machine learning model. A first positioning technique of the plurality of positioning techniques is selected based on the predicted positioning technique accuracies.

RECONCILING COMPUTING INFRASTRUCTURE AND DATA IN FEDERATED LEARNING (17828582)

Main Inventor

Myungjin Lee


Brief explanation

The abstract describes a controller for a federated learning system that organizes the computing infrastructure as a tree structure. The controller establishes connections between datasets and nodes in the tree structure. It receives instructions to train models in the federated learning system using specific datasets and configures the system accordingly.
  • The patent application describes a controller for a federated learning system.
  • The controller organizes the computing infrastructure of the system as a tree structure.
  • It establishes associations between datasets and nodes in the tree structure.
  • The controller receives instructions to train models in the system using specific datasets.
  • It configures the system to perform the model training using the specified datasets and the tree structure.

Abstract

In one embodiment, a controller for a federated learning system represents computing infrastructure for the federated learning system as a tree structure. The controller forms associations between datasets available to the federated learning system and nodes in the tree structure. The controller receives one or more instructions to perform model training in the federated learning system with datasets specified using their associations. The controller configures, in response to the one or more instructions, the federated learning system to perform the model training using the datasets specified by the one or more instructions using the tree structure.

OPTICAL TRANSCEIVER MISCONNECTION DISCOVERY (18447692)

Main Inventor

Gudipaty Vasanta Rao


Brief explanation

The patent application describes a method for identifying misconnections between optical transceiver modules.
  • The method allows for monitoring and communication of optical transceiver characteristics between two modules, regardless of their type.
  • The purpose is to determine if the modules are correctly connected or mismatched.
  • If a mismatch is detected, the method provides information about the transceiver type of the far end module.
  • This information can be used by an installer to select and install a module that is compatible with the far end module.

Abstract

A method for optical transceiver misconnection identification that allows a simple low-level process to monitor and communicate optical transceiver characteristics information between two optical transceiver modules regardless of their transceiver type to determine if they are correctly connected or mismatched. If a mismatch is determined, the knowledge gained about the transceiver type of a far end module may be obtained (and presented to an installer) and used by an installer to select and install a module that is operationally compatible with the far end optical module.

HYBRID MODE MULTICAST ROUTING (17826525)

Main Inventor

Aaditi Ganesh Pai


Brief explanation

The patent application describes a method for hybrid mode multicast routing.
  • A switching device receives a first join request.
  • The device programs states for two different protocol modes: a source aware mode (S, G) and a non-source aware mode (*, G).
  • Based on the states associated with the non-source aware mode, the device sends a second join request.
  • The innovation allows for efficient multicast routing by combining source aware and non-source aware protocols.

Abstract

Hybrid mode multicast routing may be provided. A switching device may receive a first join. Next, in response to receiving the first join, states for a first protocol mode (e.g., (S, G)) that is source aware and state for a second protocol mode (e.g., (*, G)) that is not source aware may be programed. Then a second join may be sent based on the states associated with the second protocol mode (e.g., (*, G)).

TELEMETRY REPORTING IN VEHICLE SUPER RESOLUTION SYSTEMS (18202680)

Main Inventor

David A. Maluf


Brief explanation

- The patent application describes a system where a vehicle's processor detects a difference between predicted physical characteristics of the vehicle and actual physical characteristics indicated by telemetry data.

- The processor creates an update packet based on the relevancy of the physical characteristic to a machine learning model. - The update packet is synchronized with a second machine learning model executed by a receiver using a synchronization strategy. - The update packet is sent to the receiver via a network to update the second machine learning model.

Abstract

In one embodiment, a processor of a vehicle detects a difference between a physical characteristic of the vehicle predicted by a first machine learning-based model and a physical characteristic of the vehicle indicated by telemetry data generated by a sub-system of the vehicle. The processor forms a packet payload of an update packet indicative of the detected difference, based in part on a relevancy of the physical characteristic to the first machine learning-based model. The processor applies a synchronization strategy to the update packet, to synchronize the update packet with a second machine learning-based model executed by a receiver. The processor sends the update packet to the receiver via a network, to update the second machine learning-based model.

MULTI-FABRIC DEPLOYMENT AND MANAGEMENT PLATFORM (18447158)

Main Inventor

Uffaz Nathaniel


Brief explanation

- The technology described in this patent application allows users to automate the deployment and management of networks.

- Users can guide the automation process for any type of network deployment, starting from scratch. - The technology provides network management, visibility, and compliance verification. - A virtual representation of the network is created, based on user-provided parameters and network topology data. - The virtual representation is customizable and interactive. - The technology generates a set of expected configurations for deployment onto the network devices. - If the network deviates from the intended configurations, the technology provides configuration lines to bring it back in line. - The goal is to ensure that the network state matches the set of expected configurations.

Abstract

The present technology provides a framework for user-guided end-to-end automation of network deployment and management, that enables a user to guide the automation process for any kind of network deployment from the ground up, as well as offering network management, visibility, and compliance verification. The disclosed technology accomplishes this by creating a stateful and interactive virtual representation of a fabric using a customizable underlay fabric template instantiated with user-provided parameter values and network topology data computed from one or more connected network devices. A set of expected configurations corresponding to the user-specified underlay and overly fabric policies is then generated for deployment onto the connected network devices. Network deviations from the intended fabric policies are addressed by the provision of one or more configuration lines to be deployed onto or removed from the connected network devices to bring the network state in agreement with the set of expected configuration.

PARALLEL EXECUTION OF NETWORK SERVICES WITH OVERLAPPING DEVICE CONFIGURATION (18121965)

Main Inventor

Viktoria Fordos


Brief explanation

The patent application is about techniques, methods, and systems for managing a set of data network nodes in a Network Management System (NMS).
  • The method involves receiving a service invocation for a service transaction associated with a transaction object.
  • The network orchestrator stores service metadata as part of the transaction object.
  • It then determines if there is a service metadata conflict associated with the transaction object.
  • If there is a conflict, the service transaction is retried.
  • If there is no conflict, the service metadata is applied to one or more nodes of the data network.

Abstract

Techniques, methods, and systems for managing a set of data network nodes in a Network Management System (NMS). In some examples, a method may include receiving, at the network orchestrator, a service invocation for a service transaction associated with a transaction object; storing, by the network orchestrator, service metadata as part of the transaction object; determining whether there is a service metadata conflict associated with the transaction object; and in response to determining that there is the service metadata conflict associated with the transaction object, retrying the service transaction; or in response to determining that there is no service metadata conflict associated with the transaction object, applying the service metadata to one or more nodes of the set of data nodes.

MICRO SEGMENT IDENTIFIER INSTRUCTIONS FOR PATH TRACING OPTIMIZATION (18234276)

Main Inventor

Clarence Filsfils


Brief explanation

- The patent application describes techniques for optimizing network path tracing and network delay measurements.

- One technique involves using an IPv header option or segment identifier field as a carrier for telemetry data. - Another technique involves using an SRv6 micro-segment instruction to instruct a network node to perform path tracing actions. - Short interface identifiers can be used to trace the path of a packet through a network. - Short timestamps can be used to measure delays associated with sending a packet through a network. - These techniques can be used together to optimize network path tracing and delay measurement techniques.

Abstract

Techniques for optimizing technologies related to network path tracing and network delay measurements are described herein. Some of the techniques may include using an IPv header option and/or segment identifier field of a segment list or a TLV of a segment routing header as a telemetry data carrier. The techniques may also include using an SRv6 micro-segment (uSID) instruction to indicate to a node of a network that the node is to perform one or more path tracing actions and encapsulating the packet and forward. Additionally, the techniques may include using short interface identifiers corresponding to node interfaces to trace a packet path through a network. Further, the techniques may include using short timestamps to determine delay measurements associated with sending a packet through a network. In various examples, the techniques described above and herein may be used with each other to optimize network path tracing and delay measurement techniques.

Optimizing IPSec for Hierarchical SD-WAN (17804333)

Main Inventor

Samir Thoria


Brief explanation

The abstract describes a method performed by a software defined wide area network (SD-WAN) edge router in a hierarchical SD-WAN network.
  • The method involves originating a SD-WAN system route that includes an encryption key associated with the edge router.
  • The system route is then transmitted to one or more SD-WAN border routers.
  • The method also includes receiving a packet that is at least partially encrypted with the encryption key from one of the SD-WAN border routers.
  • The received packet is decrypted by the edge router.

Abstract

According to some embodiments, a method is performed by a software defined wide area network (SD-WAN) edge router in a hierarchical SD-WAN network comprising a plurality of edge routers and a plurality of border routers. The method comprises: originating a SD-WAN system route for advertising reachability to the edge router, the system route comprising an encryption key associated with the edge router; and transmitting the system route to one or more SD-WAN border routers. The method may further comprise: receiving a packet destined for the edge router from one of the one or more SD-WAN border routers, wherein the packet is at least partially encrypted with the encryption key associated with the edge router; and decrypting the received packet.

UNLOCKING COMPUTING RESOURCES FOR DECOMPOSABLE DATA CENTERS (18232276)

Main Inventor

Chakradhar Kar


Brief explanation

The patent application describes techniques for sending Compute Express Link (CXL) packets over Ethernet (CXL-E) in a composable data center that may have disaggregated, composable servers.
  • The techniques involve establishing a first CXL-E connection between a first server device and a multiple logical device (MLD) appliance, based on a request to bind the first server device with the MLD appliance.
  • This first CXL-E connection allows the first server device to export a computing resource to the MLD appliance.
  • The MLD appliance then indicates when the computing resource is available.
  • A second server device can then request the computing resource from the MLD appliance, and a second CXL-E connection is established for the second server device to consume or utilize the computing resource of the first server device via the MLD appliance.

Overall, the patent application presents a method for efficiently sharing computing resources between server devices in a composable data center using CXL-E connections and an MLD appliance.

Abstract

Techniques for sending Compute Express Link (CXL) packets over Ethernet (CXL-E) in a composable data center that may include disaggregated, composable servers. The techniques may include receiving, from a first server device, a request to bind the first server device with a multiple logical device (MLD) appliance. Based at least in part on the request, a first CXL-E connection may be established for the first server device to export a computing resource to the MLD appliance. The techniques may also include receiving, from the MLD appliance, an indication that the computing resource is available, and receiving, from a second server device, a second request for the computing resource. Based at least in part on the second request, a second CXL-E connection may be established for the second server device to consume or otherwise utilize the computing resource of the first server device via the MLD appliance.

PROVIDING HIGH ASSURANCE OF END-TO-END CPRI CIRCUIT IN A HIGH JITTER PACKET BASED FRONTHAUL NETWORK (17824077)

Main Inventor

Manoj Kumar


Brief explanation

The abstract describes a method for ensuring reliable packet delivery in a network with high jitter. 
  • The method involves detecting when a data packet is missing and inserting an idle packet in its place.
  • The packet playout process is continuously monitored to track the last valid packet played, the number of idle packets inserted, and the number of packets in the buffer.
  • When it is determined that no more idle packets should be inserted, a valid packet is played out.
  • This process helps maintain link integrity between network elements.

Abstract

The present disclosure is directed to ensuring end-to-end packet delivery in a Common Public Radio Interface (CPRI) circuit with a high jitter packet-based fronthaul network. In one aspect, a method includes determining, at a de-mapper, that at least one data packet scheduled to be played out is not available; inserting an idle data packet into a buffer at the de-mapper for each data packet that is not available; continuously monitoring a packet playout process to (1) identify last valid data packet played out, (2) a number of idle data packets inserted, and (3) a number of data packets currently stored in the buffer; and determining that insertion of idle data packets into the buffer should be stopped and a valid data packet to be played out; wherein inserting the idle data packet and the valid data packet ensure link integrity in data packet transmission between two network elements.

SOFTWARE DEFINED BRANCH SINGLE INTERNET PROTOCOL ORCHESTRATION (18448873)

Main Inventor

Alexander YEH


Brief explanation

The patent application is for a software defined branch single IP orchestration system and method. 
  • The system includes a controller that establishes a secure tunnel agent to an orchestrator.
  • The controller generates a single IP address on a virtual router for a virtual branch site.
  • The controller monitors the reachability of the single IP address on the virtual router.

Abstract

Systems, methods, and computer-readable media are provided for software defined branch single IP orchestration. An example method can include establishing, by a controller, a secure tunnel agent to an orchestrator, generating, by the controller, a single IP address on a virtual router for a virtual branch site, and monitoring, by the controller, reachability of the single IP address on the virtual router.

WIRELESS LAN (WLAN) PUBLIC IDENTITY FEDERATION TRUST ARCHITECTURE (18446337)

Main Inventor

Malcolm Muir Smith


Brief explanation

The patent application describes a process for evaluating different identity providers (IDPs) and their credentials for authenticating users in Wi-Fi identity federations.
  • The process helps with onboarding different IDPs by determining a person's electronic identity and attributes using a standard.
  • Once trust is established for a user, it can be utilized across multiple systems, such as single-sign on.
  • The same trust determination can be used without re-evaluating the authenticity of the user identity for each new access request.

Abstract

The disclosed technology relates to a process of evaluating any number of different identity providers (IDPs) and their respective set of credentials that are used to authenticate corresponding users to assist with the onboarding of the different IDPs in connection with Wi-Fi identity federations. In particular, the process allows a person's electronic identity and attributes (stored across one or more IDPs) to be determined once using a standard. Once trust has been established for the user, that trust can then be utilized across a number of different systems (e.g., Single-sign on). The same trust determination can be used without the need for the authenticity of the user identity to be re-evaluated with each new access request.

Systems and Methods for Application Clustering Based on Included Libraries and Observed Events (17752987)

Main Inventor

Ashutosh Kulshreshtha


Brief explanation

- The patent application describes a system that suggests proactive security policies for applications based on their software composition and runtime behavior.

- The system includes a memory and a processor, and it can access data representing the features of an application running on a computer network. - The features represent the application libraries of the nodes in the network. - The system applies a clustering algorithm to the data to generate multiple cluster sets. - It then determines a security policy to apply to a cluster set and applies it to an application whose features are represented by the data in that cluster set.

  • The system provides proactive security policy suggestions for applications.
  • It considers the software composition and runtime behavior of the applications.
  • It can analyze the features of an application running on a computer network.
  • It clusters the data representing the features to generate multiple cluster sets.
  • It determines and applies a security policy to each cluster set.
  • The security policy is applied to the applications whose features are represented by the data in the cluster set.

Abstract

A system of one embodiment that provides proactive security policy suggestions for applications based on the applications' software composition and runtime behavior. The system includes a memory and a processor. The system is operable to access data that represents one or more features of an application. The application is running on one or more nodes in a computer network, and a feature indicates an application library of the node. The system is operable to apply a clustering algorithm to the data to generate a plurality of cluster sets. The system is operable to determine a security policy to apply to a cluster set of the plurality of cluster sets and apply the security policy to an application whose features are represented by the data in the cluster set.

NETWORK COMPLIANCE AND ADMISSION CONTROL (18361779)

Main Inventor

Malcolm M. SMITH


Brief explanation

The abstract of this patent application describes a device that includes a memory and a hardware processor. The device is able to determine if a computing device, which is connected to an access point, performs an action that goes against the access point's multi-user uplink policy. If such an action is detected, the device will send a disciplinary message to the computing device.
  • Device includes memory and hardware processor
  • Determines if a computing device connected to an access point performs an action
  • Action must deviate from the access point's multi-user uplink policy
  • Sends a disciplinary message to the computing device if the action is detected

Abstract

A device includes a memory and a hardware processor communicatively coupled to the memory. The hardware processor determines that a computing device communicatively coupled to an access point performed an action with respect to the access point and in response to determining that the action causes a deviation from a multi-user uplink policy of the access point, transmits a disciplinary message to the computing device.

APPLICATION ROUTING BASED ON USER EXPERIENCE METRICS LEARNED FROM CALL TRANSCRIPTS (17828141)

Main Inventor

Grégory Mermoud


Brief explanation

- This patent application describes a device that analyzes call transcripts from an online application to identify cues indicating a poor user experience.

- The device then uses these cues to create a model that can predict poor user experience based on network path telemetry data for the online application. - Based on the predictions made by the model, the device can route traffic for the online application along a specific network path. - The goal of this innovation is to improve user experience by optimizing network paths for the online application.

Abstract

In one embodiment, a device obtains call transcripts from an online application. The device detects cues within the call transcripts that are indicative of poor user experience. The device generates, based in part on the cues detected within the call transcripts, a model trained to predict poor user experience from network path telemetry for the online application. The device causes traffic for the online application to be routed along a particular network path, based on a prediction by the model.

DIFFERENTIATED TIME-DIFFERENCE OF ARRIVAL FOR ULTRA-WIDEBAND (UWB) (17929791)

Main Inventor

Jerome Henry


Brief explanation

- The patent application is about providing differentiated time-difference of arrival for Ultra-Wideband (UWB) technology.

- It involves broadcasting location tracking information for a venue to user devices. - The broadcast includes notifying the user device that it is expected to provide location information and providing the identity of the entity seeking the information. - The user device then sends a ranging message in response to detecting the location tracking information. - The patent application aims to determine the position of the user device within the venue based on the ranging message.

Abstract

Differentiated time-difference of arrival for Ultra-Wideband (UWB) may be provided. A location tracking information for a venue may be broadcasted. Broadcasting the location tracking information may include notifying a user device that a location information is expected from the user device and providing an entity identity of an entity seeking the location information from the user device. A ranging message may then be received from the user device in response to the user device detecting the location tracking information. A position of the user device on the venue may be determined from the ranging message.

FACILITATING VISITED NETWORK SELECTION BY A USER EQUIPMENT BASED ON SLICE CONSIDERATIONS (18449108)

Main Inventor

Srinath Gundavelli


Brief explanation

The patent application describes techniques for a user equipment (UE) to select a network connection based on slice considerations while roaming among multiple visited mobile networks. 
  • The UE requests registration for a network connection associated with a specific slice type.
  • The UE obtains information from its home mobile network, including the priority for each visited mobile network and the slice types provided by each visited mobile network.
  • The UE selects the visited mobile network with the highest priority that offers the desired slice type.
  • The UE establishes a network connection with the selected visited mobile network.

Abstract

Presented herein are techniques to facilitate visited network selection by a user equipment (UE) based on slice considerations. In one example, a method may include requesting, by a UE that is roaming among a plurality of visited mobile networks, registration for a network connection associated with a slice type; obtaining, by the UE from home mobile network for the UE, a priority for each of the plurality of visited mobile networks and an indication of one or more slice types provided by each of the plurality of visited mobile networks; selecting, by the UE, a highest priority visited mobile network of the plurality of visited mobile networks that provides the slice type; and establishing, by the UE, the network connection with the highest priority visited mobile network of the plurality of visited mobile networks that provides the slice type.

SELECTIVE NETWORK SLICE AUTHENTICATION AND AUTHORIZATION IN A MOBILE NETWORK ENVIRONMENT (17752182)

Main Inventor

Vimal Srivastava


Brief explanation

The patent application describes techniques for selective network slice authentication and authorization in a mobile network environment.
  • The techniques aim to simplify the authentication process for user equipment seeking access to multiple network slices.
  • The method involves obtaining a registration request from the user equipment, which identifies the network slices requiring authentication.
  • If authentication with a first network slice is successful, authentication with other network slices can be skipped.
  • This selective authentication process helps to reduce the authentication overhead and improve efficiency.
  • The access management element of the mobile network is responsible for implementing these techniques.
  • The method ensures that once authentication with the first network slice is successful, the user equipment can access the other network slices without going through the authentication process again.

Abstract

Presented herein are techniques to provide selective network slice authentication and authorization in a mobile network environment. In one example, a method may include obtaining, by an access management element of a mobile network, a registration request from a user equipment, wherein the registration request identifies a plurality of network slices with which the user equipment seeks authentication; determining that if authentication for the user equipment with a first network slice is successful, authentication for the user equipment with one or more other network slices can be skipped; and upon successful authentication for the user equipment with the first network slice, skipping authentication for the user equipment with the one or more other network slices.

USER EQUIPMENT (UE) POLICY FOR SELECTION OF RADIO ACCESS TECHNOLOGY (RAT) TYPE FOR MOBILITY FROM NON-3GPP TO 3GPP ACCESSES (17752411)

Main Inventor

Irfan Ali


Brief explanation

- The patent application describes a method for communicating a user equipment (UE) policy to a UE.

- The UE policy, called UE Route Selection Policy (URSP), includes a policy rule that associates an application and/or its traffic with a routing policy for 3GPP access. - When the UE needs to communicate the traffic of the application via non-3GPP access, it sends an attach request message with a request type indicating "handover" to trigger a handover of the communication session from non-3GPP access to 3GPP access. - The attach request message is sent via a selected radio access network (RAN) corresponding to the indicated radio access technology (RAT) type in the routing policy. - In cases where Voice over NR (VoNR) is not available, the indicated RAT type in the routing policy may be set to indicate an E-UTRAN.

Abstract

In one illustrative example, a user equipment (UE) policy may be communicated to a UE. The UE policy may be a UE Route Selection Policy (URSP) which includes a policy rule that associates an application and/or traffic thereof with a routing policy comprising an indicated radio access technology (RAT) type for 3GPP access. When the UE operates to communicate the traffic in a communication session for the application via non-3GPP access, a message which indicates an attach request with a request type indicating “handover” may be received from the UE via a selected radio access network (RAN) corresponding to the indicated RAT type. The message is for triggering a handover of the communication session for the application from the non-3GPP access to the 3GPP access. In one scenario, when Voice over NR (VoNR) is unavailable, the indicated RAT type of the routing policy may be set to indicate an E-UTRAN.

COOLING FAN ASSEMBLY WITH AIR GUIDER (17826520)

Main Inventor

Vic Hong Chia


Brief explanation

The patent application describes a fan assembly that includes a fan, a housing, and an air guider.
  • The fan draws air into its intake and propels it out through the fan exit.
  • The housing is connected to the fan exit and has an inlet and an outlet.
  • The air guider is mounted inside the housing near the inlet and has a conical shape.
  • The air guider tapers from a larger diameter at the base to a smaller diameter at the apex.
  • The smaller diameter of the air guider is less than the diameter of the housing, creating a peripheral volume around the air guider.
  • This peripheral volume acts as a tunnel for the air.
  • The air guider is designed to reduce turbulence of the air as it moves from the inlet to the outlet of the housing.

Abstract

A fan assembly comprises: a fan having a fan intake and a fan exit downstream from the fan intake, wherein the fan is configured to draw air into the fan intake and propel the air downstream through the fan exit; a housing having a housing inlet configured to be coupled to the fan exit and a housing outlet downstream from the housing inlet; and an air guider, mounted inside the housing adjacent to the housing inlet, having a conical shape with a base adjacent to the housing inlet and an apex opposite the base that points towards the housing outlet, wherein the air guider has a first diameter that tapers from the base to the apex, wherein the first diameter is less than a second diameter of the housing to define a peripheral volume surrounding the air guider that serves as a tunnel, wherein the air guider is configured to reduce air turbulence of the air when the air propelled from the housing inlet to the housing outlet.

RACK-MOUNTABLE HEAT-EXCHANGER FOR MODULAR ELECTRONIC SYSTEMS (18448778)

Main Inventor

Rohit Dev GUPTA


Brief explanation

The abstract describes a heat-exchanger for modular electronic systems that can be mounted on a rack.
  • The heat exchanger has separate paths for ambient air and recirculating air.
  • The housing for the electronic device has its own internal airflow path.
  • Ducts are used to connect the recirculating air and internal air paths.
  • Fan assemblies are placed in the airflow paths to propel air through the heat exchanger.

Abstract

A rack-mountable heat-exchanger for modular electronic systems is provided that include a heat exchanger including ambient air inlets and outlets forming an ambient airflow path in a first direction, and recirculating air inlets and outlets forming a recirculating airflow path in a second direction perpendicular to the first direction separated from the ambient airflow path; housing for an electronic device, the housing including internal air inlets and outlets forming an internal airflow path; a first duct configured to link the recirculating air outlet to the internal air inlet; a second duct configured to link the recirculating air inlet to the internal air outlet; and fan assemblies located one of the airflow path, configured to propel air through the heat exchanger in the respective airflow path.