EXTREME NETWORKS, INC.
|EXTREME NETWORKS, INC. Patent applications|
|Patent application number||Title||Published|
|20120230344||FORWARDING INTER-SWITCH CONNECTION (ISC) FRAMES IN A NETWORK-TO-NETWORK INTERCONNECT TOPOLOGY - Systems, mechanisms, apparatuses, and methods are disclosed for forwarding Inter-Switch Connection (ISC) frames in a Network-to-Network Interconnect (NNI) topology, for example, via a network switch which includes a first and second physical switch port to receive a first and second physical switch link from a second network switch; logic to implement first and second logical ISC′ connections to the second switch via the first and second physical switch links respectively; logic to implement a Primary Forwarder which is interfaced with a Secondary Forwarder in the second switch via the first logical ISC′ connection; logic to implement a Secondary Forwarder which is interfaced with a Primary Forwarder in the second switch via the second logical ISC′ connection; and switch forwarding logic to forward frames based on which connection the frames are received by, and/or based on a gateway identifier associated with each received frame. Other embodiments are disclosed.||09-13-2012|
|20120230325||FORWARDING INTER-SWITCH CONNECTION (ISC) FRAMES IN A NETWORK-TO-NETWORK INTERCONNECT TOPOLOGY - Systems, mechanisms, apparatuses, and methods are disclosed for forwarding Inter-Switch Connection (ISC) frames in a Network-to-Network Interconnect (NNI) topology, for example, via a network switch which includes a first physical switch port to receive a physical switch link from a second network switch; logic to implement a first logical ISC and a second logical ISC′ connection to the second network switch via the physical switch link; a second physical switch port to receive an interface connection from a third network switch; and switch forwarding logic to forward frames received at the first network switch to the second network switch via the logical ISC or logical ISC′ based on whether or not the physical switch link is part of an active topology upon which the network switch operates or is not part of the active topology upon which the network switch operates. Other embodiments are disclosed.||09-13-2012|
|20120207169||METHOD OF PROVIDING VIRTUAL ROUTER FUNCTIONALITY - A method of presenting different virtual routers to different end users, classes of service, or packets is provided. An incoming packet is received having a VLAN field and at least one additional field. A key is formed from the VLAN field and at least one other packet field, and mapped into a virtual router identifier (VRID) using an indirection mapping process. The VRID identifies a particular virtual router configuration from a plurality of possible virtual router configurations. A networking device is configured to have the particular virtual router configuration identified by the VRID, and the packet is then forwarded by the configured device.||08-16-2012|
|20110149736||INTEGRATED METHODS OF PERFORMING NETWORK SWITCH FUNCTIONS - On-switch methods for enforcing a policy relating to one or more network switch resources, for detecting and mitigating a network anomaly, and for selectively filtering packets to an externally-accessible port, are provided. The methods may each be embodied as one or more rules held by one or more processor readable media, with one or more of the rules defining one or more conditions to be met by one or more usage-derived packet statistics, and one or more actions to be performed if the one or more conditions are met.||06-23-2011|
|20100246387||NETWORK CONVERGENCE IN RESPONSE TO A TOPOLOGY CHANGE - In response to a network topology change, packets are initially flooded on ports of a network device. In addition, a bit array is cleared in response to the topology change. Each bit in the bit array is associated with a particular forwarding entry on the network device. In connection with the clearing of the bit array, the flooding of packets on ports of the network device is made conditional, reducing failover time of the network.||09-30-2010|
|20100054246||CONVERGENCE OF MULTICAST TRAFFIC - A multicast data packet sent from a source node is received by a transit node. The multicast data packet includes a source address and a multicast group address. A hardware cache miss is detected at the transit node for the multicast data packet. The multicast data packet is hardware-flooded onto ports of the network. The flooding consists of forwarding a copy of the multicast data packet to neighbor nodes of the transit node based on virtual local area network (VLAN) membership. A cache-miss copy of the multicast data packet is sent to an out-of-line processing unit where it is processed in software. The processing includes establishing, via a hardware abstraction layer, a hardware cache entry for the multicast data packet. The cache-miss copy is not forwarded onto the network.||03-04-2010|
Patent applications by EXTREME NETWORKS, INC.