Patents Assigned to Extreme Networks
-
Patent number: 11848856Abstract: Disclosed herein are system, method, and computer program product aspects for generating and/or using virtual node(s) (e.g., virtual SPB node(s)) in a multi-area fabric (e.g., a multi-area SPB fabric). A multi-area network includes a first network area including a first set of network nodes. The multi-area network further includes a second network area including a second set of network nodes, where the second set of network nodes is outside of the first network area. The multi-area network further includes a virtual node including a logical Intermediate System to Intermediate System (ISIS) node representing at least one of the first set of network nodes and the second set of network nodes.Type: GrantFiled: February 5, 2021Date of Patent: December 19, 2023Assignee: Extreme Networks, Inc.Inventors: Constantin Barcaru, Gautam Khera
-
Publication number: 20230388229Abstract: Provided herein are systems and methods for providing a MAC-based redistribution policy between networks in a multi-area network. A network can have a boundary node that communicates to neighboring networks. Boundary nodes can receive policy updates that identify which services are redistributable across network boundaries. Boundary nodes can receive a packet for a service, translate the packet's encapsulation, and forward the packet across the boundary towards a destination node. Boundary nodes can forward the packet such that it originates in the second network from a virtual node.Type: ApplicationFiled: August 9, 2023Publication date: November 30, 2023Applicant: Extreme Networks, Inc.Inventors: Lava K. LAVU, Constantin BARCARU
-
Patent number: 11824876Abstract: Disclosed herein are system, method, and computer program product embodiments for providing an anomaly detection system. Some aspects of this disclosure include a method for detecting anomaly in a network device. The method includes determining one or more similarity values between a flow vector corresponding to a flow associated with the network device and one or more flow clusters associated with the network device. The method further includes determining a maximum similarity value as a maximum of the one or more similarity values and comparing the maximum similarity value to a threshold. The method also includes, in response to the maximum similarity value being equal to or greater than the threshold, updating a flow cluster associated with the maximum similarity value. The method also includes, in response to the maximum similarity measure being less than the threshold, detecting the anomaly in the network device.Type: GrantFiled: January 31, 2020Date of Patent: November 21, 2023Assignee: Extreme Networks, Inc.Inventors: Giacomo Bernardi, Donagh Horgan, Jeffrey W. Haskell, Markus Nispel
-
Patent number: 11792109Abstract: Disclosed herein are system, method, and computer program product aspects for multiple instance Intermediate System to Intermediate System (IS-IS or ISIS) for a multi-area fabric. A network area in a multi-area fabric includes one or more network nodes and a boundary node shared with an other network area of the multi-area fabric outside of the network area. The boundary node can include a first ISIS instance associated with the network area and a second ISIS instance associated with the other network area. The second ISIS instance can be configured to pass information associated with the other network area to the first ISIS instance.Type: GrantFiled: June 28, 2021Date of Patent: October 17, 2023Assignee: Extreme Networks, Inc.Inventors: Gautam Khera, Constantin Barcaru
-
Patent number: 11792288Abstract: Methods, systems, and devices are provided herein for establishing a proxy communication link for network devices. The proxy communication link can allow a network device, such as an access point, to communicate with a network device manager when the network device is in an error state. A proxy device, such as a smart phone, can be authenticated with the network device manager to provide a communication link and can communicate with the network device using an optical communication system. The proxy device can act as a relay between the network device and network device manager to allow the network device manager to diagnose the error state. Instructions can be sent to the network device or the proxy device to address the error state.Type: GrantFiled: September 8, 2020Date of Patent: October 17, 2023Assignee: Extreme Networks, Inc.Inventors: Gregor Vucajnk, Shyamsundar Pullela
-
Publication number: 20230325509Abstract: Disclosed herein are system, method, and computer program product embodiments for verifying the integrity of a boot process without relying on a boot aggregate value. An embodiment operates by cryptographically validating, by a hardware root of trust, a first code module associated with a digital signature. The embodiment determines that the first code module was cryptographically validated and cryptographically measures the first code module thereby generating a first measurement. The embodiment stores a representation of the first measurement in a first platform configuration register (PCR) of a trusted platform module. The embodiment configures a remote attestation agent to instruct a remote attestation server to attest the value stored in the first PCR. The embodiment transmits a TPM attestation quote to the remote attestation server.Type: ApplicationFiled: April 11, 2022Publication date: October 12, 2023Applicant: Extreme Networks, Inc.Inventors: Steve W. Schroder, Ramanuja Chaitanya CHAKRAVARTHULA, Kristopher F. Orjada, Bagavath Singh SWAMYNATHA PILLAI, Michael B. RASH, Albert TAO
-
Patent number: 11770332Abstract: Provided herein are systems and methods for providing a MAC-based redistribution policy between networks in a multi-area network. A network can have a boundary node that communicates to neighboring networks. Boundary nodes can receive policy updates that identify which services are redistributable across network boundaries. Boundary nodes can receive a packet for a service, translate the packet's encapsulation, and forward the packet across the boundary towards a destination node. Boundary nodes can forward the packet such that it originates in the second network from a virtual node.Type: GrantFiled: February 5, 2021Date of Patent: September 26, 2023Assignee: Extreme Networks, Inc.Inventors: Constantin Barcaru, Gautam Khera, Lava K. Lavu, Gheorghe Croitoru
-
Patent number: 11706841Abstract: A plug-in network device is disclosed. The plug-in network device can be used in association with a network management system and an infrastructure network device. The plug-in network device includes two antenna arrays, one of which is up-facing and one of which is front-facing. The plug-in network device can achieve wireless communication with the infrastructure network device via the up-facing antenna array and provide network services to wireless stations through the front-facing antenna array. The network management system can manage both the infrastructure network device and the plug-in network device.Type: GrantFiled: November 16, 2020Date of Patent: July 18, 2023Assignee: Extreme Networks, Inc.Inventors: George Gang Chen, Edward Chee, Gururaj Govindasamy
-
Patent number: 11695620Abstract: Provided herein are systems and methods for determining relationships between events occurring in networks. Notifications describing events occurring in networks can be received and processed to determine groups of network event types. A root-cause network can be generated based on the events, with the nodes of the root-cause network representing different event types and the edges of the root-cause network indicating directional, causal relationships between the nodes. A received network event can be processed to determine potential causes of the received network event based on the root-cause network and other events received by the network.Type: GrantFiled: December 21, 2022Date of Patent: July 4, 2023Assignee: Extreme Networks, Inc.Inventors: Donagh Horgan, Abdul Razak, Giacomo Bernardi
-
Patent number: 11695683Abstract: Disclosed herein are system, method, and computer program product aspects for multiple instance Intermediate System to Intermediate System (IS-IS or ISIS) for a multi-area fabric. A network area in a multi-area fabric includes one or more network nodes and a boundary node shared with an other network area of the multi-area fabric outside of the network area. The boundary node can include a first ISIS instance associated with the network area and a second ISIS instance associated with the other network area. The second ISIS instance can be configured to pass information associated with the other network area to the first ISIS instance.Type: GrantFiled: June 28, 2021Date of Patent: July 4, 2023Assignee: Extreme Networks, Inc.Inventors: Gautam Khera, Constantin Barcaru, Irina Maria Militaru, Bianca Elena Neagu
-
Patent number: 11689446Abstract: Disclosed herein are system, method, and computer program product aspects for multiple instance Intermediate System to Intermediate System (IS-IS or ISIS) for a multi-area fabric. A network area in a multi-area fabric includes one or more network nodes and a boundary node shared with an other network area of the multi-area fabric outside of the network area. The boundary node can include a first ISIS instance associated with the network area and a second ISIS instance associated with the other network area. The second ISIS instance can be configured to pass information associated with the other network area to the first ISIS instance.Type: GrantFiled: February 5, 2021Date of Patent: June 27, 2023Assignee: Extreme Networks, Inc.Inventors: Gautam Khera, Constantin Barcaru
-
Patent number: 11659052Abstract: Techniques for synchronizing a network device to selectively operate according to a selectable operation policy. A system utilizing such techniques can a self-configuring network device operation coordination system and a self-configuring network device operation management system. A method utilizing such techniques can include synchronizing a network device to selectively operate according to a first operation policy and a second operation policy in providing network service access.Type: GrantFiled: February 22, 2021Date of Patent: May 23, 2023Assignee: Extreme Networks, Inc.Inventors: William Edward Lundgren, Alan Cuellar Amrod, Krishnamoorthy Narayanan, Richard Stephen Hector
-
Publication number: 20230124196Abstract: Provided herein are systems and methods for determining relationships between events occurring in networks. Notifications describing events occurring in networks can be received and processed to determine groups of network event types. A root-cause network can be generated based on the events, with the nodes of the root-cause network representing different event types and the edges of the root-cause network indicating directional, causal relationships between the nodes. A received network event can be processed to determine potential causes of the received network event based on the root-cause network and other events received by the network.Type: ApplicationFiled: December 21, 2022Publication date: April 20, 2023Applicant: Extreme Networks, Inc.Inventors: Donagh HORGAN, Abdul RAZAK, Giacomo BERNARDI
-
Patent number: 11575775Abstract: Implementations generally relate to data transmission in networks. In some implementations, a method includes receiving a first management protocol message from a first edge device, where the first management protocol message includes first edge device information associated with the first edge device, receiver device information associated with a receiver device, and a request by the receiver device to receive multicast data. The method also includes receiving a second management protocol message from a second edge device, where the second management protocol message includes second edge device information associated with the second edge device and sender device information associated with a sender device. The method also includes enabling unicast communication between the sender device and the receiver device based on the first management protocol message and the second management protocol message.Type: GrantFiled: January 4, 2017Date of Patent: February 7, 2023Assignee: Extreme Networks, Inc.Inventors: Deepak Ramesh, Farook Basha
-
Patent number: 11570039Abstract: Provided herein are systems and methods for determining relationships between events occurring in networks. Notifications describing events occurring in networks can be received and processed to determine groups of network event types. A root-cause network can be generated based on the events, with the nodes of the root-cause network representing different event types and the edges of the root-cause network indicating directional, causal relationships between the nodes. A received network event can be processed to determine potential causes of the received network event based on the root-cause network and other events received by the network.Type: GrantFiled: March 23, 2021Date of Patent: January 31, 2023Assignee: Extreme Networks, Inc.Inventors: Donagh Horgan, Abdul Razak, Giacomo Bernardi
-
Publication number: 20230006892Abstract: Systems and methods are disclosed herein for reducing storage space used in tracking behavior of a plurality of network endpoints by modeling the behavior with a behavior model. To this end, control circuitry may determine a respective network endpoint, of a plurality of network endpoints, to which each respective record of a plurality of received records corresponds. The control circuitry then may assign a dedicated queue for each respective network endpoint, and transmit, to each dedicated queue, each record that corresponds to the respective network endpoint to which the respective dedicated queue is assigned. The control circuitry may then determine, for each respective network endpoint, a respective behavior model, and may store each respective behavior model to memory.Type: ApplicationFiled: September 8, 2022Publication date: January 5, 2023Applicant: Extreme Networks, Inc.Inventors: Giacomo BERNARDI, Markus Nispel
-
Patent number: 11509540Abstract: Systems and methods are disclosed herein for reducing storage space used in tracking behavior of a plurality of network endpoints by modeling the behavior with a behavior model. To this end, control circuitry may determine a respective network endpoint, of a plurality of network endpoints, to which each respective record of a plurality of received records corresponds. The control circuitry then may assign a dedicated queue for each respective network endpoint, and transmit, to each dedicated queue, each record that corresponds to the respective network endpoint to which the respective dedicated queue is assigned. The control circuitry may then determine, for each respective network endpoint, a respective behavior model, and may store each respective behavior model to memory.Type: GrantFiled: July 11, 2018Date of Patent: November 22, 2022Assignee: Extreme Networks, Inc.Inventors: Giacomo Bernardi, Markus Nispel
-
Patent number: 11489757Abstract: Disclosed herein are system, method, and computer program product aspects for multiple instance Intermediate System to Intermediate System (IS-IS or ISIS) for a multi-area fabric. A network area in a multi-area fabric includes one or more network nodes and a boundary node shared with an other network area of the multi-area fabric outside of the network area. The boundary node can include a first ISIS instance associated with the network area and a second ISIS instance associated with the other network area. The second ISIS instance can be configured to pass information associated with the other network area to the first ISIS instance.Type: GrantFiled: June 28, 2021Date of Patent: November 1, 2022Assignee: Extreme Networks, Inc.Inventors: Gautam Khera, Constantin Barcaru
-
Publication number: 20220311657Abstract: Provided herein are systems and methods for determining relationships between events occurring in networks. Notifications describing events occurring in networks can be received and processed to determine groups of network event types. A root-cause network can be generated based on the events, with the nodes of the root-cause network representing different event types and the edges of the root-cause network indicating directional, causal relationships between the nodes. A received network event can be processed to determine potential causes of the received network event based on the root-cause network and other events received by the network.Type: ApplicationFiled: March 23, 2021Publication date: September 29, 2022Applicant: Extreme Networks, Inc.Inventors: Donagh Horgan, Abdul Razak, Giacomo Bernardi
-
Publication number: 20220263716Abstract: Disclosed herein are system, method, and computer program product embodiments for analyzing a network. An embodiment operates by a network entity from a distributed ledger receiving a notification regarding network information received by the distributed ledger. The entity is associated with a smart contract having one or more conditions that correspond to the network information. The network information is compared with one or more conditions of the smart contract that correspond to the network information. In response to the network information meeting or exceeding a condition of the one or more conditions of the smart contract, the condition is triggered. Further, a transaction to validate an action corresponding to the condition is generated, and the transaction is sent to the distributed ledger. In response to receiving a positive validation from the distributed ledger, the action corresponding to the condition is performed.Type: ApplicationFiled: May 3, 2022Publication date: August 18, 2022Applicant: Extreme Networks, Inc.Inventors: Shubharanjan DASGUPTA, Mythil RAMAN