Patents by Inventor Mark A. Bakke

Mark A. Bakke has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7502840
    Abstract: Systems and methods for assigning node MAC addresses for a plurality of internal and external network interfaces for a network device include determining a base address. The systems and methods assign a unique MAC address to ports using a base address that is unique to the network device. The base address can be either incremented, decremented or selected from a list to produce a unique MAC address for the next node requiring assignment, or it can be concatenated with other unique values to create a unique MAC address.
    Type: Grant
    Filed: November 27, 2002
    Date of Patent: March 10, 2009
    Assignee: Cisco Technology, Inc.
    Inventor: Mark A. Bakke
  • Publication number: 20090049199
    Abstract: A method for creating a virtual MAC address, the method includes receiving an Internet Protocol address that is to be associated with a virtual MAC address. The method creates a virtual MAC address by setting an OUI portion of the virtual MAC address to an OUI value and setting the non-OUI portion of the virtual MAC address to a subset of the Internet Protocol (IP) address. In one embodiment, the lower three bytes of the IP address are used. Additionally, a method of migrating a virtual MAC address includes detecting a migration event on a first system; creating a virtual MAC address on a second system; and issuing a gratuitous ARP packet containing the virtual MAC address.
    Type: Application
    Filed: August 15, 2008
    Publication date: February 19, 2009
    Applicant: Cisco Technology, Inc.
    Inventors: Timothy J. Kuik, Mark A. Bakke
  • Patent number: 7451208
    Abstract: Systems and methods provide network address failover capability within an application gateway device. In one aspect, a system has a first network interface and a second network interface. The system receives a set of configuration data, the configuration data may include a first network address for the first network interface and a second network address for the second network interface. At startup or during later operation, the system may detect the failure of the first network interface. The configuration data may be analyzed to determine if the first network address can be used on the second network interface. If so, the first network address is moved from the first network interface to the second network interface.
    Type: Grant
    Filed: June 28, 2003
    Date of Patent: November 11, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Mark A. Bakke, David P. Thompson
  • Patent number: 7444320
    Abstract: A system includes a configuration module operable to configure a routing device to communicate with one or more network devices. Each of the network devices have device identifiers and other device data. The device data can be maintained in a database. The system also includes a command interpreter for the configuration module. The command interpreter operates to display at least a subset of the device identification data in response to detecting a completion token entered by the user.
    Type: Grant
    Filed: March 26, 2003
    Date of Patent: October 28, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Mark A. Bakke, Eric Thorn, Donald W. Teske
  • Patent number: 7437477
    Abstract: A system and method for accessing Storage Area Networks over an IP network. A SCSI request is generated and encapsulated in one or more IP packets. The encapsulated SCSI request is routed over an IP network and received by a storage router. The storage router extracts the SCSI request from the one or more IP packets and routes the extracted SCSI request through a virtual SCSI router to the storage area network.
    Type: Grant
    Filed: January 11, 2007
    Date of Patent: October 14, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Timothy J. Kuik, David Patrick Thompson, Mark A. Bakke, Clayton Stuart Haapala, Stephen P. De Groote, Craig A. Johnson, James D. Muchow
  • Publication number: 20080244747
    Abstract: A computer system, comprising at least one controlled execution space hosting an operating system and an application program; a vulnerability monitoring agent coupled to the controlled execution space; one or more vulnerability profiles coupled to the vulnerability monitoring agent, wherein each of the vulnerability profiles comprises an application program identifier, an operating system identifier, a vulnerability specification describing a vulnerability of an application program that the application program identifier indicates when executed with an operating system that the operating system identifier indicates, and a remedial action which when executed will remediate the vulnerability; wherein the vulnerability monitoring agent is configured to monitor execution of the operating system and the application program in the controlled execution space, to detect an anomaly associated with the vulnerability, to determine the remedial action for the operating system and application program based on one of the v
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Inventors: Paul Gleichauf, Mark Bakke, Timothy Kuik, David Thompson, Xiaoxue Ma
  • Patent number: 7415535
    Abstract: A method for creating a virtual MAC address, the method includes receiving an Internet Protocol address that is to be associated with a virtual MAC address. The method creates a virtual MAC address by setting an OUI portion of the virtual MAC address to an OUI value and setting the non-OUI portion of the virtual MAC address to a subset of the Internet Protocol (IP) address. In one embodiment, the lower three bytes of the IP address are used. Additionally, a method of migrating a virtual MAC address includes detecting a migration event on a first system; creating a virtual MAC address on a second system; and issuing a gratuitous ARP packet containing the virtual MAC address.
    Type: Grant
    Filed: April 22, 2002
    Date of Patent: August 19, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Timothy J. Kuik, Mark A. Bakke
  • Patent number: 7389382
    Abstract: A technique is described for facilitating block level access operations to be performed at a remote volume via a wide area network (WAN). The block level access operations may be initiated by at least one host which is a member of a local area network (LAN). The LAN includes a block cache mechanism configured or designed to cache block data in accordance with a block level protocol. A block level access request is received from a host on the LAN. In response to the block level access request, a portion of block data may be cached in the block cache mechanism using a block level protocol. In at least one implementation, portions of block data in the block cache mechanism may be identified as “dirty” data which has not yet been stored in the remote volume. Block level write operations may be performed over the WAN to cause the identified dirty data in the block cache mechanism to be stored at the remote volume.
    Type: Grant
    Filed: June 8, 2005
    Date of Patent: June 17, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Dave Thompson, Timothy Kuik, Mark Bakke
  • Patent number: 7389332
    Abstract: A node (101, FIG. 1), within a networked computer system (100), is capable of supporting communications with other nodes relating to operating multiple application instances in a master-slave configuration. The node initiates (602, FIG. 6) and maintains (FIGS. 7, 8) a state diagram (FIG. 2) for each application instance currently running in the master-slave configuration on the node or the other nodes. In addition, the node listens for new application instances that are discovered on the node or on the other nodes. The nodes can be interconnected using multiple networks (104, FIG. 1), and redundant messages received by the node can be ignored (FIG. 11), if those redundant messages would adversely affect maintenance of the state diagram for an application instance. When a node determines that it should no longer operate as a master for an application instance, the node can initiate a resignation process (FIG. 4), during which another node will attempt to become the master for the application instance.
    Type: Grant
    Filed: April 11, 2002
    Date of Patent: June 17, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: James D. Muchow, Mark Bakke
  • Patent number: 7366902
    Abstract: A method and system authenticates a storage device or storage router for use with driver software. The driver software may be permitted to be used with particular storage devices including storage routers and may be prohibited from being used with other storage devices or routers. In some cases, this may allow a vendor to restrict the use of its driver software, or at least certain functionality, to use with the vendor's storage devices or storage routers. A proof of purchase request is sent by a client device to a server over an IP network to authenticate the storage device or router (e.g., a server). The request may include a random number and one or more identifiers. The identifiers may include a server identifier, a software driver identifier and/or a client device identifier. The driver software may permit storage related communications with the server when a hash received from the server matches a hash internally generated by the software driver.
    Type: Grant
    Filed: April 17, 2007
    Date of Patent: April 29, 2008
    Assignee: Cisco Technology, Inc.
    Inventor: Mark A. Bakke
  • Patent number: 7363382
    Abstract: A system and method of maintaining connectivity between a host computer and a target on a storage router. A failover driver is established in a stack of an operating system of the host computer. A first network connection is established between the host computer and the target on the storage router. The failover driver monitors connectivity information associated with the first network connection and, if failure of the first network connection is detected, establishes a second network connection between the host computer and the target on the storage router.
    Type: Grant
    Filed: March 31, 2003
    Date of Patent: April 22, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Mark A. Bakke, Scott M. Ferris, Bradley Scott Johnson, Charles Steven Rissmeyer
  • Patent number: 7353259
    Abstract: A node, within a networked computer system, is capable of supporting communications with other nodes relating to operating multiple application instances in a master-slave configuration. Each node periodically generates and sends a Heartbeat message that indicates the operational status and configuration information for one or more application instances being managed by the node. When a node receives a Heartbeat message from a remote node, it determines whether new configuration information should be obtained for each of the application instances the node is managing, and establishes a connection with a remote node that can access the new configuration information. The connection is an HTTP connection, in one embodiment. The node then requests and receives that new configuration information from the remote node. In one embodiment, the new configuration information is received in an XML format.
    Type: Grant
    Filed: April 22, 2002
    Date of Patent: April 1, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Mark A. Bakke, James D. Muchow, Craig A. Johnson, Donald W. Teske
  • Publication number: 20080059644
    Abstract: A method and system to exchange information between computer applications are provided. The system may include a source operating system, a destination operating system and an offload stack, all residing on the device. The source operating system and the destination operating system appear to users as distinct network entities. The offload stack may be configured to function as an intermediate network device for the source operating system. The offload stack, in one embodiment, comprises a back end to receive a message from the source operating system to the destination operating system, an analyzer to determine that the destination operating system resides on the device and a cut though socket module to process the message such that a network layer of the offload stack is bypassed.
    Type: Application
    Filed: August 31, 2006
    Publication date: March 6, 2008
    Inventors: Mark A. Bakke, David Patrick Thompson, Timothy J. Kuik, Paul Harry Gleichauf
  • Publication number: 20080005289
    Abstract: A computer-implemented system and method for performance profiling on a target device. The computer-implemented method includes configuring the target device to operate in a first mode or a second mode, and receiving a write command from a host device. When the target device is configured to operate in the first mode, the method includes sending an authorization to send write data to the host device, and receiving write data from the host device. When the target device is configured to operate in the second mode, the method includes allocating a reserved write buffer on the target device, and receiving write data from the host device using the write buffer.
    Type: Application
    Filed: September 10, 2007
    Publication date: January 3, 2008
    Inventors: Ayman Ghanem, Mark Bakke
  • Publication number: 20080005436
    Abstract: A computer-implemented system and method for performance profiling on a target device. The computer-implemented method includes configuring the target device to operate in a first mode or a second mode, and receiving a write command from a host device. When the target device is configured to operate in the first mode, the method includes sending an authorization to send write data to the host device, and receiving write data from the host device. When the target device is configured to operate in the second mode, the method includes allocating a reserved write buffer on the target device, and receiving write data from the host device using the write buffer.
    Type: Application
    Filed: September 10, 2007
    Publication date: January 3, 2008
    Inventors: Ayman Ghanem, Mark Bakke
  • Publication number: 20070299960
    Abstract: A computer-implemented system and method for performance profiling on a target device. The computer-implemented method includes configuring the target device to operate in a first mode or a second mode, and receiving a write command from a host device. When the target device is configured to operate in the first mode, the method includes sending an authorization to send write data to the host device, and receiving write data from the host device. When the target device is configured to operate in the second mode, the method includes allocating a reserved write buffer on the target device, and receiving write data from the host device using the write buffer.
    Type: Application
    Filed: June 29, 2007
    Publication date: December 27, 2007
    Inventors: Ayman Ghanem, Mark Bakke
  • Patent number: 7281062
    Abstract: A storage router having an internet protocol (IP) port for coupling to a network supporting IP packets, a fibre channel port for coupling to a fibre channel network to a plurality of storage devices, and a SCSI router having an iSCSI interface that extracts SCSI command and data information from packets received through the IP port, wherein the SCSI router passes the extracted SCSI command and data information to the fiber channel port. Some embodiments further include a session to an information-handling system. The session supports a target-only mapping (wherein a source-specified target value is replaced by a mapped target value that is then passed by the SCSI router toward a first storage device and its LUNs), or target-and-LUN mapping (wherein source-specified target and LUN information is replaced by mapped target-and LUN information such as a loop-ID and LUN combination, a WWPN and LUN combination, or a WWNN).
    Type: Grant
    Filed: April 22, 2002
    Date of Patent: October 9, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: Timothy J. Kuik, David Patrick Thompson, Mark A. Bakke, Clayton Stuart Haapala, Stephen P. De Groote, Craig A. Johnson
  • Patent number: 7269644
    Abstract: A computer-implemented system and method for performance profiling on a target device. The computer-implemented method includes configuring the target device to operate in a first mode or a second mode, and receiving a write command from a host device. When the target device is configured to operate in the first mode, the method includes sending an authorization to send write data to the host device, and receiving write data from the host device. When the target device is configured to operate in the second mode, the method includes allocating a reserved write buffer on the target device, and receiving write data from the host device using the write buffer.
    Type: Grant
    Filed: February 21, 2003
    Date of Patent: September 11, 2007
    Assignee: Cisco Technology Inc.
    Inventors: Ayman Mohammad Ghanem, Mark A. Bakke
  • Publication number: 20070192614
    Abstract: A method and system authenticates a storage device or storage router for use with driver software. The driver software may be permitted to be used with particular storage devices including storage routers and may be prohibited from being used with other storage devices or routers. In some cases, this may allow a vendor to restrict the use of its driver software, or at least certain functionality, to use with the vendor's storage devices or storage routers. A proof of purchase request is sent by a client device to a server over an IP network to authenticate the storage device or router (e.g., a server). The request may include a random number and one or more identifiers. The identifiers may include a server identifier, a software driver identifier and/or a client device identifier. The driver software may permit storage related communications with the server when a hash received from the server matches a hash internally generated by the software driver.
    Type: Application
    Filed: April 17, 2007
    Publication date: August 16, 2007
    Inventor: Mark Bakke
  • Publication number: 20070133434
    Abstract: A method, system, and logic for determining connectivity information for routers running on servers that are attached to a device. A router is resigned in favor of a corresponding router at another server when the corresponding router has better connectivity to the device, where partial connectivity is better than no connectivity, and full connectivity is better than partial connectivity.
    Type: Application
    Filed: February 16, 2007
    Publication date: June 14, 2007
    Inventors: Dennis Hadders, Stephen De Groote, Mark Bakke