Extreme Networks Patent Applications

Forwarding Table Management

Granted: August 20, 2020
Application Number: 20200267081
Disclosed herein are system, method, and computer program product embodiments for representing a forwarding information base (FIB) in a database. An embodiment operates by organizing forwarding entries of the FIB in a trie data structure. The embodiment determines that a first routing prefix of a first forwarding entry in the trie data structure is a less specific routing prefix than a second routing prefix in a second forwarding entry in the trie data structure based on the first…

Correlating and Load Balancing IMS Traffic in a Visibility Network

Granted: November 28, 2019
Application Number: 20190364101
Techniques for correlating and load balancing IMS traffic in a visibility network are provided. According to one set of embodiments, a packet broker of the visibility network can receive IMS traffic replicated from an IMS core network and identify control/data packets in the IMS traffic that are part of the same IMS session based on FROM and TO user identities included in the packets. The packet broker can then generate a unique session identifier for the IMS session and add the…

Near-Uniform Load Balancing in a Visibility Network via Usage Prediction

Granted: September 26, 2019
Application Number: 20190297520
Techniques for performing near-uniform load balancing in a visibility network based on usage prediction are provided. According to one embodiment, a packet broker of the visibility network can receive a control packet replicated from a core network, where the control packet includes a user or device identifier and a request to create a user session for a user identified by the user/device identifier. The packet broker can further determine, based on the user/device identifier and one or…

Forwarding Table Management

Granted: June 6, 2019
Application Number: 20190173791
Disclosed herein are system, method, and computer program product embodiments for representing a forwarding information base (FIB) in a database. An embodiment operates by determining that a first routing prefix of a first forwarding entry in the FIB is a less specific routing prefix than a second routing prefix in a second forwarding entry in the FIB. The embodiment determines that a first next hop of the first routing prefix is equal to a second next hop of the second routing prefix.…

Traffic Deduplication in a Visibility Network

Granted: May 16, 2019
Application Number: 20190149437
Techniques for implementing traffic deduplication in a visibility network are provided. According to one embodiment, a packet broker of the visibility network can receive a control or data packet replicated from a core network. The packet broker can then apply a first stage deduplication process in which the packet broker attempts to deduplicate the control or data packet based on one or more interfaces of the core network from which the control ot data packet originated, and apply a…

Automated Mirroring and Remote Switch Port Analyzer (RSPAN) Functions Using Fabric Attach (FA) Signaling

Granted: April 11, 2019
Application Number: 20190109902
A method and apparatus for automated mirroring is presented. A network device running as a Fabric Attach (FA) server configured to mirror traffic to a Remote Switch Port Analyzer (RSPAN) Virtual Local Area Network (VLAN), issues an FA Type Length Value (TLV) on its uplink to the FA server. The TLV includes a request to associate said RSPAN VLAN with a Service Identifier (I-SID) used to carry mirror traffic in a network. The network device sends the mirrored traffic on the RSPAN VLAN on…

Apparatus and Method for Multicast Data Packet Forwarding

Granted: January 14, 2016
Application Number: 20160014018
A switching device supports a mixed mode of operation using both layer 2 and layer 3 multicast forwarding tables for multicast forwarding of packets. In the mixed mode of operation the switching device programs multicast forwarding entries in a corresponding layer 2 or layer 3 table depending on a type of protocol to be used for multicast forwarding. The switching device programs multicast forwarding entries in the layer 3 table for multicast packets forwarded using layer 3 routing…

REDUNDANT ETHERNET AUTOMATIC PROTECTION SWITCHING ACCESS TO VIRTUAL PRIVATE LAN SERVICES

Granted: November 27, 2014
Application Number: 20140347980
Embodiments disclosed herein provide redundant connectivity between an Ethernet Automatic Protection Switching (EAPS) access network and a Virtual Private LAN Service (VPLS) network. A first VPLS node is provided to function as an EAPS controller node. A second VPLS node is provided to function as an EAPS partner node. The first and second VPLS nodes are linked by a pseudowire and an EAPS shared-link. Additional EAPS nodes are also provided. The additional EAPS nodes are linked to each…

METHODS AND SYSTEMS FOR SELECTIVELY PROCESSING VIRTUAL LOCAL AREA NETWORK (VLAN) TRAFFIC FROM DIFFERENT NETWORKS WHILE ALLOWING FLEXIBLE VLAN IDENTIFIER ASSIGNMENT

Granted: November 20, 2014
Application Number: 20140341223
Methods and systems for selectively processing VLAN traffic from different networks while allowing flexible VLAN identifier assignment are disclosed. According to one aspect, a layer 2 switch includes a virtual switch identifier data structure that associates a VLAN identifier extracted from a layer 2 frame and a port identifier corresponding to a port on which a frame is received with a virtual switch identifier. The virtual switch identifier is used to select a per-virtual-switch data…

FORWARDING INTER-SWITCH CONNECTION (ISC) FRAMES IN A NETWORK-TO-NETWORK INTERCONNECT TOPOLOGY

Granted: September 13, 2012
Application Number: 20120230325
Systems, mechanisms, apparatuses, and methods are disclosed for forwarding Inter-Switch Connection (ISC) frames in a Network-to-Network Interconnect (NNI) topology, for example, via a network switch which includes a first physical switch port to receive a physical switch link from a second network switch; logic to implement a first logical ISC and a second logical ISC? connection to the second network switch via the physical switch link; a second physical switch port to receive an…

FORWARDING INTER-SWITCH CONNECTION (ISC) FRAMES IN A NETWORK-TO-NETWORK INTERCONNECT TOPOLOGY

Granted: September 13, 2012
Application Number: 20120230344
Systems, mechanisms, apparatuses, and methods are disclosed for forwarding Inter-Switch Connection (ISC) frames in a Network-to-Network Interconnect (NNI) topology, for example, via a network switch which includes a first and second physical switch port to receive a first and second physical switch link from a second network switch; logic to implement first and second logical ISC? connections to the second switch via the first and second physical switch links respectively; logic to…

METHOD OF PROVIDING VIRTUAL ROUTER FUNCTIONALITY

Granted: August 16, 2012
Application Number: 20120207169
A method of presenting different virtual routers to different end users, classes of service, or packets is provided. An incoming packet is received having a VLAN field and at least one additional field. A key is formed from the VLAN field and at least one other packet field, and mapped into a virtual router identifier (VRID) using an indirection mapping process. The VRID identifies a particular virtual router configuration from a plurality of possible virtual router configurations. A…

INTEGRATED METHODS OF PERFORMING NETWORK SWITCH FUNCTIONS

Granted: June 23, 2011
Application Number: 20110149736
On-switch methods for enforcing a policy relating to one or more network switch resources, for detecting and mitigating a network anomaly, and for selectively filtering packets to an externally-accessible port, are provided. The methods may each be embodied as one or more rules held by one or more processor readable media, with one or more of the rules defining one or more conditions to be met by one or more usage-derived packet statistics, and one or more actions to be performed if the…

NETWORK CONVERGENCE IN RESPONSE TO A TOPOLOGY CHANGE

Granted: September 30, 2010
Application Number: 20100246387
In response to a network topology change, packets are initially flooded on ports of a network device. In addition, a bit array is cleared in response to the topology change. Each bit in the bit array is associated with a particular forwarding entry on the network device. In connection with the clearing of the bit array, the flooding of packets on ports of the network device is made conditional, reducing failover time of the network.

CONVERGENCE OF MULTICAST TRAFFIC

Granted: March 4, 2010
Application Number: 20100054246
A multicast data packet sent from a source node is received by a transit node. The multicast data packet includes a source address and a multicast group address. A hardware cache miss is detected at the transit node for the multicast data packet. The multicast data packet is hardware-flooded onto ports of the network. The flooding consists of forwarding a copy of the multicast data packet to neighbor nodes of the transit node based on virtual local area network (VLAN) membership. A…