Abstract: A base station, in a mobile communication network, includes a receive component to receive, from a higher rank station in the network, a particular data unit that includes multiple data units multiplexed together; a master processor to determine that the first portion of the particular data unit is destined for the base station and that the second portion of the particular data unit is not destined for the base station, and discard the second portion of the particular data unit; and a slave processor to determine that the second portion of the particular data unit is destined for the other base station and that the first portion of the particular data unit is not destined for the other base station, and send the second portion of the particular data unit to the other base station.
Abstract: A network device seamlessly handles multicast traffic flow between virtual private networks (VPNs) and content providers located external to the VPNs. For example, the network device, such as a router, comprises an interface card and a forwarding component. The forwarding component maintains forwarding data for a public network and forwarding data for the virtual private network. The interface card receives a multicast packet from a virtual private network destined for a multicast content provider external to the virtual private network. When forwarding the multicast packet, the forwarding component bypasses the forwarding data for the public network and forwards the multicast packet to the multicast content provider in accordance with the forwarding data for the public network.
Abstract: A method performed by a first network device may include receiving a request for a resource from an end-point device and acknowledging the request for the resource to the end-point device. The method may also include receiving a resource coordination message from a second network device and transmitting a return resource coordination message to the second network device.
Abstract: Techniques are described that allow a network device, such as a router, to dynamically build VLAN interfaces based on subscriber information strings included within packets. In particular, the network device comprises an interface controller and a forwarding controller, where the forwarding controller receives the packet over an Ethernet port and forwards the received packet to the interface controller. The packet includes both Ethernet tagging information and a subscriber information string. The interface controller comprises an Ethernet module that dynamically builds a primary virtual local area network (VLAN) sub-interface (PVS) based on the Ethernet tagging information. The Ethernet module also dynamically builds a subscriber VLAN sub-interface (SVS) based on the subscriber information string. The SVS allows the network device to distinguish between subscribers residing on the same VLAN, and, therefore, to provide subscriber specific services.
Type:
Grant
Filed:
February 11, 2009
Date of Patent:
May 17, 2011
Assignee:
Juniper Networks, Inc.
Inventors:
Linda M. Cabeca, Mathias Kokot, Jerome P. Moisand, Vitali Vinokour, Thomas Lemaire, Karen Ruben
Abstract: A device may include an interconnect module that includes a number of ports, where each port is configured to receive both an alternating current (AC) power supply and a direct current (DC) power supply; where the interconnect module provides power from the received power supplies to a plurality of field replaceable units (FRUs).
Abstract: This application describes techniques for peer-agnostic socket replication to implement graceful failover. An exemplary method to enable non-stop routing includes receiving a packet with a first routing engine of a network device having the first routing engine and a second routing engine configured as a backup routing engine, replicating, before processing the packet at a transport layer, the packet to form a replicated packet, sending the replicated packet from the first routing engine to the second routing engine, receiving, at the first routing engine, an acknowledgement from the second routing engine acknowledging reception of the replicated packet, after receiving the acknowledgment, processing the packet at the transport layer of the first routing engine to extract application-layer data and assemble a routing message, and storing the application-layer data from the processed packet in a socket associated with a routing process of the first routing engine.
Type:
Grant
Filed:
December 4, 2008
Date of Patent:
May 10, 2011
Assignee:
Juniper Networks, Inc.
Inventors:
Saurabh Sandhir, Manoj Kumar Guglani, David S. Wang, Navneet Yadav
Abstract: In general, principles of the invention relate to techniques for detecting data plane failures in Multi-Protocol Label Switching (MPLS) Label-Switched Paths (LSPs) that may be tunneled over one or more other LSPs. More specifically, the techniques described herein allow for testing connectivity of an LSP that is tunneled through at least one other LSP, and testing connectivity of an inter-autonomous system LSP. For example, a method comprises providing, with an intermediate label-switching router (LSR) of an LSP, instructions to an ingress LSR of the LSP to modify a forwarding equivalence class (FEC) stack of MPLS echo request packets. The intermediate LSR may provide the instructions within an MPLS echo reply packet.
Abstract: A system may identify a group of first links in a document, where the first links correspond to a group of objects within the document and are associated with a same identifier. The system may replace the first links in the document with second links that point to a number of different identifiers, and forward the document with the second links to a client.
Abstract: Techniques are described to enable two or more layer two (L2) firewall devices to be configured as a high availability (HA) cluster in an active-active configuration. A first layer two (L2) firewall and a second L2 firewall are positioned within the same L2 network. The first L2 firewall and the second L2 firewall are concurrently configured with active virtual security devices (VSDs) within the L2 network, and concurrently apply L2 firewall services to packets within the L2 network. A VSD of one of the L2 firewalls automatically switches to an active VSD status for a VSD group in place of a VSD of another L2 firewall when the other L2 firewall fails.
Type:
Grant
Filed:
May 22, 2007
Date of Patent:
May 10, 2011
Assignee:
Juniper Networks, Inc.
Inventors:
Dongyi Jiang, Chih-Wei Chao, Rakesh Nair, Daniel Hirschberg
Abstract: A retainer may include a hollow portion for holding a connector, a path for conveying the connector from outside the retainer to the hollow portion, a surface that is adjacent to the connector when the connector is held in the hollow portion, a fastener for applying a force to couple the retainer to a device, and a member that causes the surface to press the connector against a connector receiver associated with the device and to prevent the connector from being disengaged from the connector receiver.
Abstract: The principles of the invention allow an intermediate device, such as a router, to intelligently filter redundant data streams provided by one or more hosts. In the event of a network disturbance, the router may stop filtering one of the now needed redundant data streams in a manner that may reduce the consumption of network resources, such as bandwidth, without having to modify end-user applications residing on subscriber devices. Therefore, the router acting in accordance with the principles of the invention may transparently provide data streams to subscriber devices despite the occurrence of a network disturbance that may otherwise prevent the subscriber devices from receiving the data streams.
Abstract: A system and method that optimizes transmission control protocol (TCP) flow control without intruding upon TCP's core algorithms. A control module relatively near a sender's local area network (LAN) automatically identifies a packet flow that has become window-limited. After the packet flow has been identified as window-limited, the control module relatively near the sender's LAN and another control module relatively near a receiver's LAN optimize the packet flow by increasing the window size indicated in the receiver's acknowledgment packet. Both control modules operate synchronously to transparently manage the packet flow between the sender and the receiver.
Type:
Grant
Filed:
July 15, 2009
Date of Patent:
May 10, 2011
Assignee:
Juniper Networks, Inc.
Inventors:
Balraj Singh, Amit P. Singh, Vern Paxson
Abstract: The label distribution protocol (LDP) is extended to set up a point to multi-point (P2MP) label switched path (LSP) across a computer network from a source network device to one or more destination network devices. LDP is extended to create a P2MP label map message containing a label and a P2MP forwarding equivalence class (FEC) element having a root node address and an identifier. The P2MP FEC element may, for example, associate an address of the root node of the P2MP LSP with an opaque identifier. The P2MP FEC element uniquely identifies the P2MP LSP. The P2MP FEC element may be advertised with a label in a P2MP label map message. A source network device or the destination network devices may initiate setup and teardown of the P2MP LSP. The P2MP label map messages may be propagated from the destination network devices to the source network device.
Type:
Grant
Filed:
July 8, 2009
Date of Patent:
May 10, 2011
Assignee:
Juniper Networks, Inc.
Inventors:
Ina Minei, Kireeti Kompella, Nischal Sheth
Abstract: Systems, apparatus, methods, and computer program products for multicast access control are provided to analyze incoming data based on a source zone and a destination zone of the incoming data. Appropriate access control rules are applied to incoming data based on the results of the analysis. Additional implementations of a multicast access control include using a proxy rendezvous point operable to function as a rendezvous point in place of a physical rendezvous point.
Type:
Grant
Filed:
April 6, 2010
Date of Patent:
May 10, 2011
Assignee:
Juniper Networks, Inc.
Inventors:
Changming Liu, Gregory M. Lebovitz, Purvi Desai
Abstract: Routing techniques are described that separate network topology information and management from network protocol addressing information, e.g., network prefixes, that network routers typically use during the packet forwarding process. The techniques provide separate topological identifiers to identify individual topological elements of the network, referred to as aggregates. A router within a network exchanges topological information with other routers that specifies routes for reaching destinations within a set of aggregates that represent topological elements of a network. In accordance with the topological information, the router generates forwarding information that associates the destinations with respective next hops within the network, and forwarding packets in accordance with the forwarding information.
Abstract: Techniques are described for providing routing scalability within a protocol such as a label distribution protocol. A method comprises receiving a label mapping message at an ingress router for establishing a label switched path (LSP) that identifies within a first portion a first label to be used for forwarding network traffic to an intermediate router of the LSP, and identifies within a separate portion a second label to be used for forwarding network traffic to an egress router of the LSP. The method further comprises parsing the first and separate portions, installing first forwarding state at the ingress router identifying the first label for forwarding network traffic to the intermediate router, and installing second forwarding state at the ingress router identifying a two-label stack comprising the first label as an outer label and the second label as an inner label for forwarding network traffic to the egress router.
Abstract: A communication system for use with a packet-based network is disclosed. A first node is configured to transmit circuit data in data packets across the network. A second node is configured to receive the data packets from the network and serialize the synchronous data. The second node comprises a configurable buffer, the buffer being configurable to adjust to network packet delay variance through analysis of packet delay variance as measured over at least one period of time.
Abstract: A system detects an error in a network device that receives data via a group of data streams. The system receives a data unit, where the data unit is associated with at least one of the streams and a sequence number for each of the associated streams. The system determines whether each sequence number associated with the data unit is a next sequence number for the corresponding stream, and detects an error for a particular stream when the sequence number for that stream is not a next sequence number.
Abstract: A correlation database stores profiling data that describes packet flows within a network. A network device stores a set of rules for permissible packet flows within the network. The network device queries the correlation database and identifies any of the packet flows within the correlation database that are exceptions to the rules. Each of the rules may specify network elements and application-layer elements to define permissible traffic characteristics for the network.
Abstract: In general, the invention is directed to techniques of load balancing network traffic among paths on a point-to-multipoint overlay network. In load balancing the network traffic, the techniques take into consideration costs associated with paths through the overlay network and costs associated with paths beyond the egress points of the overlay network, even when such costs may be unequal.