Patents by Inventor Xiaochu Chen

Xiaochu Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10771475
    Abstract: Techniques for exchanging control and configuration information in a network visibility system are provided. In one embodiment, a control plane component of the network visibility system can receive one or more first messages from a data plane component of the network visibility system, where the one or more first messages define one or more forwarding resources available on the data plane component. The control plane component can further retrieve configuration information stored on the control plane component that comprises one or more network prefixes to be monitored by the network visibility system, and can determine one or more mappings between the network prefixes and the forwarding resources. Upon determining the one or more mappings, the control plane component can generate one or more packet forwarding rules based on the mappings.
    Type: Grant
    Filed: September 9, 2015
    Date of Patent: September 8, 2020
    Assignee: Extreme Networks, Inc.
    Inventors: Xiaochu Chen, Arvindsrinivasan Lakshmi Narasimhan, Shailender Sharma, Ivy Pei-Shan Hsu, Sanjeev Chhabria, Rakesh Varimalla
  • Patent number: 10728176
    Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.
    Type: Grant
    Filed: August 31, 2018
    Date of Patent: July 28, 2020
    Assignee: Extreme Networks, Inc.
    Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Chhabria
  • Publication number: 20190116133
    Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.
    Type: Application
    Filed: August 31, 2018
    Publication date: April 18, 2019
    Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Chhabria
  • Patent number: 10069764
    Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.
    Type: Grant
    Filed: February 6, 2017
    Date of Patent: September 4, 2018
    Assignee: Extreme Networks, Inc.
    Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Chhabria
  • Publication number: 20170187649
    Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.
    Type: Application
    Filed: February 6, 2017
    Publication date: June 29, 2017
    Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Nand Chhabria
  • Patent number: 9648542
    Abstract: A GTP correlation cluster (GCC) can automatically program a network element to forward copies of packets originating from a mobile device and having a shared attribute to the same analytic server, regardless of the regions into which the mobile device moves. The GCC can monitor attributes of copies of control packets that the network element receives. In response to detecting a changed attribute within a control packet originating from a mobile device, the GCC can update a session map specific to that mobile device in order to cause packets having that changed attribute to be forwarded to the same port to which packets having the former attribute were being forwarded prior to the change. As a result, the network element can ensure that packets belonging to a particular session still are forwarded to the same analytic server even if the mobile device has moved to a different region.
    Type: Grant
    Filed: January 22, 2015
    Date of Patent: May 9, 2017
    Assignee: Brocade Communications Systems, Inc.
    Inventors: Ivy Pei-Shan Hsu, Sanjeev Nand Chhabria, Xiaochu Chen, Sanjay Munshi, Arvindsrinivasan Lakshmi Narasimhan
  • Patent number: 9565138
    Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: February 7, 2017
    Assignee: Brocade Communications Systems, Inc.
    Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Chhabria
  • Publication number: 20160285735
    Abstract: Techniques for efficiently programming forwarding rules in a network system are provided. In one embodiment, a control plane component of the network system can determine a packet forwarding rule to be programmed into a forwarding table of a service instance residing on a data plane component of the network system. The control plane component can then generate a message comprising the packet forwarding rule and a forwarding table index and transmit the message to a given service instance of the data plane component. Upon receiving the message, the data plane component can directly forward the message to the service instance. The packet forwarding rule can then be programmed into a forwarding table of the service instance, at the specified forwarding table index, without involving the management processor of the data plane component.
    Type: Application
    Filed: September 9, 2015
    Publication date: September 29, 2016
    Inventors: Xiaochu Chen, Arvindsrinivasan Lakshmi Narasimhan, Latha Laxman, Shailender Sharma, Ivy Pei-Shan Hsu, Sanjeev Chhabria, Rakesh Varimalla
  • Publication number: 20160285762
    Abstract: Techniques for exchanging control and configuration information in a network visibility system are provided. In one embodiment, a control plane component of the network visibility system can receive one or more first messages from a data plane component of the network visibility system, where the one or more first messages define one or more forwarding resources available on the data plane component. The control plane component can further retrieve configuration information stored on the control plane component that comprises one or more network prefixes to be monitored by the network visibility system, and can determine one or more mappings between the network prefixes and the forwarding resources. Upon determining the one or more mappings, the control plane component can generate one or more packet forwarding rules based on the mappings.
    Type: Application
    Filed: September 9, 2015
    Publication date: September 29, 2016
    Inventors: Xiaochu Chen, Arvindsrinivasan Lakshmi Narasimhan, Shailender Sharma, Ivy Pei-Shan Hsu, Sanjeev Chhabria, Rakesh Varimalla
  • Publication number: 20150215841
    Abstract: A GTP correlation cluster (GCC) can automatically program a network element to forward copies of packets originating from a mobile device and having a shared attribute to the same analytic server, regardless of the regions into which the mobile device moves. The GCC can monitor attributes of copies of control packets that the network element receives. In response to detecting a changed attribute within a control packet originating from a mobile device, the GCC can update a session map specific to that mobile device in order to cause packets having that changed attribute to be forwarded to the same port to which packets having the former attribute were being forwarded prior to the change. As a result, the network element can ensure that packets belonging to a particular session still are forwarded to the same analytic server even if the mobile device has moved to a different region.
    Type: Application
    Filed: January 22, 2015
    Publication date: July 30, 2015
    Inventors: Ivy Pei-Shan Hsu, Sanjeev Nand Chhabria, Xiaochu Chen, Sanjay Munshi, Arvindsrinivasan Lakshmi Narasimhan
  • Publication number: 20150180802
    Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.
    Type: Application
    Filed: June 30, 2014
    Publication date: June 25, 2015
    Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Chhabria