Abstract: A method and system merging a file across multiple versions of the file is provided. A file check-in request is identified. A merge candidate associated with the file is automatically identified. A view associated with the identified merge candidate is automatically identified. The file is merged with the merge candidate in the view, resulting in a merge result.
Type:
Grant
Filed:
April 2, 2007
Date of Patent:
October 13, 2009
Assignee:
Juniper Networks, Inc.
Inventors:
Marlene Cote, Philip S. Kasten, Edward A. Heiner, Jr., Eric L. Peterson
Abstract: A scheduler allowing high-speed scheduling scalable with the number of input and output ports of a crosspoint switch and suppressed unfairness among inputs is disclosed. The scheduler includes an M×M matrix of scheduling modules, each of which schedules packet forwarding connections from a corresponding input group of input ports to selected ones of a corresponding output group of output ports based on reservation information. A diagonal module pattern is used to determine a set of M scheduling modules to avoid coming into collision with each other. Each determined scheduling module performs reservation of packet forwarding connections based on current reservation information and transfers updated reservation information in row and column directions of the M×M matrix.
Abstract: A system facilitates the configuring of a set of devices. The system stores templates, where each template includes configuration data that applies to one or more of the devices. The system configures the devices based on the configuration data in the templates.
Abstract: A network device implements congestion management of sessions of a network protocol. In one implementation, an incoming request component receives session requests for a negotiation session between the network device and a second network device. A capacity pool stores a value relating to capacity of the network device to continue to efficiently process the session requests. New sessions are initiated when the value stored in the capacity pool is less than an estimate of the capacity of the network device at which the network device maximizes processor usage while minimizing session timeouts.
Abstract: Techniques are described for fast reroute of traffic associated with a point to multi-point (P2MP) tunnel. A system may, for example, include a source network device and a plurality of destination network devices. The system further includes a label switched path (LSP) tunnel from the source network device to the plurality of destination network devices. The LSP tunnel includes a plurality of branch LSPs and may include one or more bypass tunnel associated with one or more of the branch LSPs. In other configurations, the system may include a second LSP tunnel from the source network device to the plurality of destination network devices. The second LSP tunnel includes a plurality of detour branch LSPs, and each of the detour branch LSPs corresponds to a respective one of the branch LSPs for the first P2MP LSP tunnel.
Abstract: A system harvests sessions in a network device. The system receives a first data unit associated with a session and installs the session in a first queue until expiration of a first time period. The system installs the session in a second queue until the occurrence of at least one of an expiration of a second time period and a receipt of a data unit associated with the session. The system harvests the session upon expiration of the second time period.
Abstract: A linked list traversal system identifies when a linked list has become inefficient, either through attack or an undue multiplicity of collisions. A data unit is parsed to extract a key. A first hash result associated with the key is calculated based on a first hash function. A first linked list is identified based on the first hash result. It is determined whether the first linked list has been compromised. A second hash result associated with the key is calculated based on a second hash function when the first linked list has been compromised. A second linked list is established based on the second hash result, where the second hash result is different from the first hash result.
Abstract: A cable modem termination system may include a number of receivers and a number of input ports configured to receive bursts of data from a number of cable modems on a number of channels. At least one receiver of the number of receivers may be configured to receive and decode bursts of data on at least one channel according to a first control signal. An input selector may be connected between the number of input ports and the number of receivers. The input selector may be configured to route bursts of data from the number of input ports to the number of receivers according to a second control signal.
Abstract: A device may include an interface to send policy information to an evaluation module, where the policy information is related to a group of policies, and receive a group of results from the evaluation module, where the group of results indicates whether the status of a source device complies with the group of policies. The interface may send an instruction to a destination device configured to implement at least a subset of the policies with respect to the source device based on the instruction.
Type:
Grant
Filed:
June 5, 2006
Date of Patent:
September 22, 2009
Assignee:
Juniper Networks, Inc.
Inventors:
Stephen R. Hanna, Roger Allen Chickering
Abstract: A layer 1 network frame is disclosed that includes data of a layer 2 frame. A header of the layer 1 frame header includes: a packet length field to indicate a size of a payload portion of the layer 1 frame, a priority field to indicate a priority of the layer 1 frame, a protocol field to identify a protocol of the data in the layer 2 frame, a frame mode field to indicate a correspondence between the layer 1 frame and the layer 2 frame included within the payload, a stuff field to indicate whether stuff data is contained in the layer 1 frame, and a cyclic redundancy check (CRC) field to indicate a CRC result.
Abstract: A substitution call control system includes an ATM (Asynchronous Transfer Mode) subscriber network of an ATM communication network. The ATM subscriber network includes a plurality of network terminators respectively connected with a plurality of subscriber terminals, and an ATM subscriber line concentrator, which accommodates VCs (Virtual Connection) to the plurality of network terminators, and is connected with a ATM switching apparatus of the ATM network through a UNI (User-Network Interface). The ATM subscriber line concentrator includes a substitution call control function to substitute for the plurality of network terminators and the subscriber terminals for a call control.
Abstract: A system receives a set of datagrams and forms frames based on the datagrams, where at least one of the frames includes data associated with multiple ones of the datagrams. The system writes the frames to memory to form superframes in the memory, where each of the superframes includes multiple ones of frames. The system reads the superframes from the memory, recreates the datagrams based on the superframes, and outputs the datagrams.
Abstract: In general, the invention is directed to techniques of load balancing network traffic among paths on a point-to-multipoint overlay network. In load balancing the network traffic, the techniques take into consideration costs associated with paths through the overlay network and costs associated with paths beyond the egress points of the overlay network, even when such costs may be unequal.
Abstract: Principles of the invention are described for providing virtual private local area network service (VPLS) multicast instances across a public network by utilizing multicast trees. In particular, the VPLS multicast instances transport layer two (L2) multicast traffic, such as Ethernet packets, between customer networks via the public network. The principles described herein enable VPLS multicast instances to handle high bandwidth multicast traffic. The principles also reduce the state and the overhead of maintaining the state in the network by removing the need to perform snooping between routers within the network.
Abstract: A communication node contains intelligence for directing both internet protocol (IP) packets and Asychronous Transfer Mode (ATM) cells toward their destinations. The ATM cells and IP packets may be received within a common data stream. The respective devices process the ATM cells and IP packets to direct the cells and packets to the proper output ports towards their destinations. The device is capable of performing policing and quality of service (QOS) processing on both the ATM cells and the IP packets.
Abstract: A network device includes an input interface, at least one processing path and an output interface. The input interface receives data units on a plurality of streams and assigns a first sequence number to each of the received data units. The at least one processing path performs a route look-up for each of the data units, where the route look-up determines a routing destination for a respective data unit. The output interface assigns a second sequence number to each of the processed data units based on a number of memory references associated with the route look-up for each of the data units and re-orders the processed data units based on the second sequence number assigned to each of the processed data units.
Type:
Grant
Filed:
May 19, 2004
Date of Patent:
September 8, 2009
Assignee:
Juniper Networks, Inc.
Inventors:
Dennis C. Ferguson, Hann-Hwan Ju, Atsushi Kasuya, Gerald Cheung, Devereaux C. Chen
Abstract: Secure tunneled multicast transmission and reception through a network is provided. A join request may be received from a second tunnel endpoint, the join request indicating a multicast group to be joined. Group keys may be transmitted to the second tunnel endpoint, where the group keys are based at least on the multicast group. A packet received at the first tunnel endpoint may be cryptographically processed to generate an encapsulated payload. A header may be appended to the encapsulated payload to form an encapsulated packet, wherein the header includes information associated with the second tunnel endpoint. A tunnel may be established between the first tunnel endpoint and the second tunnel endpoint based on the appended header. The encapsulated packet may be transmitted through the tunnel to the second tunnel endpoint. The second tunnel endpoint may receive the encapsulated packet. Cryptographic processing of the encapsulated packet may reveal the packet having a second header.
Type:
Grant
Filed:
October 29, 2004
Date of Patent:
September 8, 2009
Assignee:
Juniper Networks, Inc.
Inventors:
Gregory M. Lebovitz, Changming Liu, Choung-Yaw Shieh
Abstract: A hybrid type telephony system capable of establishing a connection between conventional type telephone sets contained in an exchange unit and LAN type telephone sets contained in an IP network, the system comprising: a gateway circuit connected between the exchange unit and the IP network and performing voice data format conversion, and a central control unit connected to the LAN of the IP network for establishing a communication path to the exchange unit via a control bus, controlling switching of IP packets of the IP network, managing IP address information of the LAN type telephone sets and the gateway circuit via the LAN, and controlling connection between the LAN type telephone sets and connection between the LAN type telephone sets and the gateway circuit.
Abstract: A system and method for transferring Media over IP (MoIP) packets over an overlay network is provided. The system provides specially designed overlay network units located at key points in the IP network effectively creating an overlay network that is capable of interacting both on the overlay level as well as over the standard IP network.
Type:
Grant
Filed:
July 16, 2002
Date of Patent:
September 8, 2009
Assignee:
Juniper Networks, Inc.
Inventors:
Shai Mohaban, Benjamin J. Getz, Itzhak Parnafes, Opher Kahane
Abstract: A network device seamlessly handles multicast traffic flow between virtual private networks (VPNs) and content providers located external to the VPNs. For example, the network device, such as a router, comprises an interface card and a forwarding component. The forwarding component maintains forwarding data for a public network and forwarding data for the virtual private network. The interface card receives a multicast packet from a virtual private network destined for a multicast content provider external to the virtual private network. When forwarding the multicast packet, the forwarding component bypasses the forwarding data for the public network and forwards the multicast packet to the multicast content provider in accordance with the forwarding data for the public network.