Patents by Inventor Mark Veteikis

Mark Veteikis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8913507
    Abstract: A method for enabling virtual data loopback in a computing system may include forwarding a data packet from a first device to a second device; the second device identifying from the data packet egress interface information indicating a first interface for forwarding the data packet out of the computing system; based on the first interface identified from the egress interface information, automatically determining a second interface to the first interface; inserting into the data packet ingress interface information that indicates the second interface; forwarding the data packet, including the ingress interface information, back to the first device; and the first device identifying the ingress interface information indicating the second interface; such that the data packet is looped back to the first device without being communicated via the first or second interface, and such that from the perspective of the first device the data packet was received via the second interface.
    Type: Grant
    Filed: June 21, 2012
    Date of Patent: December 16, 2014
    Assignee: Breakingpoint Systems, Inc.
    Inventors: Mark Veteikis, Dennis James Cox, Michael Moriarty
  • Patent number: 8891392
    Abstract: An automated method for analyzing a plurality of network messages received by a network testing device is disclosed. The method may comprise, during a current window of time, receiving from a target network device a network message associated with an original network message determining a latency value for the received network message comparing the determined latency value with the threshold latency value; and incrementing either the first counter or the second counter based on the comparison of the determined latency value with a threshold latency value. The method may further comprise, at the end of the current window of time, storing the first and second counter values resulting from the analysis of the plurality of original network messages.
    Type: Grant
    Filed: June 21, 2012
    Date of Patent: November 18, 2014
    Assignee: Breakingpoint Systems, Inc.
    Inventors: Brent Aaron Cook, Ryan Clifton, Kristopher Len Raney, Mark Veteikis, Michael Moriarty
  • Patent number: 8891528
    Abstract: A method for managing the capture of packets in a computing system comprises maintaining a buffer tail pointer in a memory of an instruction executing device, receiving a series of packets at an instruction executing device, for each received packet prepending a header comprising a packet length and a packet pointer set to a current value of the buffer tail pointer, determining a next free memory location by adding the current value of the buffer tail pointer to the length of a previous packet identified by the buffer tail pointer, temporarily writing the packet and prepend header to the next free memory location in a circular packet buffer in a memory coupled to the instruction executing device, and setting the buffer tail pointer to the next free memory location.
    Type: Grant
    Filed: June 21, 2012
    Date of Patent: November 18, 2014
    Assignee: Breakingpoint Systems, Inc.
    Inventors: Michael Moriarty, Mark Veteikis, Jonathan Stroud
  • Publication number: 20130343207
    Abstract: An automated method for analyzing a plurality of network messages received by a network testing device is disclosed. The method may comprise, during a current window of time, receiving from a target network device a network message associated with an original network message determining a latency value for the received network message comparing the determined latency value with the threshold latency value; and incrementing either the first counter or the second counter based on the comparison of the determined latency value with a threshold latency value. The method may further comprise, at the end of the current window of time, storing the first and second counter values resulting from the analysis of the plurality of original network messages.
    Type: Application
    Filed: June 21, 2012
    Publication date: December 26, 2013
    Inventors: Brent Aaron Cook, Ryan Clifton, Kristopher Len Raney, Mark Veteikis, Michael Moriarty
  • Publication number: 20130343379
    Abstract: A method of communicating between devices within a card in a computing system comprises sending a command network packet from a first instruction executing device to a second instruction executing device via an Ethernet network, wherein the command network packet contains an instruction to be executed on the second instruction executing device, and receiving a responsive network packet sent from the second instruction executing device to the first instruction executing device via the Ethernet network, wherein the responsive network packet indicates a result of the instruction.
    Type: Application
    Filed: June 21, 2012
    Publication date: December 26, 2013
    Inventors: Jonathan Stroud, Mark Veteikis, Brent Aaron Cook
  • Publication number: 20130343378
    Abstract: A method for enabling virtual data loopback in a computing system may include forwarding a data packet from a first device to a second device; the second device identifying from the data packet egress interface information indicating a first interface for forwarding the data packet out of the computing system; based on the first interface identified from the egress interface information, automatically determining a second interface to the first interface; inserting into the data packet ingress interface information that indicates the second interface; forwarding the data packet, including the ingress interface information, back to the first device; and the first device identifying the ingress interface information indicating the second interface; such that the data packet is looped back to the first device without being communicated via the first or second interface, and such that from the perspective of the first device the data packet was received via the second interface.
    Type: Application
    Filed: June 21, 2012
    Publication date: December 26, 2013
    Inventors: Mark Veteikis, Dennis James Cox, Michael Moriarty
  • Publication number: 20130347103
    Abstract: A method of tracking network traffic anomalies in a computing system, comprises receiving an ingress network packet at a configurable logic device (CLD), associating a timestamp with the packet, identifying at least one anomaly based on the contents of the packet, and storing the anomalous packet and the timestamp in a persistent memory.
    Type: Application
    Filed: June 21, 2012
    Publication date: December 26, 2013
    Inventors: Mark Veteikis, Michael Moriarty
  • Publication number: 20130343390
    Abstract: A method for managing the capture of packets in a computing system comprises maintaining a buffer tail pointer in a memory of an instruction executing device, receiving a series of packets at an instruction executing device, for each received packet prepending a header comprising a packet length and a packet pointer set to a current value of the buffer tail pointer, determining a next free memory location by adding the current value of the buffer tail pointer to the length of a previous packet identified by the buffer tail pointer, temporarily writing the packet and prepend header to the next free memory location in a circular packet buffer in a memory coupled to the instruction executing device, and setting the buffer tail pointer to the next free memory location
    Type: Application
    Filed: June 21, 2012
    Publication date: December 26, 2013
    Inventors: Michael Moriarty, Mark Veteikis, Jonathan Stroud