Juniper Networks Patent Applications

METHODS AND APPARATUS FOR REDUCING ENERGY CONSUMPTION OF NETWORK EQUIPMENT

Granted: January 26, 2017
Application Number: 20170023999
In some embodiments, an equipment unit has a set of visual indicators, a power switch, and a set of compute components. The power switch receives a signal representing a status such that when the status is in a first mode, the power switch provides power to the set of visual indicators and when the status is in a second mode the power switch does not provide power to the set of visual indicators. The compute components are configured to receive power when the power switch does not…

METHODS AND APPARATUS FOR STANDARD PROTOCOL VALIDATION MECHANISMS DEPLOYED OVER A SWITCH FABRIC SYSTEM

Granted: December 22, 2016
Application Number: 20160373307
An apparatus includes a destination edge device configured to receive a first validation packet according to a switch fabric validation protocol. The destination edge device is configured to validate multiple data paths through a distributed switch fabric from a source edge device to the destination edge device based on the first validation packet. The destination edge device is configured to send, in response to receiving the first validation packet, a second validation packet to a…

METHODS AND APPARATUS FOR IMPLEMENTING CONNECTIVITY BETWEEN EDGE DEVICES VIA A SWITCH FABRIC

Granted: December 22, 2016
Application Number: 20160373347
In some embodiments, an apparatus includes a first edge device that is operatively coupled to a second edge device via a switch fabric. The first edge device and the second edge device collectively define an edge device network operating with a network-address-based protocol. The first edge device communicates with the second edge device via a multiprotocol label switching (MPLS) tunnel through the switch fabric. Furthermore, the first edge device is operatively coupled to the switch…

METHODS AND APPARATUS FOR A CONVERGED WIRED/WIRELESS ENTERPRISE NETWORK ARCHITECTURE

Granted: October 20, 2016
Application Number: 20160308763
In some embodiments, an apparatus comprises a core network node and a control module within an enterprise network architecture. The core network node is configured to be operatively coupled to a set of wired network nodes and a set of wireless network nodes. The core network node is configured to receive a first tunneled packet associated with a first session from a wired network node from the set of wired network nodes. The core network node is configured to also receive a second…

METHODS AND APPARATUS RELATED TO A DISTRIBUTED SWITCH FABRIC

Granted: September 1, 2016
Application Number: 20160255019
A method of sending data to a switch fabric includes assigning a destination port of an output module to a data packet based on at least one field in a first header of the data packet. A module associated with a first stage of the switch fabric is selected based on at least one field in the first header. A second header is appended to the data packet. The second header includes an identifier associated with the destination port of the output module. The data packet is sent to the module…

METHODS AND APPARATUS FOR MONITORING AND CONTROLLING THE PERFORMANCE OF OPTICAL COMMUNICATION SYSTEMS

Granted: August 11, 2016
Application Number: 20160233953
In some embodiments, an apparatus includes an optical detector that can sample asynchronously an optical signal from an optical component that can be either an optical transmitter or an optical receiver. In such embodiments, the apparatus also includes a processor operatively coupled to the optical detector, where the processor can calculate a metric value of the optical signal without an extinction ratio of the optical signal being measured. The metric value is proportional to the…

DETECTING AND PREVENTING MAN-IN-THE-MIDDLE ATTACKS ON AN ENCRYPTED CONNECTION

Granted: July 28, 2016
Application Number: 20160218881
A client device may provide, to a host device, a request to access a website associated with a host domain. The client device may receive, based on the request, verification code that identifies a verification domain and a resource, associated with the verification domain, to be requested to verify a public key certificate. The verification domain may be different from the host domain. The client device may execute the verification code, and may request the resource from the verification…

Apparatus and Method of Compensating for Clock Frequency and Phase Variations by Processing Packet Delay Values

Granted: July 21, 2016
Application Number: 20160211937
An apparatus and method are described for compensating for frequency and phase variations of electronic components by processing packet delay values. In one embodiment, a packet delay determination module determines packet delay values based on time values associated with a first and a second electronic component. A packet delay selection module selects a subset of the packet delay values based on the maximum frequency drift of the first electronic component. A statistical parameter…

METHODS AND APPARATUS FOR DYNAMIC RESOURCE MANAGEMENT WITHIN A DISTRIBUTED CONTROL PLANE OF A SWITCH

Granted: June 23, 2016
Application Number: 20160182278
In some embodiments, a switch fabric system includes multiple access switches configured to be operatively coupled to a switch fabric. The multiple access switches include multiple ports each to be operatively coupled to a peripheral processing device. A first set of ports from the multiple ports and a second set of ports from the multiple ports are managed by a first network control entity when the switch fabric system is in a first configuration. The first set of ports is managed by…

METHODS AND APPARATUS FOR TRACKING DATA FLOW BASED ON FLOW STATE VALUES

Granted: June 9, 2016
Application Number: 20160164765
In one embodiment, a processor-readable medium storing code representing instructions that when executed by a processor cause the processor to update, at a memory location, a first flow state value associated with a data flow to a second flow state value when at least one of a packet from the data flow is received or the memory location is selected after a time period has expired. At least a portion of the packet is analyzed when the second flow state value represents a flow rate of a…

METHODS AND APPARATUS FOR SPECTRAL SCANNING WITHIN A NETWORK

Granted: June 9, 2016
Application Number: 20160165525
In some embodiments, an apparatus includes a spectral scanning controller configured to interrupt service at a wireless access point (WAP) such that the WAP performs spectral scanning during service interruption. The spectral scanning controller is configured to interrupt service at the WAP at a first scanning frequency when the spectral scanning controller is in a first configuration. The spectral scanning controller is configured to interrupt service at the WAP at a second scanning…

REMOVABLE FAN TRAY

Granted: June 2, 2016
Application Number: 20160157380
Fan trays and components thereof are described herein. In some embodiments, a removable, compact fan tray is configured to be disposed within a slot of a chassis. The fan tray can be latchably coupled to the chassis, and/or can include a light source, such as an LED operable to depict the status of the fan tray. Leads of the light source can be disposed within an sleeve operable to contain and/or insulate the leads. The fan tray can, in some embodiments, be configured to be keyed to a…

METHODS AND APPARATUS FOR AUTOMATICALLY PROVISIONING RESOURCES WITHIN A DISTRIBUTED CONTROL PLANE OF A SWITCH

Granted: May 12, 2016
Application Number: 20160134565
In some embodiments, a network management module is operatively coupled to a set of edge devices that are coupled to a set of peripheral processing devices. The network management module can receive a signal associated with a broadcast protocol from an edge device from the set of edge devices in response to that edge device being operatively coupled to a switch fabric. The network management module can provision that edge device in response to receiving the signal. The network management…

CONTROLLER-TO-CONTROLLER INTERFACE FOR MULTI-LAYER NETWORK ABSTRACTION

Granted: April 21, 2016
Application Number: 20160112271
A controller at an IP (e.g., client) layer in a multi-layer network can request a network topology map from another controller at an optical (e.g., server) layer in the multi-layer network. The controller at the optical layer of the network can use a layer mapping function and common attributes between the formats used to describe the network topology map at the two layers to generate a common layer abstraction model representing the network topology map stored at the controller at the…

METHODS AND APPARATUS FOR CONTROLLING WIRELESS ACCESS POINTS

Granted: April 21, 2016
Application Number: 20160113006
In some embodiments, an apparatus comprises of a first Control And Provisioning of Wireless Access Points (CAPWAP) module implemented in at least one of a memory or a processing device that is configured to be designated as a backup control module for a wireless access point during a first time period. The first CAPWAP control module is configured to receive state information associated with the wireless access point during the first time period from a second CAPWAP control module. The…

METHODS AND APPARATUS FOR CHANNEL SELECTION WITHIN A WIRELESS NETWORK

Granted: April 7, 2016
Application Number: 20160100416
In some embodiments, a method includes calculating, at a wireless access point (WAP) from a set of WAPs within a network, an interference value for each channel from a set of channels of the WAP. The method includes calculating, based on the interference value for each channel, a total move weight of the WAP. The method includes receiving, at the WAP, a total move weight from each remaining WAP. The method includes selecting one WAP from the set of WAPs based on a random number, the…

METHODS AND APPARATUS FOR IMPROVING COMPATIBILITY BETWEEN NETWORK DEVICES

Granted: January 14, 2016
Application Number: 20160011862
In some embodiments, an apparatus includes a network device configured to receive an anomaly database of a first image that stores a set of differences between the first image and a base image. The network device is configured to compare the anomaly database of the first image with an anomaly database of a second image storing a set of differences between the second image and the base image to determine if the first and second images include at least one incompatible critical feature or…

METHODS AND APPARATUS FOR DYNAMIC MAPPING OF POWER OUTLETS

Granted: October 22, 2015
Application Number: 20150301571
In some embodiments, an apparatus includes a network management module. The network management module is configured to send a request for power output data from a first network element having a first power supply configured to be coupled to a first power outlet, and a second power supply configured to be coupled to a second power outlet. The network management module is configured to receive a first confirmation from the first network element that the first power supply and the second…

APPARATUS, SYSTEM, AND METHOD FOR RECONFIGURING POINT-TO-MULTIPOINT LABEL-SWITCHED PATHS

Granted: October 1, 2015
Application Number: 20150281045
An apparatus may include a processor and a control plane that directs the processor to (1) detect that at least a portion of an initial branch path of a point-to-multipoint label-switched path has failed over to a failover route that rejoins the initial branch path at a merge-point device and (2) establish an alternate branch path that merges with the initial branch path at the merge-point device. The apparatus may also include a network interface and a data plane that uses the network…

MONITORING COMPLIANCE WITH SECURITY POLICIES FOR COMPUTER NETWORKS

Granted: October 1, 2015
Application Number: 20150281276
In one example, a server device for monitoring security policy compliance for a network includes a network interface and a control unit configured to determine that a target endpoint device is attempting to access the network, send, via the network interface, instructions to a trusted endpoint device of the network to cause the trusted endpoint device to determine whether the target endpoint device complies with at least one security policy, and grant the target endpoint device access to…