Extreme Networks Patent Applications

SHORTEST PATH BRIDGING (SPB) SECURITY GROUP POLICY

Granted: October 3, 2024
Application Number: 20240333770
Disclosed herein are system, method, and computer program product aspects for implementing a security group policy. Some aspects of this disclosure relate to a method for applying a security group policy. The method includes receiving a first frame from a source device and assigning a source security group identifier (ID) to the first frame. The method further includes generating a second frame based on the first frame and the source security group ID and identifying a target security…

ANTENNA PATTERN MATCHING AND MOUNTING

Granted: June 20, 2024
Application Number: 20240204828
Disclosed herein are apparatuses and a method for improving wireless communication characteristics by matching transmitter antenna patterns to receiver antenna patterns. An embodiment operates by generating a station profile for each of a plurality of stations based on a structure of each of the plurality of stations and an antenna pattern group of each of the plurality of stations. The embodiment then identifies a station profile of a first station from among the plurality of stations…

SYSTEMS AND METHODS FOR DETERMINING FLOW AND PATH ANALYTICS OF AN APPLICATION OF A NETWORK USING SAMPLED PACKET INSPECTION

Granted: May 9, 2024
Application Number: 20240154886
Systems and methods are disclosed herein for monitoring health of each switch of a plurality of switches on a network by selectively mirroring packets transmitted by each switch of the plurality of switches. In some embodiments, control circuitry generates a plurality of mirroring parameters, each mirroring parameter comprising an instruction to mirror a respective type of packet. The control circuitry transmits the plurality of mirroring parameters to each switch of the plurality of…

MULTI-ACCESS EDGE COMPUTING BASED VISIBILITY NETWORK

Granted: March 14, 2024
Application Number: 20240089173
Disclosed herein are system, method, and computer program product embodiments for providing traffic visibility in a network. An embodiment operates by a third-party component receiving a copy of a first data packet during a first period of time. The third-party component extracts a first network parameter associated with the first period of time from the copy of the first data packet. The third-party component then predicts a baseline of normalcy for the first network parameter during a…

ONLINE ANOMALY DETECTION OF VECTOR EMBEDDINGS

Granted: February 22, 2024
Application Number: 20240064165
Disclosed herein are system, method, and computer program product embodiments for providing an anomaly detection system. Some aspects of this disclosure include a method for detecting anomaly in a network device. The method includes determining one or more similarity values between a flow vector corresponding to a flow associated with the network device and one or more flow clusters associated with the network device. The method further includes determining a maximum similarity value as…

Network Device Mounting

Granted: February 8, 2024
Application Number: 20240047848
A mounting device configured to be integrated with a network device to facilitate mounting of the network device is disclosed. In an embodiment, the mounting device is a twist-to-lock mounting device configured to be compatible with one or more standard types of ceiling rails, allowing network devices to be mounted in a non-destructive manner without requiring the use of tools.

Network Device Mounting

Granted: February 8, 2024
Application Number: 20240047848
A mounting device configured to be integrated with a network device to facilitate mounting of the network device is disclosed. In an embodiment, the mounting device is a twist-to-lock mounting device configured to be compatible with one or more standard types of ceiling rails, allowing network devices to be mounted in a non-destructive manner without requiring the use of tools.

MAC-BASED REDISTRIBUTION IN MULTI-AREA NETWORKS

Granted: November 30, 2023
Application Number: 20230388229
Provided herein are systems and methods for providing a MAC-based redistribution policy between networks in a multi-area network. A network can have a boundary node that communicates to neighboring networks. Boundary nodes can receive policy updates that identify which services are redistributable across network boundaries. Boundary nodes can receive a packet for a service, translate the packet's encapsulation, and forward the packet across the boundary towards a destination node.…

TRUST CHAIN PRESERVATION FOR REMOTE ATTESTATION

Granted: October 12, 2023
Application Number: 20230325509
Disclosed herein are system, method, and computer program product embodiments for verifying the integrity of a boot process without relying on a boot aggregate value. An embodiment operates by cryptographically validating, by a hardware root of trust, a first code module associated with a digital signature. The embodiment determines that the first code module was cryptographically validated and cryptographically measures the first code module thereby generating a first measurement. The…

ROOT-CAUSE ANALYSIS OF EVENT OCCURRENCES

Granted: April 20, 2023
Application Number: 20230124196
Provided herein are systems and methods for determining relationships between events occurring in networks. Notifications describing events occurring in networks can be received and processed to determine groups of network event types. A root-cause network can be generated based on the events, with the nodes of the root-cause network representing different event types and the edges of the root-cause network indicating directional, causal relationships between the nodes. A received…

SYSTEMS AND METHODS FOR ZERO-FOOTPRINT LARGE-SCALE USER-ENTITY BEHAVIOR MODELING

Granted: January 5, 2023
Application Number: 20230006892
Systems and methods are disclosed herein for reducing storage space used in tracking behavior of a plurality of network endpoints by modeling the behavior with a behavior model. To this end, control circuitry may determine a respective network endpoint, of a plurality of network endpoints, to which each respective record of a plurality of received records corresponds. The control circuitry then may assign a dedicated queue for each respective network endpoint, and transmit, to each…

ROOT-CAUSE ANALYSIS OF EVENT OCCURRENCES

Granted: September 29, 2022
Application Number: 20220311657
Provided herein are systems and methods for determining relationships between events occurring in networks. Notifications describing events occurring in networks can be received and processed to determine groups of network event types. A root-cause network can be generated based on the events, with the nodes of the root-cause network representing different event types and the edges of the root-cause network indicating directional, causal relationships between the nodes. A received…

SYSTEMS AND METHODS FOR DETERMINING FLOW AND PATH ANALYTICS OF AN APPLICATION OF A NETWORK USING SAMPLED PACKET INSPECTION

Granted: March 17, 2022
Application Number: 20220086067
Systems and methods are disclosed herein for monitoring health of each switch of a plurality of switches on a network by selectively mirroring packets transmitted by each switch of the plurality of switches. In some embodiments, control circuitry generates a plurality of mirroring parameters, each mirroring parameter comprising an instruction to mirror a respective type of packet. The control circuitry transmits the plurality of mirroring parameters to each switch of the plurality of…

NETWORK DEVICE MOUNTING

Granted: September 23, 2021
Application Number: 20210296755
A mounting device configured to be integrated with a network device to facilitate mounting of the network device is disclosed. In an embodiment, the mounting device is a twist-to-lock mounting device configured to be compatible with one or more standard types of ceiling rails, allowing network devices to be mounted in a non-destructive manner without requiring the use of tools.

Online Anomaly Detection of Vector Embeddings

Granted: August 5, 2021
Application Number: 20210243210
Disclosed herein are system, method, and computer program product embodiments for providing an anomaly detection system. Some aspects of this disclosure include a method for detecting anomaly in a network device. The method includes determining one or more similarity values between a flow vector corresponding to a flow associated with the network device and one or more flow clusters associated with the network device. The method further includes determining a maximum similarity value as…

SELECTIVE POLICY NETWORK DEVICE OPERATION

Granted: June 17, 2021
Application Number: 20210185148
Techniques for synchronizing a network device to selectively operate according to a selectable operation policy. A system utilizing such techniques can a self-configuring network device operation coordination system and a self-configuring network device operation management system. A method utilizing such techniques can include synchronizing a network device to selectively operate according to a first operation policy and a second operation policy in providing network service access.

ARCHITECTURE FOR A NETWORK VISIBILITY SYSTEM

Granted: May 27, 2021
Application Number: 20210160181
Aspects of the present disclosure provide a suitable architecture for a router controller which configures forwarding rules in a packet router of a network visibility system. In an embodiment, the router controller contains multiple controller blocks, with each controller block to examine a corresponding set of packets and to generate a respective set of forwarding rules for configuring the packet router. The router controller may also contain a switch to receive multiple packets and to…

PLUG-IN NETWORK DEVICE

Granted: March 18, 2021
Application Number: 20210084712
A plug-in network device is disclosed. The plug-in network device can be used in association with a network management system and an infrastructure network device. The plug-in network device includes two antenna arrays, one of which is up-facing and one of which is front-facing. The plug-in network device can achieve wireless communication with the infrastructure network device via the up-facing antenna array and provide network services to wireless stations through the front-facing…

ANTENNA PATTERN MATCHING AND MOUNTING

Granted: September 17, 2020
Application Number: 20200295806
A technique for improving wireless communication characteristics involving matching transmitter antenna patterns to receiver antenna patterns. In a specific implementation, the transmitter antenna pattern adapts to changing parameters, such as when a smartphone is initially held in a first orientation and is later held in a second orientation. Because the transmitter antenna pattern matches receiver antenna patterns, signal quality between stations improves. In some implementations,…

Automated Closed-Loop Actions in a Network Using a Distributed Ledger

Granted: August 27, 2020
Application Number: 20200274765
Disclosed herein are system, method, and computer program product embodiments for analyzing a network. An embodiment operates by a third-party component deriving network data based on a received data packet from a network component configured to perform a network function. The third-party component orders a transaction including second network data from a distributed ledger. The third-party component determines that the first and second network data meet or exceed a condition of a smart…