Extreme Networks Patent Applications

MULTI-ACCESS EDGE COMPUTING BASED VISIBILITY NETWORK

Granted: March 14, 2024
Application Number: 20240089173
Disclosed herein are system, method, and computer program product embodiments for providing traffic visibility in a network. An embodiment operates by a third-party component receiving a copy of a first data packet during a first period of time. The third-party component extracts a first network parameter associated with the first period of time from the copy of the first data packet. The third-party component then predicts a baseline of normalcy for the first network parameter during a…

ONLINE ANOMALY DETECTION OF VECTOR EMBEDDINGS

Granted: February 22, 2024
Application Number: 20240064165
Disclosed herein are system, method, and computer program product embodiments for providing an anomaly detection system. Some aspects of this disclosure include a method for detecting anomaly in a network device. The method includes determining one or more similarity values between a flow vector corresponding to a flow associated with the network device and one or more flow clusters associated with the network device. The method further includes determining a maximum similarity value as…

Network Device Mounting

Granted: February 8, 2024
Application Number: 20240047848
A mounting device configured to be integrated with a network device to facilitate mounting of the network device is disclosed. In an embodiment, the mounting device is a twist-to-lock mounting device configured to be compatible with one or more standard types of ceiling rails, allowing network devices to be mounted in a non-destructive manner without requiring the use of tools.

Network Device Mounting

Granted: February 8, 2024
Application Number: 20240047848
A mounting device configured to be integrated with a network device to facilitate mounting of the network device is disclosed. In an embodiment, the mounting device is a twist-to-lock mounting device configured to be compatible with one or more standard types of ceiling rails, allowing network devices to be mounted in a non-destructive manner without requiring the use of tools.

MAC-BASED REDISTRIBUTION IN MULTI-AREA NETWORKS

Granted: November 30, 2023
Application Number: 20230388229
Provided herein are systems and methods for providing a MAC-based redistribution policy between networks in a multi-area network. A network can have a boundary node that communicates to neighboring networks. Boundary nodes can receive policy updates that identify which services are redistributable across network boundaries. Boundary nodes can receive a packet for a service, translate the packet's encapsulation, and forward the packet across the boundary towards a destination node.…

TRUST CHAIN PRESERVATION FOR REMOTE ATTESTATION

Granted: October 12, 2023
Application Number: 20230325509
Disclosed herein are system, method, and computer program product embodiments for verifying the integrity of a boot process without relying on a boot aggregate value. An embodiment operates by cryptographically validating, by a hardware root of trust, a first code module associated with a digital signature. The embodiment determines that the first code module was cryptographically validated and cryptographically measures the first code module thereby generating a first measurement. The…

ROOT-CAUSE ANALYSIS OF EVENT OCCURRENCES

Granted: April 20, 2023
Application Number: 20230124196
Provided herein are systems and methods for determining relationships between events occurring in networks. Notifications describing events occurring in networks can be received and processed to determine groups of network event types. A root-cause network can be generated based on the events, with the nodes of the root-cause network representing different event types and the edges of the root-cause network indicating directional, causal relationships between the nodes. A received…

SYSTEMS AND METHODS FOR ZERO-FOOTPRINT LARGE-SCALE USER-ENTITY BEHAVIOR MODELING

Granted: January 5, 2023
Application Number: 20230006892
Systems and methods are disclosed herein for reducing storage space used in tracking behavior of a plurality of network endpoints by modeling the behavior with a behavior model. To this end, control circuitry may determine a respective network endpoint, of a plurality of network endpoints, to which each respective record of a plurality of received records corresponds. The control circuitry then may assign a dedicated queue for each respective network endpoint, and transmit, to each…

ROOT-CAUSE ANALYSIS OF EVENT OCCURRENCES

Granted: September 29, 2022
Application Number: 20220311657
Provided herein are systems and methods for determining relationships between events occurring in networks. Notifications describing events occurring in networks can be received and processed to determine groups of network event types. A root-cause network can be generated based on the events, with the nodes of the root-cause network representing different event types and the edges of the root-cause network indicating directional, causal relationships between the nodes. A received…

SYSTEMS AND METHODS FOR DETERMINING FLOW AND PATH ANALYTICS OF AN APPLICATION OF A NETWORK USING SAMPLED PACKET INSPECTION

Granted: March 17, 2022
Application Number: 20220086067
Systems and methods are disclosed herein for monitoring health of each switch of a plurality of switches on a network by selectively mirroring packets transmitted by each switch of the plurality of switches. In some embodiments, control circuitry generates a plurality of mirroring parameters, each mirroring parameter comprising an instruction to mirror a respective type of packet. The control circuitry transmits the plurality of mirroring parameters to each switch of the plurality of…

NETWORK DEVICE MOUNTING

Granted: September 23, 2021
Application Number: 20210296755
A mounting device configured to be integrated with a network device to facilitate mounting of the network device is disclosed. In an embodiment, the mounting device is a twist-to-lock mounting device configured to be compatible with one or more standard types of ceiling rails, allowing network devices to be mounted in a non-destructive manner without requiring the use of tools.

Online Anomaly Detection of Vector Embeddings

Granted: August 5, 2021
Application Number: 20210243210
Disclosed herein are system, method, and computer program product embodiments for providing an anomaly detection system. Some aspects of this disclosure include a method for detecting anomaly in a network device. The method includes determining one or more similarity values between a flow vector corresponding to a flow associated with the network device and one or more flow clusters associated with the network device. The method further includes determining a maximum similarity value as…

SELECTIVE POLICY NETWORK DEVICE OPERATION

Granted: June 17, 2021
Application Number: 20210185148
Techniques for synchronizing a network device to selectively operate according to a selectable operation policy. A system utilizing such techniques can a self-configuring network device operation coordination system and a self-configuring network device operation management system. A method utilizing such techniques can include synchronizing a network device to selectively operate according to a first operation policy and a second operation policy in providing network service access.

ARCHITECTURE FOR A NETWORK VISIBILITY SYSTEM

Granted: May 27, 2021
Application Number: 20210160181
Aspects of the present disclosure provide a suitable architecture for a router controller which configures forwarding rules in a packet router of a network visibility system. In an embodiment, the router controller contains multiple controller blocks, with each controller block to examine a corresponding set of packets and to generate a respective set of forwarding rules for configuring the packet router. The router controller may also contain a switch to receive multiple packets and to…

PLUG-IN NETWORK DEVICE

Granted: March 18, 2021
Application Number: 20210084712
A plug-in network device is disclosed. The plug-in network device can be used in association with a network management system and an infrastructure network device. The plug-in network device includes two antenna arrays, one of which is up-facing and one of which is front-facing. The plug-in network device can achieve wireless communication with the infrastructure network device via the up-facing antenna array and provide network services to wireless stations through the front-facing…

ANTENNA PATTERN MATCHING AND MOUNTING

Granted: September 17, 2020
Application Number: 20200295806
A technique for improving wireless communication characteristics involving matching transmitter antenna patterns to receiver antenna patterns. In a specific implementation, the transmitter antenna pattern adapts to changing parameters, such as when a smartphone is initially held in a first orientation and is later held in a second orientation. Because the transmitter antenna pattern matches receiver antenna patterns, signal quality between stations improves. In some implementations,…

Automated Closed-Loop Actions in a Network Using a Distributed Ledger

Granted: August 27, 2020
Application Number: 20200274765
Disclosed herein are system, method, and computer program product embodiments for analyzing a network. An embodiment operates by a third-party component deriving network data based on a received data packet from a network component configured to perform a network function. The third-party component orders a transaction including second network data from a distributed ledger. The third-party component determines that the first and second network data meet or exceed a condition of a smart…

Forwarding Table Management

Granted: August 20, 2020
Application Number: 20200267081
Disclosed herein are system, method, and computer program product embodiments for representing a forwarding information base (FIB) in a database. An embodiment operates by organizing forwarding entries of the FIB in a trie data structure. The embodiment determines that a first routing prefix of a first forwarding entry in the trie data structure is a less specific routing prefix than a second routing prefix in a second forwarding entry in the trie data structure based on the first…

Correlating and Load Balancing IMS Traffic in a Visibility Network

Granted: November 28, 2019
Application Number: 20190364101
Techniques for correlating and load balancing IMS traffic in a visibility network are provided. According to one set of embodiments, a packet broker of the visibility network can receive IMS traffic replicated from an IMS core network and identify control/data packets in the IMS traffic that are part of the same IMS session based on FROM and TO user identities included in the packets. The packet broker can then generate a unique session identifier for the IMS session and add the…

Near-Uniform Load Balancing in a Visibility Network via Usage Prediction

Granted: September 26, 2019
Application Number: 20190297520
Techniques for performing near-uniform load balancing in a visibility network based on usage prediction are provided. According to one embodiment, a packet broker of the visibility network can receive a control packet replicated from a core network, where the control packet includes a user or device identifier and a request to create a user session for a user identified by the user/device identifier. The packet broker can further determine, based on the user/device identifier and one or…