Abstract: An arbiter performs arbitration over a plurality of queues and provides data to a plurality of mutually exclusive destinations using combination logic that logically combines a plurality of mutually exclusive vectors into a combination vector. Each of the mutually exclusive vectors corresponds to one of the plurality of mutually exclusive destinations. A number of vector arbiters perform arbitration on each mutually exclusive vector to select a position within the mutually exclusive vector. A combination arbiter performs arbitration on the combination vector to determine a position within the combination vector, which corresponds to the next queue to be serviced. A comparison element compares the position within a mutually exclusive vector and the position within the combination vector to determine the destination of the data within the next queue to be serviced.
Abstract: A transmission source bridge collects packets sent from nodes connected to a serial bus in accordance the IEEE1394 Standards, into one packet in an order they are to be transmitted and then sends them onto an ATM network, so that a transmission destination bridge receives this packet and divides it into a plurality of smaller packets and transfers them, in the order they were sent, to nodes connected to the serial bus in accordance with the IEEE1394 Standards.
Abstract: In general, the invention facilitates diagnosing fault conditions, such as flapping, by permitting users to request information for specific components in a network device such as a router. The invention also facilitates the diagnosis of other fault conditions, including, but not limited to, excessive numbers of dropped packets, hard drive crashes, high temperature readings, and inactive interface cards. A user may obtain a targeted log containing information relating to selected fault conditions or other network device events, rather than a system log containing information relating to all network device events, some of which may not be of interest to the user. The targeted log may be parsed and analyzed with greater ease than the system log.
Abstract: Methods for optimizing the media path between multimedia endpoints in a network are described. One embodiment allows avoiding having to relay the media traffic through a central device, such as a border controller's media controller element, and lets endpoints communicate directly under various conditions.
Abstract: Identifiers are assigned to devices communicating via a number of virtual channels. If additional identifiers are needed, one or more new virtual channels are created and the identifiers are reused for the new virtual channel.
Abstract: A data compression system and method for that is capable of detecting and eliminating repeated phrases of variable length within a window of virtually unlimited size.
Abstract: A network device includes a data structure and an ager. The data structure includes a group of positions. One or more of the positions are associated with at least one item. The ager is configured to sequentially analyze each position of the group of positions, and recycle, at each analyzed position, any item associated with the analyzed position.
Abstract: A new architecture provides network-based mobility in cellular networks that is built on Internet Protocol (IP)/Multiprotocol Label Switching (MPLS) technologies, such as Virtual Private Local Area Network (LAN) Service (VPLS), the Border Gateway Protocol (BGP) and BGP MPLS Layer 3 Virtual Private Networks (VPNs). The architecture consists of several building blocks that provide functionality for different aspects of cellular network mobility. One building block is network-based macro mobility in IP/MPLS networks. The macro mobility techniques described herein are built on extensions to a routing protocol such as BGP. Another building block relates to transferring subscriber context between network devices while preserving the IP address of the subscriber. The techniques described herein provide a subscriber context transfer mechanism for mobile subscriber management that is built on extensions to a routing protocol such as BGP.
Abstract: A network device includes one or more sprayers, multiple packet processors, and one or more desprayers. The sprayers receive packets on at least one incoming packet stream and distribute the packets according to a load balancing scheme that balances the number of bytes of packet data that is given to each of the packet processors. The packet processors receive the packets from the sprayers and process the packets to determine routing information for the packets. The desprayers receive the processed packets from the packet processors and transmit the packets on at least one outgoing packet stream based on the routing information.
Type:
Application
Filed:
March 25, 2010
Publication date:
July 15, 2010
Applicant:
JUNIPER NETWORKS, INC.
Inventors:
Stefan DYCKERHOFF, Pankaj Patel, Pradeep Sindhu, Ashok Krishnamurthi, Hann-Hwan Ju, Ramalingam K. Anand, Dennis C. Ferguson, Chang-Hong Wu
Abstract: A data flow rate policer enforces data flow policies for a number of data flows using a probabilistic policy enforcement mechanism. The policer includes a memory that stores the state of each data flow in a compact data structure. Additionally, the policer includes one or more policing engines that implement the actual data flow policies based on information derived from the data structures. The policing engines may be implemented in hardware to increase performance.
Type:
Application
Filed:
March 26, 2010
Publication date:
July 15, 2010
Applicant:
JUNIPER NETWORKS, INC.
Inventors:
Dennis C. Ferguson, Devereaux C. Chen, John W. Stewart, III, James Washburn, Jeffrey R. Zimmer
Abstract: A new architecture provides network-based mobility in cellular networks that is built on Internet Protocol (IP)/Multiprotocol Label Switching (MPLS) technologies, such as Virtual Private Local Area Network (LAN) Service (VPLS), the Border Gateway Protocol (BGP) and BGP MPLS Layer 3 Virtual Private Networks (VPNs). The architecture consists of several building blocks that provide functionality for different aspects of cellular network mobility. One building block is network-based macro mobility in IP/MPLS networks. The macro mobility techniques described herein are built on extensions to a routing protocol such as BGP. Another building block relates to transferring subscriber context between network devices while preserving the IP address of the subscriber. The techniques described herein provide a subscriber context transfer mechanism for mobile subscriber management that is built on extensions to a routing protocol such as BGP.
Abstract: A new architecture provides network-based mobility in cellular networks that is built on Internet Protocol (IP)/Multiprotocol Label Switching (MPLS) technologies, such as Virtual Private Local Area Network (LAN) Service (VPLS), the Border Gateway Protocol (BGP) and BGP MPLS Layer 3 Virtual Private Networks (VPNs). The architecture consists of several building blocks that provide functionality for different aspects of cellular network mobility. One building block is network-based macro mobility in IP/MPLS networks. The macro mobility techniques described herein are built on extensions to a routing protocol such as BGP. Another building block relates to transferring subscriber context between network devices while preserving the IP address of the subscriber. The techniques described herein provide a subscriber context transfer mechanism for mobile subscriber management that is built on extensions to a routing protocol such as BGP.
Abstract: An automated method for identifying confidential information may include inputting a search term based on a set of policy rules into a search engine, and causing the search engine to perform a search based on the search term. The method may also include analyzing search results obtained from the search engine against the policy rules to identify the search results containing confidential information.
Abstract: In general, techniques are described in which a plurality of network switches automatically configure themselves to operate as a single virtual network switch. A virtual switch is a collection of individual switch devices that operate like as single network switch. As described herein, network switches in a network that are capable of participating in a virtual switch may automatically discover one another. The participating network switches may then elect one of the participating switches as a master switch. The master switch may generate forwarding information and store the forwarding information in the participating switches, including the master switch. The forwarding information causes the participating switches to act like a single network switch.
Type:
Grant
Filed:
June 13, 2007
Date of Patent:
July 13, 2010
Assignee:
Juniper Networks, Inc.
Inventors:
Rajashekar Reddy, Ankur Singla, Harshad Nakil, Pedro R. Marques, Ashish Ranjan
Abstract: A packet switching system capable of ensuring the sequence and continuity of packets and further compensating for delays in transmission is disclosed. Each of two redundant switch sections has a high-priority queue and a low-priority queue for each of output ports. A high-priority output selector selects one of two high-priority queues corresponding to respective ones of the two switch sections to store an output of the selected one into a high-priority output queue. A low-priority output selector selects one of two low-priority queues corresponding to respective ones of the two switch sections to store an output of the selected one into a low-priority output queue. The high-priority and low-priority output selectors are controlled depending on a system switching signal and a packet storing status of each of the high-priority and low-priority queues.
Abstract: A system processes data corresponding to multiple data streams. The system includes multiple queues that store the data, stream-to-queue logic, dequeue logic, and queue-to-stream logic. Each of the queues is assigned to one of the streams based on a predefined queue-to-stream assignment. The stream-to-queue logic identifies which of the queues has data to be processed. The dequeue logic processes data in the identified queues. The queue-to-stream logic identifies which of the streams correspond to the identified queues.
Abstract: A system selectively drops data from a queue. The system includes queues that temporarily store data, a dequeue engine that dequeues data from the queues, and a drop engine that operates independently from the dequeue engine. The drop engine selects one of the queues to examine, determines whether to drop data from a head of the examined queue, and marks the data based on a result of the determination.
Type:
Application
Filed:
December 10, 2009
Publication date:
July 8, 2010
Applicant:
Juniper Networks, Inc.
Inventors:
Pradeep Sindhu, Dabashis Basu, Sreeram Veeragandham, Jayabharat Boddu, Thomas Michael Skibo
Abstract: A base station, in a mobile communication network, includes a receive component to receive, from a higher rank station in the network, a particular data unit that includes multiple data units multiplexed together; a master processor to determine that the first portion of the particular data unit is destined for the base station and that the second portion of the particular data unit is not destined for the base station, and discard the second portion of the particular data unit; and a slave processor to determine that the second portion of the particular data unit is destined for the other base station and that the first portion of the particular data unit is not destined for the other base station, and send the second portion of the particular data unit to the other base station.
Abstract: Techniques are described for automatically establishing network tunnels among a set of routers. For example, the techniques allow a routing protocol, such as the Border Gateway Protocol (BGP), to be extended to generate routing advertisements that direct a receiving device to automatically establish a particular type of tunnel, e.g., a Resource Reservation Protocol with Traffic Engineering extensions (RSVP-TE) Label Switched Path (LSP), and automatically direct particular network traffic onto the tunnel. A method comprises receiving a routing advertisement from a network device, wherein the routing advertisement includes a destination reachable by the network device, and a tunnel attribute that specifies a type of network tunnel to be established to the network device for forwarding traffic to the destination, automatically establishing a network tunnel to the network device in accordance with the tunnel attribute, and forwarding network traffic to the destination using the established network tunnel.