Abstract: A network device may transmit, to a first neighbor network device, information indicating that the network device supports bit indexed explicit replication (BIER), where the network device does not support BIER. The network device may receive, from the first neighbor network device, a multicast packet that includes a first BIER label associated with the network device. The network device may replace the first BIER label with a second BIER label associated with a second neighbor network device, and may transmit the multicast packet to the second neighbor network device. The second neighbor network device may be to tunnel the multicast packet to a third neighbor network device that supports BIER.
Abstract: A device receives topology data and path data associated with a network that includes network devices. The device determines planned bandwidths for new paths through the network based on the topology data and the path data, and ranks the new paths, based on the planned bandwidths, to generate a ranked list. The device selects information identifying a first new path from the ranked list, wherein the first new path includes a first planned bandwidth. The device determines whether the first new path can be provided via a single route through the network based on the first planned bandwidth, and identifies two or more routes through the network for the first new path when the first new path cannot be provided via the single route. The device causes the first planned bandwidth to be reserved by two or more of the network devices for the two or more routes.
Abstract: A device may determine that a file of a client device is a malicious file. The device may obtain remote access to the client device using a connection tool. The connection tool may provide access and control of the client device. The remote access may include access to a file location of the malicious file. The device may determine file information associated with the malicious file using the remote access to the client device. The device may select one or more remediation actions based on the file information. The device may cause the one or more remediation actions to be executed using the remote access to the client device.
Type:
Grant
Filed:
July 25, 2017
Date of Patent:
May 5, 2020
Assignee:
Juniper Networks, Inc.
Inventors:
Kyle Adams, Daniel J. Quinlan, Jacob Asher Langton
Abstract: A device may include one or more input components and one or more processors to: receive network entity data for a network entities operating on a network, the network entity data indicating network entity attributes associated with the network entities. The device may generate a map of the network entities based on the network entity data, the map of the network entities defining, for each network entity included in the map of the plurality of network entities, a relationship between the network entity and at least one other network entity included in the plurality of network entities. In addition, the device may identify a network entity relationship rule based on the map of the network entities and perform an action based on the network entity relationship rule.
Abstract: An apparatus includes a finite impulse response (FIR) filter to receive a digital signal and a transmitter, operatively coupled to the FIR filter, to transmit an analog signal, converted from the digital signal, to a communication channel. The FIR filer is configured to change at least one operating parameter based on a bandwidth of the analog signal after transmission in the communication channel. The bandwidth of the analog signal is estimated, using an estimator, based at least in part on raw sampling data generated by an analog-to-digital converter (ADC) operatively coupled to the transmitter.
Abstract: A cloud network may include a distributed security switch (DSS). The DSS may be to receive configuration information from the hypervisor. The configuration information may include a set of access mode attributes and a security policy. The DSS may be to determine that a packet is to be directed from a source virtual machine to a target virtual machine. The DSS may be to identify an egress interface of the source virtual machine and an ingress interface of the target virtual machine. The egress interface may be associated with a first access mode attribute and the ingress interface being associated with a second access mode attribute. The DSS may be to selectively route the packet, using the shared memory, based on the first access mode attribute, the second access mode attribute, and the security policy.
Abstract: A network node may include one or more processors. The one or more processors may receive a message that is associated with one or more signatures and one or more second signatures. The one or more signatures may have been validated by a particular node. The one or more processors may determine that the particular node is a trusted node. The network node may be configured not to validate signatures that have been validated by a trusted node. The one or more processors may determine that the one or more signatures have been validated by the particular node. The one or more processors may sign or provide the message, without validating the one or more signatures, based on determining that the one or more signatures have been validated by the particular node.
Abstract: A device receives network information associated with a network and server information associated with one or more server devices, wherein the network is associated with a network device and the one or more server devices. The device generates, based on the network information and the server information, an encapsulation profile for a tunnel encapsulation path and a route profile for the tunnel encapsulation path. The device provides, to the network device, the encapsulation profile for the tunnel encapsulation path and the route profile for the tunnel encapsulation path, and provides, to the one or more server devices, the encapsulation profile for the tunnel encapsulation path. The tunnel encapsulation path is provided between the network device and the one or more server devices, via the network, based on the encapsulation profile for the tunnel encapsulation path and the route profile for the tunnel encapsulation path.
Type:
Grant
Filed:
September 27, 2018
Date of Patent:
May 5, 2020
Assignee:
Juniper Networks, Inc.
Inventors:
Sunanda Kommula, Alex Baban, Dmitry A. Shokarev, Jamsheed Wania, Kurt J. Windisch, Nandan Paramashiva, Sri Karthik Goud Gadela
Abstract: The disclosed computer-implemented method may include (1) generating a replacement application program interface (API) to be implemented during execution of an application in lieu of at least one instance of a target API of the application, (2) extracting, from a call stack of the application, a return address of the instance of the target API, (3) detecting, during execution of the application, a call to the target API that pushes the return address of the instance of the target API onto the call stack of the application, and then in response to detecting the call (4) implementing the replacement API in lieu of the target API. Various other apparatuses, systems, and methods are also disclosed.
Abstract: The disclosed apparatus may include (1) an FRU that (A) is designed to mate with a backplane of a telecommunications system and (B) facilitates communication among computing devices within a network and (2) at least one multi-bar ejector that (A) is coupled to the FRU, (B) fastens to a housing of the telecommunications system to enable the FRU to mate with the backplane of the telecommunications system, and (C) includes a spring coupled to at least one bar of the multi-bar ejector that, when the multi-bar ejector is fastened to the housing of the telecommunications system, applies a force on the FRU that pushes the FRU toward the backplane of the telecommunications system. Various other apparatuses, systems, and methods are also disclosed.
Type:
Grant
Filed:
August 31, 2018
Date of Patent:
May 5, 2020
Assignee:
Juniper Networks, Inc.
Inventors:
Jimmy Chun-Chuen Leung, Franklin D. Boyden
Abstract: A device may include one or more processors to establish a media access control security (MACsec) key agreement (MKA) session between a first network device and a second network device via a MACsec link; establish a fast heartbeat session via the MACsec communication link, between a first packet processing engine of the first network device and a second packet processing engine of the second network device, to permit the first packet processing engine and the second packet processing engine to exchange fast heartbeat messages via the fast heartbeat session and the MACsec communication link; determine, based on the fast heartbeat session, that the MKA session has ended; and/or perform an action based on the MKA session ending.
Abstract: A network device is configured to receive information regarding a group of content streams and determine a buffer size for each of the content streams. The network device is further configured to receive the content streams from one or more encoding devices. The network device is further configured to buffer an amount of each of the content streams based on the respective buffer size. The network device is further configured to send a first content stream to a user device. The network device is further configured to determine that the first content stream has a quality of experience issue and send the second content stream to the user device.
Abstract: The disclosed computer-implemented method may include (1) identifying a plurality of network paths within a network, (2) identifying a plurality of network services offered via the network, (3) creating a virtual path topology that represents a select grouping of the network paths that (A) originate from a single ingress node within the network and (B) lead to a plurality of egress nodes within the network, (4) mapping at least one of the network services to the virtual path topology, and (5) providing the at least one of the network services to at least one computing device via at least one of the network paths included in the select grouping represented by the virtual path topology. Various other methods, systems, and computer-readable media are also disclosed.
Abstract: A device may receive information associated with a service chain to be implemented in association with a flow. The information associated with the service chain may include a source network address associated with the flow, a destination network address associated with the flow, a set of protocols associated with the flow, and a set of network services, of the service chain, to be implemented in association with the flow. The device may implement the service chain in association with the flow. The device may receive network traffic information associated with the flow based on implementing the service chain in association with the flow. The device may modify the service chain based on the network traffic information associated with the flow to permit a modified service chain to be implemented in association with the flow.
Abstract: Techniques are described for facilitating the inclusion of a non-flexible-algorithm router to be included in flexible-algorithm path computations. For example, a flexible-algorithm router advertises information associated with a non-flexible-algorithm router to other flexible-algorithm routers in the network such that the flexible-algorithm routers may include the non-flexible-algorithm router when computing a path based on flexible-algorithm. During path computation, if the router determines that its next-hop router is the non-flexible-algorithm router, the router may configure additional forwarding information to cause the router to steer traffic to the non-flexible-algorithm router.
Type:
Grant
Filed:
December 18, 2018
Date of Patent:
April 28, 2020
Assignee:
Juniper Networks, Inc.
Inventors:
William Britto Arimboor Joseph, Shraddha Hegde
Abstract: In one embodiment, a processor-readable medium storing code representing instructions that when executed by a processor cause the processor to update, at a memory location, a first flow state value associated with a data flow to a second flow state value when at least one of a packet from the data flow is received or the memory location is selected after a time period has expired. At least a portion of the packet is analyzed when the second flow state value represents a flow rate of a network data flow anomaly.
Abstract: In general, techniques are described for reporting dynamic tunnels to a path computation element (PCE) of a network to inform path computation by the PCE for traffic engineering within the network. In some examples, a method comprises generating, by a network device configured to route network packets within a network, a dynamic tunnel report message that includes dynamic tunnel description data for a dynamic tunnel that transports the network packets through the network, wherein the network packets transported by the dynamic tunnel each comprises an outer header that does not include a multiprotocol label switching (MPLS) transport label; and sending, by the network device, the dynamic tunnel report message to a path computation element (PCE) for a path computation domain to report the dynamic tunnel to the PCE for inclusion in path computation by the PCE for label switched paths of the network.
Abstract: In one embodiment, a method includes receiving a first identifier and a private key after a network device has been included in a data center switch fabric control plane, authenticating the network device based on the private key, sending a second identifier to the network device, and sending a control signal to the network device based on the second identifier. The first identifier is associated with the network device and unique within a segment of the data center switch fabric control plane. The second identifier is unique within the segment of the data center switch fabric control plane.
Abstract: An apparatus includes an aggregation module that is associated with a first network core and that is operatively coupled to a second network core and a third network core. The aggregation module is configured to receive a first copy of an access point license that authorizes access to a network via an access point and the second network core. The aggregation module receives the first copy of the access point license from the second network core in response to an installation and validation of the access point license on the second network core. The aggregation module is configured to send a second copy of the access point license to the third network core that authorizes a device to access the network via the access point and via the third network core in accordance with the access point license and in response to a failure of the second network core.
Abstract: For use in an Ethernet Virtual Private Network (EVPN) in which a site including at least one MAC-addressable device is multihomed, via a customer edge device (CE), to at least two provider edge devices (PE1 and PE2), the potential problem of one of the at least two provider edge devices (PE2) dropping or flooding packets designed for a MAC-addressable device of the multihomed site is solved by controlling advertisements of an auto-discovery per EVPN instance (A-D/EVI) route (or an auto-discovery per Ethernet segment identifier (A-D/ESI) route) to a remote provider edge device (PE3), belonging to the EVPN but not directly connected with the CE.