Patents by Inventor Randall Frei

Randall Frei has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240137264
    Abstract: A network management system (NMS) is described that provides a granular troubleshooting workflow at an application session level using an application session-specific topology from a client device to a cloud-based application server. During an application session of a cloud-based application, a client device running the application exchanges data through one or more access point (AP) devices, one or more switches at a wired network edge, and one or more network nodes, e.g., switches, routers, and/or gateway devices, to reach a cloud-based application server. For a particular application session, the NMS generates a topology based on network data received from a subset of network devices, e.g., client devices, AP devices, switches, routers, and/or gateways, that were involved in the particular application session over a duration of the particular application session. In this way, the NMS enables backward-looking troubleshooting of the particular application session.
    Type: Application
    Filed: December 29, 2023
    Publication date: April 25, 2024
    Inventors: Jisheng Wang, Xiaoying Wu, Yedunandan Siddalingappa-Vitalapur, Abhiram Madhugiri Shamsundar, Robert J. Friday, Sudheer Matta, Sunalini Sankhavaram, Kush Shah, Randall Frei, Sujai Hajela, Jacob Thomas
  • Patent number: 11968075
    Abstract: A network management system (NMS) is described that provides a granular troubleshooting workflow at an application session level using an application session-specific topology from a client device to a cloud-based application server. During an application session of a cloud-based application, a client device running the application exchanges data through one or more access point (AP) devices, one or more switches at a wired network edge, and one or more network nodes, e.g., switches, routers, and/or gateway devices, to reach a cloud-based application server. For a particular application session, the NMS generates a topology based on network data received from a subset of network devices, e.g., client devices, AP devices, switches, routers, and/or gateways, that were involved in the particular application session over a duration of the particular application session. In this way, the NMS enables backward-looking troubleshooting of the particular application session.
    Type: Grant
    Filed: September 27, 2022
    Date of Patent: April 23, 2024
    Assignee: Juniper Networks, Inc.
    Inventors: Jisheng Wang, Xiaoying Wu, Yedunandan Siddalingappa-Vitalapur, Abhiram Madhugiri Shamsundar, Robert J. Friday, Sudheer Matta, Sunalini Sankhavaram, Kush Shah, Randall Frei, Sujai Hajela, Jacob Thomas
  • Publication number: 20240073117
    Abstract: Systems, devices and techniques for an adaptive application-specific probing scheme are disclosed. An example network device includes memory configured to store a network address and probe protocol usable for probing a first network device associated with a source of an application, and one or more processors configured to determine a network address and probe protocol usable for probing the first network device, wherein the first network device comprises a server that is responsive to the probing, the server executing the application for the data flow, or a closest network device, to the server, that is responsive to the probing. The one or more processors are also configured to send to a second network device at a location serviced by the application, a message specifying the network address and probe protocol usable for probing the first network device.
    Type: Application
    Filed: November 3, 2023
    Publication date: February 29, 2024
    Inventors: Jisheng Wang, Charl Matthee, Randall Frei, Jie C. Jiang
  • Publication number: 20230403194
    Abstract: The disclosed embodiments provide for rules-based deployment of software installations. In some aspects, operational parameters for a computer system are monitored over time to generate a historical database of values for the operational parameters. The computer system may include multiple instances of a software installation. A portion of the multiple instances is updated with a new version of software. The operational parameters are then monitored to quantify whether the new version results in an improvement or degradation of performance of the computer system. The improvement or degradation is based on comparing values of the operational parameters after deployment to their historical values. Depending on the evaluation of the operational parameters after the installation, the installation may be rolled back if a degradation is indicated. Otherwise, the new software version may be propagated to additional installation instances.
    Type: Application
    Filed: August 24, 2023
    Publication date: December 14, 2023
    Inventors: Osman Sarood, Randall Frei, Robert J. Friday, Keh-Ming Luoh
  • Patent number: 11811638
    Abstract: Systems, devices and techniques for an adaptive application-specific probing scheme are disclosed. An example network device includes memory configured to store a network address and probe protocol usable for probing a first network device associated with a source of an application, and one or more processors configured to determine a network address and probe protocol usable for probing the first network device, wherein the first network device comprises a server that is responsive to the probing, the server executing the application for the data flow, or a closest network device, to the server, that is responsive to the probing. The one or more processors are also configured to send to a second network device at a location serviced by the application, a message specifying the network address and probe protocol usable for probing the first network device.
    Type: Grant
    Filed: July 15, 2021
    Date of Patent: November 7, 2023
    Assignee: Juniper Networks, Inc.
    Inventors: Jisheng Wang, Charl Matthee, Randall Frei, Jie C. Jiang
  • Patent number: 11777802
    Abstract: The disclosed embodiments provide for rules-based deployment of software installations. In some aspects, operational parameters for a computer system are monitored over time to generate a historical database of values for the operational parameters. The computer system may include multiple instances of a software installation. A portion of the multiple instances is updated with a new version of software. The operational parameters are then monitored to quantify whether the new version results in an improvement or degradation of performance of the computer system. The improvement or degradation is based on comparing values of the operational parameters after deployment to their historical values. Depending on the evaluation of the operational parameters after the installation, the installation may be rolled back if a degradation is indicated. Otherwise, the new software version may be propagated to additional installation instances.
    Type: Grant
    Filed: December 3, 2021
    Date of Patent: October 3, 2023
    Assignee: Juniper Networks, Inc.
    Inventors: Osman Sarood, Randall Frei, Robert J. Friday, Keh-Ming Luoh
  • Publication number: 20230308374
    Abstract: A method includes receiving, by a network management system, network data from a plurality of network devices configured to provide a network at a site; receiving, by the processing circuitry, user impact data from a plurality of client devices that access the network at the site; determining, based on the network data, a pattern of one or more network events occurring over time; correlating in time the pattern of the one or more network events to an adverse user impact event indicated by the user impact data received from the plurality of client devices; and determining, in response to the correlating, an instance of overwhelming network traffic having an adverse user impact. In some examples, the network data includes network traffic impact data, such as a number of packets dropped at a switch port due to congestion.
    Type: Application
    Filed: July 14, 2022
    Publication date: September 28, 2023
    Inventors: Jisheng Wang, Jing Cheng, Abhiram Madhugiri Shamsundar, Randall Frei
  • Publication number: 20230275820
    Abstract: A network management system (NMS) initiates, for each of a plurality of wireless and/or wired client devices, a wireless/wired stateful machine configured to continuously monitor at least one pre-connection state and at least one post-connection state of a corresponding wireless/wired connection session, and determines one or more network connection assessments for the plurality of wireless/wired client devices based on success or failure of the pre-connection states and/or the post-connection states. The NMS may also output a notification including identification of a root cause of any network connection failure(s) and/or automatically invoke remedial action intended to address or mitigate the root cause of the network connection failure(s).
    Type: Application
    Filed: February 28, 2022
    Publication date: August 31, 2023
    Inventors: Wenfeng Wang, Randall Frei, Jacob Thomas, Kush Shah, Jisheng Wang, Abhiram Madhugiri Shamsundar, Robert J. Friday, Wesley Purvis
  • Publication number: 20230231762
    Abstract: A network management system (NMS) is described that provides a granular troubleshooting workflow at an application session level using an application session-specific topology from a client device to a cloud-based application server. During an application session of a cloud-based application, a client device running the application exchanges data through one or more access point (AP) devices, one or more switches at a wired network edge, and one or more network nodes, e.g., switches, routers, and/or gateway devices, to reach a cloud-based application server. For a particular application session, the NMS generates a topology based on network data received from a subset of network devices, e.g., client devices, AP devices, switches, routers, and/or gateways, that were involved in the particular application session over a duration of the particular application session. In this way, the NMS enables backward-looking troubleshooting of the particular application session.
    Type: Application
    Filed: September 27, 2022
    Publication date: July 20, 2023
    Inventors: Jisheng Wang, Xiaoying Wu, Yedunandan Siddalingappa-Vitalapur, Abhiram Madhugiri Shamsundar, Robert J. Friday, Sudheer Matta, Sunalini Sankhavaram, Kush Shah, Randall Frei, Sujai Hajela, Jacob Thomas
  • Publication number: 20230119490
    Abstract: Methods and apparatus relating to the detection of one or more devices in zones, e.g., non-overlapping areas, are described. Individual device locations are made based on RSSI information. Whether a user is determined to be in a zone or not is determined based on location determinations corresponding to the device. Thresholds used to determine whether a device is to be considered as being within a zone differs depending on whether the device is newly detected in the zone or is already determined to be in the zone. In some embodiments it is easier to be determined to be in a zone than to be determined to have left a zone. A device may be determined to be in two non-overlapping zones at the same time thereby increasing the chance that devices in edge areas will be counted with regard to the number of devices for which resources should be provided.
    Type: Application
    Filed: December 16, 2022
    Publication date: April 20, 2023
    Inventors: Cuong Ta, Randall Frei
  • Publication number: 20230095476
    Abstract: Methods and apparatus relating to use of actual and/or virtual beacons are described. Virtual beacons are virtual in that an actual beacon need not be transmitted but a rather a virtual beacon transmitter at a desired location maybe considered to transmit virtual beacons. In some embodiments a set of beacon transmitter information for one or more beacons is supplied to devices in a communications system. The beacon transmitter information indicates transmission power and location of actual and virtual beacon transmitters as well as information to be communicated by virtual beacons. Devices with access to beacon information can determine based on the location of a wireless terminal whether the wireless terminal is within coverage area of a virtual beacon and report reception of the virtual beacon to the wireless terminal or a component of the wireless terminal which acts upon receiving an indication of beacon reception.
    Type: Application
    Filed: December 1, 2022
    Publication date: March 30, 2023
    Inventors: Robert J. Friday, Neal Dante Castagnoli, Randall Frei
  • Publication number: 20230047635
    Abstract: Techniques are described by which a network management system (NMS) is configured to generate and monitor an RSSI-based proximity zone for a wireless network using a user interface (UI). The NMS may generate a UI comprising UI elements representing access point (AP) devices configured to provide a wireless network at a site; receive, at the user interface, an indication of a user input selecting one or more UI elements representing selected AP devices; establish a proximity zone for each of the selected AP devices based on an RSSI threshold value; receive network data comprising proximity information of a client device relative to the selected AP devices; generate, based on proximity assessments using the proximity information and the RSSI threshold value of the proximity zone, one or more proximity events indicating the client device relation to the proximity zone; and invoke, based on the proximity events, one or more actions.
    Type: Application
    Filed: December 17, 2021
    Publication date: February 16, 2023
    Inventors: Kevin Friday, Randall Frei, Nagarjun Srinivasan, Sunalini Sankhavaram
  • Patent number: 11564147
    Abstract: Methods and apparatus relating to use of actual and/or virtual beacons are described. Virtual beacons are virtual in that an actual beacon need not be transmitted but a rather a virtual beacon transmitter at a desired location maybe considered to transmit virtual beacons. In some embodiments a set of beacon transmitter information for one or more beacons is supplied to devices in a communications system. The beacon transmitter information indicates transmission power and location of actual and virtual beacon transmitters as well as information to be communicated by virtual beacons. Devices with access to beacon information can determine based on the location of a wireless terminal whether the wireless terminal is within coverage area of a virtual beacon and report reception of the virtual beacon to the wireless terminal or a component of the wireless terminal which acts upon receiving an indication of beacon reception.
    Type: Grant
    Filed: July 23, 2021
    Date of Patent: January 24, 2023
    Assignee: Juniper Networks, Inc.
    Inventors: Robert J. Friday, Neal Dante Castagnoli, Randall Frei
  • Publication number: 20230012609
    Abstract: Systems, devices and techniques for an adaptive application-specific probing scheme are disclosed. An example network device includes memory configured to store a network address and probe protocol usable for probing a first network device associated with a source of an application, and one or more processors configured to determine a network address and probe protocol usable for probing the first network device, wherein the first network device comprises a server that is responsive to the probing, the server executing the application for the data flow, or a closest network device, to the server, that is responsive to the probing. The one or more processors are also configured to send to a second network device at a location serviced by the application, a message specifying the network address and probe protocol usable for probing the first network device.
    Type: Application
    Filed: July 15, 2021
    Publication date: January 19, 2023
    Inventors: Jisheng Wang, Charl Matthee, Randall Frei, Jie C. Jiang
  • Publication number: 20220279361
    Abstract: Methods and apparatus for using beacon signals are described. One or more sectorized base stations are used in some embodiments to transmit beacon signals into zones, e.g., each zone being at least partially covered by one or more beacon signals. Use of sectorized base stations allows a single base station, e.g., a Bluetooth or other base station capable of transmitting beacon signals, to cover a number of different zones avoiding the need for multiple different beacon transmitters at different locations to establish different beacon coverage areas. Sectorization of a Bluetooth base station and the ability to remotely or locally configure the base station allows for great flexibility to use beacon signals in stores or other locations without the need for numerous individual battery powered beacon transmitters at floor or display level.
    Type: Application
    Filed: May 19, 2022
    Publication date: September 1, 2022
    Inventors: Robert J. Friday, Neal Dante Castagnoli, Randall Frei
  • Publication number: 20220094592
    Abstract: The disclosed embodiments provide for rules-based deployment of software installations. In some aspects, operational parameters for a computer system are monitored over time to generate a historical database of values for the operational parameters. The computer system may include multiple instances of a software installation. A portion of the multiple instances is updated with a new version of software. The operational parameters are then monitored to quantify whether the new version results in an improvement or degradation of performance of the computer system. The improvement or degradation is based on comparing values of the operational parameters after deployment to their historical values. Depending on the evaluation of the operational parameters after the installation, the installation may be rolled back if a degradation is indicated. Otherwise, the new software version may be propagated to additional installation instances.
    Type: Application
    Filed: December 3, 2021
    Publication date: March 24, 2022
    Inventors: Osman Sarood, Randall Frei, Robert J. Friday, Keh-Ming Luoh
  • Publication number: 20210352563
    Abstract: Methods and apparatus relating to use of actual and/or virtual beacons are described. Virtual beacons are virtual in that an actual beacon need not be transmitted but a rather a virtual beacon transmitter at a desired location maybe considered to transmit virtual beacons. In some embodiments a set of beacon transmitter information for one or more beacons is supplied to devices in a communications system. The beacon transmitter information indicates transmission power and location of actual and virtual beacon transmitters as well as information to be communicated by virtual beacons. Devices with access to beacon information can determine based on the location of a wireless terminal whether the wireless terminal is within coverage area of a virtual beacon and report reception of the virtual beacon to the wireless terminal or a component of the wireless terminal which acts upon receiving an indication of beacon reception.
    Type: Application
    Filed: July 23, 2021
    Publication date: November 11, 2021
    Inventors: Robert J. Friday, Neal Dante Castagnoli, Randall Frei
  • Publication number: 20210297858
    Abstract: Methods and apparatus for controlling access to and/or forwarding of communicated information, e.g. traffic, in a wireless communication system are described. The key, e.g., PSK, used to secure data that is transmitted to an access point for communication to a destination device is taken into consideration when deciding whether or not to provide the destination device access to the communicated content. The decision of whether or not to provide the destination device access to a communication may involve deciding whether or not to forward the received data to another device, e.g., another access point, for delivery to the destination device and/or may involve deciding whether or not to transmit the data to the destination device. If the destination device is not associated with, e.g., does not have access to and/or authorization to use, the key used to secure the received data, the data is not communicated to the destination device.
    Type: Application
    Filed: May 27, 2021
    Publication date: September 23, 2021
    Inventors: Randall Frei, Sujai Hajela, Guy Goldstone, Nicolas Dade, Linker Cheng
  • Patent number: 11051169
    Abstract: Methods and apparatus for controlling access to and/or forwarding of communicated information, e.g. traffic, in a wireless communication system are described. The key, e.g., PSK, used to secure data that is transmitted to an access point for communication to a destination device is taken into consideration when deciding whether or not to provide the destination device access to the communicated content. The decision of whether or not to provide the destination device access to a communication may involve deciding whether or not to forward the received data to another device, e.g., another access point, for delivery to the destination device and/or may involve deciding whether or not to transmit the data to the destination device. If the destination device is not associated with, e.g., does not have access to and/or authorization to use, the key used to secure the received data, the data is not communicated to the destination device.
    Type: Grant
    Filed: August 16, 2017
    Date of Patent: June 29, 2021
    Assignee: Juniper Networks, Inc.
    Inventors: Randall Frei, Sujai Hajela, Guy Goldstone, Nicolas Dade, Linker Cheng
  • Publication number: 20190058996
    Abstract: Methods and apparatus for controlling access to and/or forwarding of communicated information, e.g. traffic, in a wireless communication system are described. The key, e.g., PSK, used to secure data that is transmitted to an access point for communication to a destination device is taken into consideration when deciding whether or not to provide the destination device access to the communicated content. The decision of whether or not to provide the destination device access to a communication may involve deciding whether or not to forward the received data to another device, e.g., another access point, for delivery to the destination device and/or may involve deciding whether or not to transmit the data to the destination device. If the destination device is not associated with, e.g., does not have access to and/or authorization to use, the key used to secure the received data, the data is not communicated to the destination device.
    Type: Application
    Filed: August 16, 2017
    Publication date: February 21, 2019
    Inventors: Randall Frei, Sujai Hajela, Guy Goldstone, Nicolas Dade, Linker Cheng