Patents by Inventor Yeeping Zhong

Yeeping Zhong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7646773
    Abstract: A layer-2 network switch device forwarding database implementation and method to access the forwarding database. A forwarding database (FDB) is implemented as a tree. A separate VLAN database is also structured as a tree. Each node in the tree represents a separate VLAN. For each VLAN, all associated ports are maintained in a data structure organized as a tree. Likewise, all port information is maintained in a tree-based data structure, and for each port, all VLAN information associated with the port is maintained in a tree data structure. Each node in a VLAN's port tree data structure is linked with each corresponding node in the port's VLAN tree data structure. Each pair of nodes maintains a linked list of all FDB entries relating to the node pair. Operations are quickly and efficiently performed on the FDB using the data structure architecture.
    Type: Grant
    Filed: August 2, 2004
    Date of Patent: January 12, 2010
    Assignee: Extreme Networks
    Inventors: Jing Na, Michael Yip, Yeeping Zhong
  • Patent number: 7389505
    Abstract: A computing system receives a compressed archive file that includes a one or more new executable software modules, and a installation file specifying instructions for installing such modules on the computing system. The modules and the installation file are extracted from the compressed archive file, and the modules installed in accordance with the instructions. Instances of executing software modules that correspond to the installed modules are notified about their impending termination. The instances are then terminated before launching corresponding instances of the installed modules.
    Type: Grant
    Filed: July 30, 2004
    Date of Patent: June 17, 2008
    Assignee: Extreme Networks, Inc.
    Inventors: Anna Berenberg, Michael Yip, Gordon MacKean, James Wanderer, Edward Soloko, Yeeping Zhong
  • Publication number: 20060036723
    Abstract: A method is provided to convert network management protocol request into a markup language representation. In one embodiment, the present invention includes receiving a network management protocol request at a network device, generating a plurality of markup language tags and content embedded in the markup language tags based on the received request, and responding to the request using the plurality of markup language tags and content embedded in the markup language tags using a unified backend interface. In one embodiment, routines used to generate the plurality of markup language tags and content are generated automatically using an instrumentation module.
    Type: Application
    Filed: July 30, 2004
    Publication date: February 16, 2006
    Inventors: Michael Yip, Yeeping Zhong, Qi Cao, Abhay Gidwani
  • Publication number: 20060026590
    Abstract: A computing system receives a compressed archive file that includes a one or more new executable software modules, and a installation file specifying instructions for installing such modules on the computing system. The modules and the installation file are extracted from the compressed archive file, and the modules installed in accordance with the instructions. Instances of executing software modules that correspond to the installed modules are notified about their impending termination. The instances are then terminated before launching corresponding instances of the installed modules.
    Type: Application
    Filed: July 30, 2004
    Publication date: February 2, 2006
    Inventors: Anna Berenberg, Michael Yip, Gordon MacKean, James Wanderer, Edward Soloko, Yeeping Zhong
  • Publication number: 20060023627
    Abstract: A computing environment includes a number of nodes, one of which is a primary node that controls the operation of the computing environment and another of which is a backup node that is capable of controlling operation of the computing environment. The primary node includes a hardware management module (HMM) that controls hardware components in the computing environment. The HMM also detects and reports events relating to the hardware components. The primary node further includes a software management module (SMM) that controls instances of software components of the computing environment, and detects and reports events related to the same. A node management module (NMM) in the primary node elects the node as the primary from among the number of nodes. The NMM receives the reports of events from the HMM and SMM, and selectively transfers operational control of the computing environment to a backup node in response to the reports.
    Type: Application
    Filed: August 2, 2004
    Publication date: February 2, 2006
    Inventors: Anil Villait, Michael Yip, Yeeping Zhong
  • Publication number: 20060023724
    Abstract: A layer-2 network switch device forwarding database implementation and method to access the forwarding database. A forwarding database (FDB) is implemented as a tree. A separate VLAN database is also structured as a tree. Each node in the tree represents a separate VLAN. For each VLAN, all associated ports are maintained in a data structure organized as a tree. Likewise, all port information is maintained in a tree-based data structure, and for each port, all VLAN information associated with the port is maintained in a tree data structure. Each node in a VLAN's port tree data structure is linked with each corresponding node in the port's VLAN tree data structure. Each pair of nodes maintains a linked list of all FDB entries relating to the node pair. Operations are quickly and efficiently performed on the FDB using the data structure architecture.
    Type: Application
    Filed: August 2, 2004
    Publication date: February 2, 2006
    Inventors: Jing Na, Michael Yip, Yeeping Zhong