Patents by Inventor Xiaochu Chen
Xiaochu Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10771475Abstract: Techniques for exchanging control and configuration information in a network visibility system are provided. In one embodiment, a control plane component of the network visibility system can receive one or more first messages from a data plane component of the network visibility system, where the one or more first messages define one or more forwarding resources available on the data plane component. The control plane component can further retrieve configuration information stored on the control plane component that comprises one or more network prefixes to be monitored by the network visibility system, and can determine one or more mappings between the network prefixes and the forwarding resources. Upon determining the one or more mappings, the control plane component can generate one or more packet forwarding rules based on the mappings.Type: GrantFiled: September 9, 2015Date of Patent: September 8, 2020Assignee: Extreme Networks, Inc.Inventors: Xiaochu Chen, Arvindsrinivasan Lakshmi Narasimhan, Shailender Sharma, Ivy Pei-Shan Hsu, Sanjeev Chhabria, Rakesh Varimalla
-
Patent number: 10728176Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.Type: GrantFiled: August 31, 2018Date of Patent: July 28, 2020Assignee: Extreme Networks, Inc.Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Chhabria
-
Publication number: 20190116133Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.Type: ApplicationFiled: August 31, 2018Publication date: April 18, 2019Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Chhabria
-
Patent number: 10069764Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.Type: GrantFiled: February 6, 2017Date of Patent: September 4, 2018Assignee: Extreme Networks, Inc.Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Chhabria
-
Publication number: 20170187649Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.Type: ApplicationFiled: February 6, 2017Publication date: June 29, 2017Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Nand Chhabria
-
Patent number: 9648542Abstract: A GTP correlation cluster (GCC) can automatically program a network element to forward copies of packets originating from a mobile device and having a shared attribute to the same analytic server, regardless of the regions into which the mobile device moves. The GCC can monitor attributes of copies of control packets that the network element receives. In response to detecting a changed attribute within a control packet originating from a mobile device, the GCC can update a session map specific to that mobile device in order to cause packets having that changed attribute to be forwarded to the same port to which packets having the former attribute were being forwarded prior to the change. As a result, the network element can ensure that packets belonging to a particular session still are forwarded to the same analytic server even if the mobile device has moved to a different region.Type: GrantFiled: January 22, 2015Date of Patent: May 9, 2017Assignee: Brocade Communications Systems, Inc.Inventors: Ivy Pei-Shan Hsu, Sanjeev Nand Chhabria, Xiaochu Chen, Sanjay Munshi, Arvindsrinivasan Lakshmi Narasimhan
-
Patent number: 9565138Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.Type: GrantFiled: June 30, 2014Date of Patent: February 7, 2017Assignee: Brocade Communications Systems, Inc.Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Chhabria
-
Publication number: 20160285735Abstract: Techniques for efficiently programming forwarding rules in a network system are provided. In one embodiment, a control plane component of the network system can determine a packet forwarding rule to be programmed into a forwarding table of a service instance residing on a data plane component of the network system. The control plane component can then generate a message comprising the packet forwarding rule and a forwarding table index and transmit the message to a given service instance of the data plane component. Upon receiving the message, the data plane component can directly forward the message to the service instance. The packet forwarding rule can then be programmed into a forwarding table of the service instance, at the specified forwarding table index, without involving the management processor of the data plane component.Type: ApplicationFiled: September 9, 2015Publication date: September 29, 2016Inventors: Xiaochu Chen, Arvindsrinivasan Lakshmi Narasimhan, Latha Laxman, Shailender Sharma, Ivy Pei-Shan Hsu, Sanjeev Chhabria, Rakesh Varimalla
-
Publication number: 20160285762Abstract: Techniques for exchanging control and configuration information in a network visibility system are provided. In one embodiment, a control plane component of the network visibility system can receive one or more first messages from a data plane component of the network visibility system, where the one or more first messages define one or more forwarding resources available on the data plane component. The control plane component can further retrieve configuration information stored on the control plane component that comprises one or more network prefixes to be monitored by the network visibility system, and can determine one or more mappings between the network prefixes and the forwarding resources. Upon determining the one or more mappings, the control plane component can generate one or more packet forwarding rules based on the mappings.Type: ApplicationFiled: September 9, 2015Publication date: September 29, 2016Inventors: Xiaochu Chen, Arvindsrinivasan Lakshmi Narasimhan, Shailender Sharma, Ivy Pei-Shan Hsu, Sanjeev Chhabria, Rakesh Varimalla
-
Publication number: 20150215841Abstract: A GTP correlation cluster (GCC) can automatically program a network element to forward copies of packets originating from a mobile device and having a shared attribute to the same analytic server, regardless of the regions into which the mobile device moves. The GCC can monitor attributes of copies of control packets that the network element receives. In response to detecting a changed attribute within a control packet originating from a mobile device, the GCC can update a session map specific to that mobile device in order to cause packets having that changed attribute to be forwarded to the same port to which packets having the former attribute were being forwarded prior to the change. As a result, the network element can ensure that packets belonging to a particular session still are forwarded to the same analytic server even if the mobile device has moved to a different region.Type: ApplicationFiled: January 22, 2015Publication date: July 30, 2015Inventors: Ivy Pei-Shan Hsu, Sanjeev Nand Chhabria, Xiaochu Chen, Sanjay Munshi, Arvindsrinivasan Lakshmi Narasimhan
-
Publication number: 20150180802Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.Type: ApplicationFiled: June 30, 2014Publication date: June 25, 2015Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Chhabria