EXTREME NETWORKS, INC.
|EXTREME NETWORKS, INC. Patent applications|
|Patent application number||Title||Published|
|20140347980||REDUNDANT ETHERNET AUTOMATIC PROTECTION SWITCHING ACCESS TO VIRTUAL PRIVATE LAN SERVICES - Embodiments disclosed herein provide redundant connectivity between an Ethernet Automatic Protection Switching (EAPS) access network and a Virtual Private LAN Service (VPLS) network. A first VPLS node is provided to function as an EAPS controller node. A second VPLS node is provided to function as an EAPS partner node. The first and second VPLS nodes are linked by a pseudowire and an EAPS shared-link. Additional EAPS nodes are also provided. The additional EAPS nodes are linked to each other and one of the additional EAPS nodes is designated as a master node. Links are also established between the VPLS nodes and the EAPS nodes such that one or more EAPS rings are formed. Each EAPS ring includes the shared-link between the first and second VPLS nodes. The EAPS rings are monitored to detect link failures. When a failure of the pseudowire shared-link between the first and second VPLS nodes is detected, all pseudowire links associated with the first VPLS node are disabled if any of the EAPS nodes has a path to both of the VPLS nodes. Otherwise, the existing pseudowire links associated with the first VPLS node are maintained.||11-27-2014|
|20140341223||METHODS AND SYSTEMS FOR SELECTIVELY PROCESSING VIRTUAL LOCAL AREA NETWORK (VLAN) TRAFFIC FROM DIFFERENT NETWORKS WHILE ALLOWING FLEXIBLE VLAN IDENTIFIER ASSIGNMENT - Methods and systems for selectively processing VLAN traffic from different networks while allowing flexible VLAN identifier assignment are disclosed. According to one aspect, a layer 2 switch includes a virtual switch identifier data structure that associates a VLAN identifier extracted from a layer 2 frame and a port identifier corresponding to a port on which a frame is received with a virtual switch identifier. The virtual switch identifier is used to select a per-virtual-switch data structure, such as a forwarding table. The per-virtual-switch data structure is used to control processing of the layer 2 frame on a per-virtual-switch basis. The per-virtual-switch data structure may also be updated separately from the data structures assigned to other virtual switches.||11-20-2014|
|20120230344||FORWARDING INTER-SWITCH CONNECTION (ISC) FRAMES IN A NETWORK-TO-NETWORK INTERCONNECT TOPOLOGY - Systems, mechanisms, apparatuses, and methods are disclosed for forwarding Inter-Switch Connection (ISC) frames in a Network-to-Network Interconnect (NNI) topology, for example, via a network switch which includes a first and second physical switch port to receive a first and second physical switch link from a second network switch; logic to implement first and second logical ISC′ connections to the second switch via the first and second physical switch links respectively; logic to implement a Primary Forwarder which is interfaced with a Secondary Forwarder in the second switch via the first logical ISC′ connection; logic to implement a Secondary Forwarder which is interfaced with a Primary Forwarder in the second switch via the second logical ISC′ connection; and switch forwarding logic to forward frames based on which connection the frames are received by, and/or based on a gateway identifier associated with each received frame. Other embodiments are disclosed.||09-13-2012|
|20120230325||FORWARDING INTER-SWITCH CONNECTION (ISC) FRAMES IN A NETWORK-TO-NETWORK INTERCONNECT TOPOLOGY - Systems, mechanisms, apparatuses, and methods are disclosed for forwarding Inter-Switch Connection (ISC) frames in a Network-to-Network Interconnect (NNI) topology, for example, via a network switch which includes a first physical switch port to receive a physical switch link from a second network switch; logic to implement a first logical ISC and a second logical ISC′ connection to the second network switch via the physical switch link; a second physical switch port to receive an interface connection from a third network switch; and switch forwarding logic to forward frames received at the first network switch to the second network switch via the logical ISC or logical ISC′ based on whether or not the physical switch link is part of an active topology upon which the network switch operates or is not part of the active topology upon which the network switch operates. Other embodiments are disclosed.||09-13-2012|
|20120207169||METHOD OF PROVIDING VIRTUAL ROUTER FUNCTIONALITY - A method of presenting different virtual routers to different end users, classes of service, or packets is provided. An incoming packet is received having a VLAN field and at least one additional field. A key is formed from the VLAN field and at least one other packet field, and mapped into a virtual router identifier (VRID) using an indirection mapping process. The VRID identifies a particular virtual router configuration from a plurality of possible virtual router configurations. A networking device is configured to have the particular virtual router configuration identified by the VRID, and the packet is then forwarded by the configured device.||08-16-2012|
|20110149736||INTEGRATED METHODS OF PERFORMING NETWORK SWITCH FUNCTIONS - On-switch methods for enforcing a policy relating to one or more network switch resources, for detecting and mitigating a network anomaly, and for selectively filtering packets to an externally-accessible port, are provided. The methods may each be embodied as one or more rules held by one or more processor readable media, with one or more of the rules defining one or more conditions to be met by one or more usage-derived packet statistics, and one or more actions to be performed if the one or more conditions are met.||06-23-2011|
|20100246387||NETWORK CONVERGENCE IN RESPONSE TO A TOPOLOGY CHANGE - In response to a network topology change, packets are initially flooded on ports of a network device. In addition, a bit array is cleared in response to the topology change. Each bit in the bit array is associated with a particular forwarding entry on the network device. In connection with the clearing of the bit array, the flooding of packets on ports of the network device is made conditional, reducing failover time of the network.||09-30-2010|
|20100054246||CONVERGENCE OF MULTICAST TRAFFIC - A multicast data packet sent from a source node is received by a transit node. The multicast data packet includes a source address and a multicast group address. A hardware cache miss is detected at the transit node for the multicast data packet. The multicast data packet is hardware-flooded onto ports of the network. The flooding consists of forwarding a copy of the multicast data packet to neighbor nodes of the transit node based on virtual local area network (VLAN) membership. A cache-miss copy of the multicast data packet is sent to an out-of-line processing unit where it is processed in software. The processing includes establishing, via a hardware abstraction layer, a hardware cache entry for the multicast data packet. The cache-miss copy is not forwarded onto the network.||03-04-2010|
Patent applications by EXTREME NETWORKS, INC.