Patents Assigned to Juniper Networks, Inc.
-
Publication number: 20140006549Abstract: In some embodiments, a non-transitory processor-readable medium stores code representing instructions to be executed by a processor. The code causes the processor to receive, at an edge device, a first data unit having a characteristic. The code causes the processor to identify, at a first time, an identifier of a service module associated with the characteristic in response to each entry from a set of entries within a flow table not being associated with the characteristic. The code causes the processor to define an entry in the flow table associated with the characteristic and the identifier of the service module. The code causes the processor to send the first data unit to the service module. The code causes the processor to receive, at the edge device, a second data unit having the characteristic, and send the second data unit to the service module based on the entry.Type: ApplicationFiled: June 29, 2012Publication date: January 2, 2014Applicant: Juniper Networks, Inc.Inventors: Krishna Narayanaswamy, Jean-Marc Frailong, Anjan Venkatramani, Srinivasan Jagannadhan
-
Publication number: 20140003433Abstract: In some embodiments, a non-transitory processor-readable medium stores code representing instructions to be executed by a processor. The code causes the processor to receive, from a source peripheral processing device, a portion of a data packet having a destination address associated with a destination peripheral processing device. The code causes the processor to identify, based on the destination address, a service to be performed on the portion of the data packet. The code causes the processor to select, based on the service, an identifier of a service module associated with the service. The code further causes the processor to send the portion of the data packet to the service module via a distributed switch fabric such that the service module performs the service on the portion of the data packet and sends the portion of the data packet to the destination peripheral processing device via the distributed switch fabric.Type: ApplicationFiled: June 29, 2012Publication date: January 2, 2014Applicant: Juniper Networks, Inc.Inventors: Krishna Narayanaswamy, Jean-Marc Frailong, Anjan Venkatramani, Srinivasan Jagannadhan
-
Publication number: 20140007089Abstract: In one example, a system includes a first computing device configured to execute a virtual machine, wherein the virtual machine is communicatively coupled to a virtual private network (VPN) via a first attachment circuit using a first set of network parameters, stop execution of the virtual machine, and create checkpoint data for the virtual machine, and a second computing device configured to execute the virtual machine, using at least some of the checkpoint data, and to cause the virtual machine to become communicatively coupled to the VPN via a second attachment circuit using a second set of network parameters different from the first set of network parameters. The system may further include a first provider edge (PE) routing device communicatively coupled to the first computing device via the first attachment circuit, and a second PE routing device communicatively coupled to the second computing device via the second attachment circuit.Type: ApplicationFiled: June 29, 2012Publication date: January 2, 2014Applicant: JUNIPER NETWORKS, INC.Inventors: Hendrikus G.P. Bosch, Jan Medved
-
Publication number: 20140003232Abstract: In general, techniques are described for providing feedback loops for service engineered paths. A service node comprising an interface and a control unit may implement the techniques. The interface receives traffic via a path configured within a network to direct the traffic from an ingress network device of the path to the service node. The control unit applies one or more services to the traffic received via the path and generates service-specific information related to the application of the one or more services to the traffic. The interface then sends the service-specific information to at least one network device configured to forward the traffic via the path so that the at least one network device configured to forward the traffic via the path is able to adapt the path based on the service-specific information.Type: ApplicationFiled: June 27, 2012Publication date: January 2, 2014Applicant: JUNIPER NETWORKS, INC.Inventors: James Guichard, David Ward, Jan Medved, Maciek Konstantynowicz
-
Patent number: 8619788Abstract: In general, techniques are described for performing scalable layer two (L2) learning in computer networks. A network device that includes interfaces and a control unit may implement these techniques. The control unit stores a L2 learning table having entries that are each associated with a service tag identifying a service virtual local area network. In response to receiving a packet that includes a service tag, the interfaces access the L2 learning table using the service tag to determine whether any of the entries of the L2 learning table are associated with the service tag. When none of the entries are associated with the service tag, the L2 learning module updates the L2 learning table to create a new entry defining an association between the one of the interfaces that received the packet and the service tag.Type: GrantFiled: October 11, 2010Date of Patent: December 31, 2013Assignee: Juniper Networks, Inc.Inventors: Krishna Sankaran, Sanjiv Doshi, Jagadish Grandhi, Apurva Mehta, Prakash Kamath, Huaxiang Sun, Shivaprakash Shenoy
-
Patent number: 8621615Abstract: A method includes receiving one or more of user information, role information, or authorization information associated with a user accessing a network, selecting a traffic flow to monitor that is associated with the one or more of user information, role information, or authorization information, monitoring the traffic flow, determining whether an anomaly exists with respect to the traffic flow based on a traffic behavior pattern associated with the one or more of user information, role information, or authorization information, and performing a security response when it is determined that the anomaly exists.Type: GrantFiled: June 2, 2009Date of Patent: December 31, 2013Assignee: Juniper Networks, Inc.Inventor: Ye Zhao
-
Patent number: 8619560Abstract: An intermediate network device intercepts a packet flow associated with a communication session between a client device and a server, splits the intercepted packet flow of the communication session into a plurality of application-layer data channels, wherein each application-layer data channel represents an independent stream of application-layer data within the communication session, performs Quality of Service (QoS) processing on the application-layer data channels, combines the plurality of QoS-processed application-layer data channels into a combined packet flow, and outputs the combined packet flow onto the communication session between the client device and the server.Type: GrantFiled: January 7, 2013Date of Patent: December 31, 2013Assignee: Juniper Networks, Inc.Inventor: Roger Binns
-
Patent number: 8619798Abstract: A method may include receiving, in a first server from a second server, a request for a service of a network by a device; sending, from the first server to the second server, a response to the request for the service to permit access to the service; and sending state information about the response to a third server for storage in a database.Type: GrantFiled: October 31, 2011Date of Patent: December 31, 2013Assignee: Juniper Networks, Inc.Inventors: Walter Tuvell, Oliver Tavakoli, Thomas C Porcher
-
Patent number: 8621100Abstract: A system improves bandwidth used by a data stream. The system receives data from the data stream and partitions the data into bursts. At least one of the bursts includes one or more idles. The system selectively removes the idles from the at least one burst and transmits the bursts, including the at least one burst.Type: GrantFiled: February 27, 2009Date of Patent: December 31, 2013Assignee: Juniper Networks, Inc.Inventors: Sharada Yeluri, Kevin Clark, Shahriar Ilislamloo, Chung Lau
-
Patent number: 8621211Abstract: A system receives discovery rule inputs that include addresses, verifies one or more device identifiers for one or more addresses, obtains device information from each verified device associated with the one or more verified device identifiers, determines whether each verified device is a discovered device based on the device information, and automatically adds each verified device as a discovered device to a management system without human intervention when it is determined that the verified device is discovered. The system further creates device configuration information, creates an identifier and password, provides device configuration information, the identifier, and the password, to each of the discovered devices based on the NETCONF or the Device Management Interface standards, waits for a connection from the discovered devices, imports device configuration information from the discovered devices when the connection has been established, and indicates that the discovered devices are managed devices.Type: GrantFiled: October 24, 2008Date of Patent: December 31, 2013Assignee: Juniper Networks, Inc.Inventors: Uday Kishore, Roshan Joyce
-
Patent number: 8619815Abstract: A circuit simulation apparatus is disclosed by which, even if an STS-N frame of an abnormal length is detected by a reassembly buffer, the frame length can be compensated for while preventing an overflow of the reassembly buffer. When an STS-(N×M) frame formed by multiplexing M STS-N frames formed from different channels is cellularized into ATM cells or M different STS-N frames assembled from ATM cells are multiplexed into an STS-(N×M) frame, an ATM cell sync signal and ATM cell data from a buffer section are outputted as a frame pulse signal and frame data from a reassembly section to a circuit termination section, and frame length compensation of the frame pulse signal and the frame data is performed by the reassembly section.Type: GrantFiled: January 31, 2011Date of Patent: December 31, 2013Assignee: Juniper Networks, Inc.Inventors: Souichi Kataoka, Ken Shiraishi
-
Patent number: 8619614Abstract: A device, connected to a monitoring appliance, may include a traffic analyzer to receive a data unit and identify a traffic flow associated with the data unit. The device may also include a traffic processor to receive the data unit and information regarding the identified traffic flow from the traffic analyzer, determine that the identified traffic flow is to be monitored by the monitoring appliance, change a port number, associated with the data unit, to a particular port number to create a modified data unit when the identified traffic flow is to be monitored by the monitoring appliance, and send the modified data unit to the monitoring appliance.Type: GrantFiled: January 18, 2012Date of Patent: December 31, 2013Assignee: Juniper Networks, Inc.Inventors: Krishna Narayanaswamy, Kannan Varadhan
-
Patent number: 8621337Abstract: A device identifies, based on a program code instruction, an attempted write access operation to a fenced memory slab, where the fenced memory slab includes an alternating sequence of data buffers and guard buffers. The device assigns read-only protection to the fenced slab and invokes, based on the attempted write access operation, a page fault operation. When a faulting address of the attempted write operation is not an address for one of the multiple data buffers, the device performs a panic routine. When the faulting address of the attempted write operation is an address for one of the multiple data buffers, the device removes the read-only protection for the fenced slab and performs a single step processing routine for the program code instruction.Type: GrantFiled: September 30, 2010Date of Patent: December 31, 2013Assignee: Juniper Networks, Inc.Inventors: Samuel Jacob, Vijay Paul
-
Patent number: 8621621Abstract: A computing device may receive content from a content source. The content may include software code that is executable by a web browser, and may be directed to another computing device. The computing device may inject security content into the content. The security content may include software instructions to enable the web browser to detect malicious software content within the content. The computing device may communicate the content to the other computing device.Type: GrantFiled: December 21, 2011Date of Patent: December 31, 2013Assignee: Juniper Networks, Inc.Inventors: Bryan Burns, Alex Waterman
-
Patent number: 8619550Abstract: A connection between network nodes in a communication network is backed up. A failover switched path such as a label-switched path (LSP) is created starting at a first network node of a connection and ending at the second node of the connection, while bypassing the protected connection. In the event of connection failure, data is transmitted through the failover switched path (e.g., LSP). A network operator can selectively protect different types of data by using filters that bind one or more types of traffic received over one or more interfaces to different failover switched paths (LSPs).Type: GrantFiled: September 30, 2011Date of Patent: December 31, 2013Assignee: Juniper Networks, Inc.Inventors: Ping Pan, Der-Hwa Gan, Keith E. Holleman, Manoj Leelanivas, Nischal Sheth, Arun Vaidyanathan
-
Publication number: 20130343174Abstract: Techniques are described for detecting failure or degradation of a service enabling technology function independent from an operational state of a service node hosting the service enabling technology function. For example, a service node may provide one or more service enabling technology functions, and service engineered paths may be traffic-engineered through a network to service node network devices that host a service enabling technology function. A monitor component at the service layer of the service node can detect failure or degradation of one or more service enabling technology functions provided by the service node. The monitor component reports detection of failure or degradation to a fault detection network protocol in a forwarding plane of the service node. The fault detection network protocol communicates with an ingress router of a service engineered path to trigger fast reroute by the ingress of traffic flows to bypass the affected service enabling technology function.Type: ApplicationFiled: June 26, 2012Publication date: December 26, 2013Applicant: JUNIPER NETWORKS, INC.Inventors: James Guichard, David Ward
-
Publication number: 20130346574Abstract: An example device includes an interface to receive, from a device management system, a request message that conforms to a network management protocol, a control unit that provides an execution environment for a management agent, and a data repository. The request message includes a set of managed object identifiers and a set of filter operator object identifiers. The management agent is operable to generate at least one filter criterion based on the managed object identifiers and the filter operator object identifiers, to retrieve managed object values stored in the data repository based on the managed object identifiers, each corresponding to a respective managed object identifier specified in the request message, to generate and output to the device management system a response message based on the managed object identifiers of the request message and the retrieved managed object values that satisfy one or more of the at least one filter criterion.Type: ApplicationFiled: June 26, 2012Publication date: December 26, 2013Applicant: JUNIPER NETWORKS, INC.Inventors: Gouri Sankar Singaraju, Vivek Singh
-
Publication number: 20130346470Abstract: Techniques are described for distributing network device tasks across virtual machines executing in a computing cloud. A network device includes a network interface to send and receive messages, a routing unit comprising one or more processors configured to execute a version of a network operating system, and a virtual machine agent. The virtual machine agent is configured to identify a virtual machine executing at a computing cloud communicatively coupled to the network device, wherein the identified virtual machine executes an instance of the version of the network operating system, to send, using the at least one network interface and to the virtual machine, a request to perform a task, and to receive, using the at least one network interface and from the virtual machine, a task response that includes a result of performing the task. The routing unit is configured to update the network device based on the result.Type: ApplicationFiled: June 26, 2012Publication date: December 26, 2013Applicant: JUNIPER NETWORKS, INC.Inventors: Joel Obstfeld, David Ward, Colby Barth, Mu Lin
-
Patent number: 8614951Abstract: In one aspect the invention provides a method for allocating bandwidth in a network appliance where the network appliance includes a plurality of guaranteed bandwidth buckets used to evaluate when to pass traffic through the network appliance. The method includes providing a shared bandwidth bucket associated with a plurality of the guaranteed bandwidth buckets, allocating bandwidth to the shared bandwidth bucket based on the underutilization of bandwidth in the plurality of guaranteed bandwidth buckets and sharing excess bandwidth developed from the underutilization of the guaranteed bandwidth allocated to the individual guaranteed bandwidth buckets. The step of sharing includes borrowing bandwidth from the shared bandwidth bucket by a respective guaranteed bandwidth bucket to allow traffic to pass immediately through the network appliance.Type: GrantFiled: August 31, 2011Date of Patent: December 24, 2013Assignee: Juniper Networks, Inc.Inventors: Changming Liu, Yan Ke
-
Patent number: 8615009Abstract: An example network device includes a network interface and a control unit that receives a packet having header information. The control unit includes a forwarding structure having a plurality of entries that each refers to one of a plurality of logical interfaces, a forwarding engine configured to access the forwarding structure to select a first logical interface to which to forward the packet based on the header information, wherein the first logical interface comprises a pseudo-device interface (PDI). The control unit also includes a PDI module that tunnels the packet to an external service complex (ESC) by at least applying a set of metadata to the packet, encapsulating the packet with a header, and forwarding the packet to the ESC via the network interface, and wherein the metadata allows the ESC to determine a set of services to be applied to the packet based on the metadata.Type: GrantFiled: April 22, 2010Date of Patent: December 24, 2013Assignee: Juniper Networks, Inc.Inventors: Sankar Ramamoorthi, Satyadeva Konduru, Gregory Kotlyar, Satish Raghunath, Sivakumar Venkatesan, Ramakanth Gunuganti