Patents Assigned to Extreme Networks, Inc.
-
Publication number: 20230124196Abstract: Provided herein are systems and methods for determining relationships between events occurring in networks. Notifications describing events occurring in networks can be received and processed to determine groups of network event types. A root-cause network can be generated based on the events, with the nodes of the root-cause network representing different event types and the edges of the root-cause network indicating directional, causal relationships between the nodes. A received network event can be processed to determine potential causes of the received network event based on the root-cause network and other events received by the network.Type: ApplicationFiled: December 21, 2022Publication date: April 20, 2023Applicant: Extreme Networks, Inc.Inventors: Donagh HORGAN, Abdul RAZAK, Giacomo BERNARDI
-
Patent number: 11575775Abstract: Implementations generally relate to data transmission in networks. In some implementations, a method includes receiving a first management protocol message from a first edge device, where the first management protocol message includes first edge device information associated with the first edge device, receiver device information associated with a receiver device, and a request by the receiver device to receive multicast data. The method also includes receiving a second management protocol message from a second edge device, where the second management protocol message includes second edge device information associated with the second edge device and sender device information associated with a sender device. The method also includes enabling unicast communication between the sender device and the receiver device based on the first management protocol message and the second management protocol message.Type: GrantFiled: January 4, 2017Date of Patent: February 7, 2023Assignee: Extreme Networks, Inc.Inventors: Deepak Ramesh, Farook Basha
-
Patent number: 11570039Abstract: Provided herein are systems and methods for determining relationships between events occurring in networks. Notifications describing events occurring in networks can be received and processed to determine groups of network event types. A root-cause network can be generated based on the events, with the nodes of the root-cause network representing different event types and the edges of the root-cause network indicating directional, causal relationships between the nodes. A received network event can be processed to determine potential causes of the received network event based on the root-cause network and other events received by the network.Type: GrantFiled: March 23, 2021Date of Patent: January 31, 2023Assignee: Extreme Networks, Inc.Inventors: Donagh Horgan, Abdul Razak, Giacomo Bernardi
-
Publication number: 20230006892Abstract: Systems and methods are disclosed herein for reducing storage space used in tracking behavior of a plurality of network endpoints by modeling the behavior with a behavior model. To this end, control circuitry may determine a respective network endpoint, of a plurality of network endpoints, to which each respective record of a plurality of received records corresponds. The control circuitry then may assign a dedicated queue for each respective network endpoint, and transmit, to each dedicated queue, each record that corresponds to the respective network endpoint to which the respective dedicated queue is assigned. The control circuitry may then determine, for each respective network endpoint, a respective behavior model, and may store each respective behavior model to memory.Type: ApplicationFiled: September 8, 2022Publication date: January 5, 2023Applicant: Extreme Networks, Inc.Inventors: Giacomo BERNARDI, Markus Nispel
-
Patent number: 11509540Abstract: Systems and methods are disclosed herein for reducing storage space used in tracking behavior of a plurality of network endpoints by modeling the behavior with a behavior model. To this end, control circuitry may determine a respective network endpoint, of a plurality of network endpoints, to which each respective record of a plurality of received records corresponds. The control circuitry then may assign a dedicated queue for each respective network endpoint, and transmit, to each dedicated queue, each record that corresponds to the respective network endpoint to which the respective dedicated queue is assigned. The control circuitry may then determine, for each respective network endpoint, a respective behavior model, and may store each respective behavior model to memory.Type: GrantFiled: July 11, 2018Date of Patent: November 22, 2022Assignee: Extreme Networks, Inc.Inventors: Giacomo Bernardi, Markus Nispel
-
Patent number: 11489757Abstract: Disclosed herein are system, method, and computer program product aspects for multiple instance Intermediate System to Intermediate System (IS-IS or ISIS) for a multi-area fabric. A network area in a multi-area fabric includes one or more network nodes and a boundary node shared with an other network area of the multi-area fabric outside of the network area. The boundary node can include a first ISIS instance associated with the network area and a second ISIS instance associated with the other network area. The second ISIS instance can be configured to pass information associated with the other network area to the first ISIS instance.Type: GrantFiled: June 28, 2021Date of Patent: November 1, 2022Assignee: Extreme Networks, Inc.Inventors: Gautam Khera, Constantin Barcaru
-
Publication number: 20220311657Abstract: Provided herein are systems and methods for determining relationships between events occurring in networks. Notifications describing events occurring in networks can be received and processed to determine groups of network event types. A root-cause network can be generated based on the events, with the nodes of the root-cause network representing different event types and the edges of the root-cause network indicating directional, causal relationships between the nodes. A received network event can be processed to determine potential causes of the received network event based on the root-cause network and other events received by the network.Type: ApplicationFiled: March 23, 2021Publication date: September 29, 2022Applicant: Extreme Networks, Inc.Inventors: Donagh Horgan, Abdul Razak, Giacomo Bernardi
-
Publication number: 20220263716Abstract: Disclosed herein are system, method, and computer program product embodiments for analyzing a network. An embodiment operates by a network entity from a distributed ledger receiving a notification regarding network information received by the distributed ledger. The entity is associated with a smart contract having one or more conditions that correspond to the network information. The network information is compared with one or more conditions of the smart contract that correspond to the network information. In response to the network information meeting or exceeding a condition of the one or more conditions of the smart contract, the condition is triggered. Further, a transaction to validate an action corresponding to the condition is generated, and the transaction is sent to the distributed ledger. In response to receiving a positive validation from the distributed ledger, the action corresponding to the condition is performed.Type: ApplicationFiled: May 3, 2022Publication date: August 18, 2022Applicant: Extreme Networks, Inc.Inventors: Shubharanjan DASGUPTA, Mythil RAMAN
-
Publication number: 20220255856Abstract: Provided herein are systems and methods for providing a MAC-based redistribution policy between networks in a multi-area network. A network can have a boundary node that communicates to neighboring networks. Boundary nodes can receive policy updates that identify which services are redistributable across network boundaries. Boundary nodes can receive a packet for a service, translate the packet's encapsulation, and forward the packet across the boundary towards a destination node. Boundary nodes can forward the packet such that it originates in the second network from a virtual node.Type: ApplicationFiled: February 5, 2021Publication date: August 11, 2022Applicant: Extreme Networks, Inc.Inventors: Constantin BARCARU, Gautam KHERA, Lava K. LAVU, Gheorghe CROITORU, Deborah E. FITZGERALD, Pamela M. LeBLANC, Irina Maria MILITARU, Bianca Elena NEAGU
-
Publication number: 20220255844Abstract: Disclosed herein are system, method, and computer program product aspects for multiple instance Intermediate System to Intermediate System (IS-IS or ISIS) for a multi-area fabric. A network area in a multi-area fabric includes one or more network nodes and a boundary node shared with an other network area of the multi-area fabric outside of the network area. The boundary node can include a first ISIS instance associated with the network area and a second ISIS instance associated with the other network area. The second ISIS instance can be configured to pass information associated with the other network area to the first ISIS instance.Type: ApplicationFiled: June 28, 2021Publication date: August 11, 2022Applicant: Extreme Networks, Inc.Inventors: Gautam KHERA, Constantin BARCARU
-
Publication number: 20220255845Abstract: Disclosed herein are system, method, and computer program product aspects for multiple instance Intermediate System to Intermediate System (IS-IS or ISIS) for a multi-area fabric. A network area in a multi-area fabric includes one or more network nodes and a boundary node shared with an other network area of the multi-area fabric outside of the network area. The boundary node can include a first ISIS instance associated with the network area and a second ISIS instance associated with the other network area. The second ISIS instance can be configured to pass information associated with the other network area to the first ISIS instance.Type: ApplicationFiled: June 28, 2021Publication date: August 11, 2022Applicant: Extreme Networks, Inc.Inventors: Gautam KHERA, Constantin BARCARU, Irina Maria MILITARU, Bianca Elena NEAGU
-
Publication number: 20220255852Abstract: Provided herein are systems and methods for managing redistribution and remapping of multicast services between networks in a multi-area network. Multicast streams can be sent through networks from a source node towards a boundary node. The boundary node can receive the multicast stream, remap a source node identifier and service instance identifier, and forward the multicast stream into a second network. The boundary node can receive a route for the multicast stream. The route can be installed in a link-state database and can be used to send the multicast stream through the multi-area network from the source node to a destination node.Type: ApplicationFiled: February 5, 2021Publication date: August 11, 2022Applicant: Extreme Networks, Inc.Inventors: Constantin BARCARU, Gautam Khera, Lava K. Lavu, Gheorghe Croitoru, Deborah E. Fitzgerald, Pamela M. LeBlanc, Irina Maria Militaru, Bianca Elena Neagu
-
Publication number: 20220255841Abstract: Disclosed herein are system, method, and computer program product aspects for multiple instance Intermediate System to Intermediate System (IS-IS or ISIS) for a multi-area fabric. A network area in a multi-area fabric includes one or more network nodes and a boundary node shared with an other network area of the multi-area fabric outside of the network area. The boundary node can include a first ISIS instance associated with the network area and a second ISIS instance associated with the other network area. The second ISIS instance can be configured to pass information associated with the other network area to the first ISIS instance.Type: ApplicationFiled: February 5, 2021Publication date: August 11, 2022Applicant: Extreme Networks, Inc.Inventors: Gautam KHERA, Constantin BARCARU, Irina Maria MILITARU, Bianca Elena NEAGU
-
Publication number: 20220255842Abstract: Disclosed herein are system, method, and computer program product aspects for generating and/or using virtual node(s) (e.g., virtual SPB node(s)) in a multi-area fabric (e.g., a multi-area SPB fabric). A multi-area network includes a first network area including a first set of network nodes. The multi-area network further includes a second network area including a second set of network nodes, where the second set of network nodes is outside of the first network area. The multi-area network further includes a virtual node including a logical Intermediate System to Intermediate System (ISIS) node representing at least one of the first set of network nodes and the second set of network nodes.Type: ApplicationFiled: February 5, 2021Publication date: August 11, 2022Applicant: Extreme Networks, Inc.Inventors: Constantin BARCARU, Gautam KHERA
-
Publication number: 20220255843Abstract: Disclosed herein are system, method, and computer program product aspects for multiple instance Intermediate System to Intermediate System (IS-IS or ISIS) for a multi-area fabric. A network area in a multi-area fabric includes one or more network nodes and a boundary node shared with an other network area of the multi-area fabric outside of the network area. The boundary node can include a first ISIS instance associated with the network area and a second ISIS instance associated with the other network area. The second ISIS instance can be configured to pass information associated with the other network area to the first ISIS instance.Type: ApplicationFiled: June 28, 2021Publication date: August 11, 2022Applicant: Extreme Networks, Inc.Inventors: Gautam KHERA, Constantin BARCARU
-
Publication number: 20220215319Abstract: The present disclosure is directed to systems and methods for generating an enterprise architecture for an enterprise network. As one example, a method may include: receiving historical information from a plurality of enterprise networks, the historical information comprising information about an enterprise architecture of each of the enterprise networks; analyzing the historical information from the plurality of enterprise networks to generate a network health score for each of the plurality of enterprise networks; training a machine learning model using a plurality of machine learning algorithms based on the historical information and the network health score of each the plurality of enterprise networks; and generating, using the machine learning model, an enterprise architecture for a first enterprise network, the first enterprise network being a new enterprise network or an existing enterprise network from among the plurality of enterprise networks.Type: ApplicationFiled: June 8, 2020Publication date: July 7, 2022Applicant: Extreme Networks, Inc.Inventors: Alan Cuellar Amrod, Shyamsundar PULLELA, Gregor VUCAJNK
-
Patent number: 11336560Abstract: A multicast frame directed to a plurality of devices coupled to a network can be received, where the plurality of devices comprising at least one intended recipient device and at least one unintended recipient device. A destination unicast address corresponding to an intended recipient device can be identified. The multicast frame can be converted into a unicast frame directed to the intended recipient device, the unicast frame configured with the destination unicast address. The unicast frame can be blocked from accessing the unintended recipient device. The unicast frame can be provided to the intended recipient device.Type: GrantFiled: July 16, 2019Date of Patent: May 17, 2022Assignee: Extreme Networks, Inc.Inventors: Matthew Stuart Gast, Liang Wang
-
Patent number: 11323324Abstract: Disclosed herein are system, method, and computer program product embodiments for analyzing a network. An embodiment operates by a third-party component deriving network data based on a received data packet from a network component configured to perform a network function. The third-party component orders a transaction including second network data from a distributed ledger. The third-party component determines that the first and second network data meet or exceed a condition of a smart contract comprising the condition and an associated network action related to the network function. The third-party component sends the condition of the smart contract and the first and second network data to another third-party component. The third-party component receives a validation that the first and second network data meet or exceed the first condition of the first smart contract and performing the first network action on the network.Type: GrantFiled: February 21, 2020Date of Patent: May 3, 2022Assignee: Extreme Networks, Inc.Inventors: Shubharanjan Dasgupta, Mythil Raman
-
Publication number: 20220086067Abstract: Systems and methods are disclosed herein for monitoring health of each switch of a plurality of switches on a network by selectively mirroring packets transmitted by each switch of the plurality of switches. In some embodiments, control circuitry generates a plurality of mirroring parameters, each mirroring parameter comprising an instruction to mirror a respective type of packet. The control circuitry transmits the plurality of mirroring parameters to each switch of the plurality of switches on the network, and receives, from a switch, a packet that was mirrored by the switch according to a mirroring parameter of the plurality of mirroring parameters. The control circuitry determines the respective type of the packet, executes an analysis of contents of the packet based on the respective type of the packet, and determines a health of the switch based on results of the analysis.Type: ApplicationFiled: November 29, 2021Publication date: March 17, 2022Applicant: Extreme Networks, Inc.Inventors: Donald B. Grosser, Chun Zhang, Patrick A. Bosa, Markus Nispel
-
Patent number: 11201814Abstract: Implementations relate to configuration of networks using switch device access of a remote server. In some implementations, a method includes sending a request from an edge configuration device to an access control server, where the request requests shortest path bridging (SPB) configuration information for a detected end device connected to the edge configuration device, and where the edge configuration device is connected to an SPB network. The method receives at the edge configuration device the SPB configuration information for the end device from the access control server. The edge configuration device is configured to provide the end device access to the SPB network.Type: GrantFiled: December 20, 2016Date of Patent: December 14, 2021Assignee: Extreme Networks, Inc.Inventors: John Seligson, Zenon Kuc, John Mead