Patent application number | Description | Published |
20080205387 | TRANSMITTING A PACKET FROM A DISTRIBUTED TRUNK SWITCH - A method of transmitting a packet from a distributed trunk (DT) switch and a computer-readable medium storing instructions therefor is described. The method comprises receiving a packet from a device connected to the DT switch, transmitting the received packet via a non-distributed trunk port of the DT switch, and forwarding the received packet via a DT port of the DT switch for each received packet based on a determination of whether to forward the received packet based on an address of the received packet. The method also comprises forwarding the received packet via a distributed trunk interconnect port for each received packet received via one of a non-DT port and a DT port. | 08-28-2008 |
20080205408 | TRANSMITTING A PACKET FROM A DISTRIBUTED TRUNK SWITCH - A method of transmitting a packet from a distributed trunk switch and a computer-readable medium storing instructions therefor is described. The method comprises populating an address table of the distributed trunk switch. The method also comprises receiving a packet from a device connected to the distributed trunk switch and transmitting the received packet via a distributed trunk (DT) port of the distributed trunk switch if the destination address of the received packet corresponds to a distributed trunk port in the address table. | 08-28-2008 |
20090207834 | TRANSMITTING A PACKET FROM A DISTRIBUTED TRUNK SWITCH - A method of transmitting an upstream communication packet from a distributed trunk (DT) switch is described. The method comprises receiving a packet from a device connected to a DT port of the DT switch; and transmitting the received packet via a non-DT port of the DT switch if the DT switch is the owner of the device and transmitting the received packet via a DT interconnect (DTI) port of the DT switch if the DT switch is not the owner of the device. | 08-20-2009 |
20090274054 | System and method for detecting a network loop - A system and methods of detecting a loop in a network having at least one access point with a first interface and a second interface, at least one switch with multiple ports, and at least one client with a first interface and a second interface, including: the access point first interface intermittently transmitting a loop check packet to the switch; the switch receiving the loop check packet at one of the ports and transmitting the loop check packet to the client through another one of the ports; the client first interface receiving the loop check packet; the client second interface retransmitting the loop check packet to the access point; and the access point second interface being configured to receive the retransmitted loop check packet. The access point detects a loop when the access point second interface receives the retransmitted loop check packet. Other embodiments eliminate the loops in various ways. | 11-05-2009 |
20100118712 | Systems and Methods for Notifying Users of a Network Resource Outage - Systems and methods are disclosed for a network switch that periodically determines whether there are connectivity problems with first ports and a second port independently of responding to requests from computer systems. Information to be sent to the computer system that sends a request is generated. The information includes an error message regarding at least one of the connectivity problems when one of the first ports or the second port with the connectivity problem is required to respond to the request. | 05-13-2010 |
20100191853 | Methods And Systems For Managing Network Access - Methods, systems and computer readable mediums storing computer executable programs for managing access to a network at a network access management module are disclosed. A first network request is received from a client at a network access management module. A first determination is made regarding whether the first network request is associated with a restricted network action at the network access management module. A second network request is received from the client at the network access management module. The second network request is intercepted at the network access management module based on the first determination. A network access restriction notification is transmitted from the network access management module to the client based on the first determination. | 07-29-2010 |
20110107394 | AUTHENTICATION METHODS AND DEVICES - Embodiments of the device have a plurality of authentication slots for authenticating users, a port configured to receive an authentication request from a user, a memory, a queue maintained in the memory, and a processing engine configured to monitor the port and the authentication slots such that if an authentication request from a user is received and no authentication slots are available, an identifier associated with the user is enqueued on the queue, and wherein if one of the authentication slots is or becomes available and the queue is not empty, an identifier is dequeued from the queue and the associated user is authenticated using one of the available authentication slots. | 05-05-2011 |
20120020217 | STORING NETWORK FLOW INFORMATION - Storing network flow information. Network packets comprising network internet protocol flow information is received at a network device, the network packets comprising an internet protocol header comprising internet protocol source and destination information pairs. The internet protocol source and destination information pairs are stored at a memory table of the network device. The internet protocol source and destination information pairs are made available for searching. | 01-26-2012 |
20120182872 | METHODS FOR PACKET FORWARDING THROUGH A COMMUNICATION LINK OF A DISTRIBUTED LINK AGGREGATION GROUP USING MESH TAGGING - A method for packet forwarding through a communication link of a distributed link aggregation group (LAG) in a mesh network using a path tag is described herein. A packet is received on a non-mesh port of a first network device of the mesh network. A Media Access Controller (MAC) destination address of the packet that is associated with a plurality of network devices in the mesh is determined. Each network device of the plurality of network devices includes a link grouped in the distributed LAG. A destination mesh device from the plurality of network devices is selected. A plurality of available paths between the first network device and the destination mesh device are determined. A path of the plurality of available paths is selected. A tag associated with the selected path is inserted into the packet, and the packet is forwarded along the selected path. | 07-19-2012 |
20120250691 | TRANSMITTING A PACKET FROM A DISTRIBUTED TRUNK SWITCH - A method of transmitting a packet from a distributed trunk switch and a computer-readable medium storing instructions therefor is described. The method comprises populating an address table of the distributed trunk switch. The method also comprises receiving a packet from a device connected to the distributed trunk switch and transmitting the received packet via a distributed trunk (DT) port of the distributed trunk switch if the destination address of the received packet corresponds to a distributed trunk port in the address table. | 10-04-2012 |
20130086403 | METHOD OF REDUCING POWER CONSUMPTION IN A NETWORK - A method of reducing power consumption in a network. A first network device powers down or reduces the port speed of a port if said port is blocked by a loop mitigation protocol. | 04-04-2013 |
20130107755 | DYNAMIC HARDWARE ADDRESS ASSIGNMENT TO NETWORK DEVICES IN A SWITCH MESH | 05-02-2013 |
20130208725 | CONTENT-BASED FORWARDING OF NETWORK TRAFFIC - A method includes reading content of network traffic that arrives at a network port of a network switch of a mesh of network switches. A hash algorithm is applied to the read content to indicate a path to a destination network switch of the mesh, the hash algorithm being common to all network switches of the mesh. The network traffic is forwarded via a network port that is associated with the indicated path. | 08-15-2013 |
20130336165 | SWITCH IDENTIFICATION - An example switch in accordance with the present disclosure is to process a command to determine desired identification information; generate a link layer discovery protocol (LLDP) frame based at least in part on the desired identification information, wherein the LLDP frame comprises an optional type-length-value (TLV) that causes a second switch to enable a light source; and transmit the LLDP to the second switch, | 12-19-2013 |
20140165162 | MANAGING ACCESS TO A NETWORK - In a method of managing access to a network, a MAC based authentication operation is implemented in determining whether to grant a user device access to the network. In addition, a user is enabled to self-register a user device into a database of authorized users in response to the user being denied access through the MAC based authentication operation and being listed as a valid user in a directory of active network users. Moreover, the directory of active network users is monitored for modification of information pertaining to the users listed in the directory of active network users and the database of authorized users is modified in response to a determination that user information pertaining to at least one user listed in the directory of active network users that affects the database of authorized users has been modified. | 06-12-2014 |
20140254377 | Methods for Packet Forwarding Though a Communication link of a Distributed link Aggregation Group Using Mesh Tagging - A method for packet forwarding through a communication link of a distributed link aggregation group (LAG) in a mesh network using a path tag is described herein. A packet is received on a non-mesh port of a first network device of the mesh network. A Media Access Controller (MAC) destination address of the packet that is associated with a plurality of network devices in the mesh is determined. Each network device of the plurality of network devices includes a link grouped in the distributed LAG. A destination mesh device from the plurality of network devices is selected. A plurality of available paths between the first network device and the destination mesh device are determined. A path of the plurality of available paths is selected. A tag associated with the selected path is inserted into the packet, and the packet is forwarded along the selected path. | 09-11-2014 |
20150030029 | Frame Passing Based on Ethertype - Example embodiments disclosed herein relate to passing or forwarding a frame. A frame is received from a first device. The frame includes a first header including a destination Media Access Control (MAC) address followed by a second header including a source MAC address followed by a third header including an Ethertype. The frame is passed or forwarded to a second device based on the Ethertype. | 01-29-2015 |
Patent application number | Description | Published |
20080205376 | Redundant router having load sharing functionality - Methods, systems, and devices are provided for load sharing among network devices. One embodiment includes a network device having router functionality, including a processor, memory in communication with the processor, and executable instructions stored in memory and executable on the processor to provide router functionality redundancy for another network device having router functionality, and provide a load sharing functionality between the network devices when both devices are operational. | 08-28-2008 |
20090016221 | Methods and apparatus for many-to-one connection-rate monitoring - One embodiment relates to a network device configured with many-to-one connection-rate monitoring. The network device includes sampling circuitry configured to sample packets from a port and a software-implemented agent. The agent is configured to receive the sampled packets and to determine a number of distinct sources for each destination in the sampled packets. Another embodiment relates to a method of many-to-one connection-rate monitoring. A rate of traffic at a port of a network device is measured, and the measured traffic rate is compared with a pre-set threshold rate. If the pre-set threshold rate is exceeded by the measured traffic rate, then packets from the port are sampled over a period of time. The sampled packets are analyzed to detect a high rate of connections to a single destination. Other embodiments, aspects and features are also disclosed herein. | 01-15-2009 |
20130114619 | DEVICE AND METHOD FOR EGRESS PACKET FORWARDING USING MESH TAGGING - A method for packet forwarding using a tag in a mesh network is described herein. A packet is received on a non-mesh port of a first mesh network device of the mesh network. One or more available paths between the first mesh network device and a second mesh network device are determined. A path of the one or more available paths is selected based on an egress forwarding rule associated with the path. A tag associated with the selected path is inserted into the packet. The packet is forwarded along the selected path. | 05-09-2013 |
Patent application number | Description | Published |
20080205412 | Multiple-instance meshing - One embodiment disclosed relates to a switching system. The switching system includes first, second, and third sets of switches. The first set of switches is configured with a first instance of meshing software such that the switches in the first set are members of a first mesh domain. The second set of switches is configured with a second instance of the meshing software such that the switches in the second set are members of a second mesh domain. The third set of switches is configured with both the first and second instances of the meshing software such that the switches in the third set are members of both the first and second mesh domains. Another embodiment disclosed relates to a packet switch apparatus executing multiple instances of meshing software. Another embodiment disclosed relates to a method of configuring a switching system having multiple mesh domains. | 08-28-2008 |
20110026529 | Method And Apparatus For Option-based Marking Of A DHCP Packet - A method and apparatus for processing a Dynamic Host Configuration Protocol (DHCP) packet in a trusted network are disclosed. The trusted network includes a plurality of trusted network devices and a trusted host. The DHCP packet is received at a network device of the trusted network. A port of the network device from which the DHCP packet was received is determined. An identifier associated with the port is determined. An option in the DHCP packet is marked by the network device using the identifier. The marked DHCP packet is transmitted along a forwarding path. | 02-03-2011 |
20110243032 | Method For Energy Efficient Configuration Of Ports Of A Logical Communication Channel - A method for energy efficient configuration of a physical port of a plurality of physical ports of a network device is described herein. One or more physical ports of the plurality of physical ports may be aggregated to a logical port in a logical communication channel between the network device and another device. A configuration of the one or more physical ports is determined. The configuration includes one or more parameters which are monitored. The physical port of the plurality of physical ports is selected and a configuration state of the selected physical port is modified upon detection of an event based on the one or more parameters. The modified configuration state is one of an active port state, an active port state with a limited bandwidth utilization rate, and a standby port state. The selected port is reconfigured according to the modified configuration state. | 10-06-2011 |
20120017279 | METHOD AND APPARATUS FOR VIRUS THROTTLING WITH RATE LIMITING - A method for traffic control of a network device in a network are disclosed. The network device determines potentially malicious behavior by a host device in the network. A permissible rate of traffic from the host device through a port of the network device is reduced in response to determining the potentially malicious behavior. A rate of traffic through the port of the network device is measured. The measured traffic rate is compared with a threshold rate. The permissible rate of traffic is adjusted based on the comparison. | 01-19-2012 |
20120020358 | ROUTER AGGREGATION - A router programmed to function within an aggregation of a plurality of routers that appears as a single router externally is programmed to determine whether it is a first router in the aggregation of routers to receive a data packet. If the router is a first router in the aggregation of routers to receive a data packet, the router is programmed to perform layer 3 routing for the data packet including modification of the source and destination Media Access Control (MAC) addresses of the packet, and then transmit the packet to another router in the aggregation of routers for layer 2 switching of the packet. If the router is not a first router in the aggregation of routers to receive a data packet, the router is programmed to only perform layer 2 switching of the packet, with layer 3 routing for the data packet having already been performed by another router in the aggregation of routers. | 01-26-2012 |
20120023217 | METHOD AND APPARATUS FOR POLICY ENFORCEMENT USING A TAG - A method and apparatus for policy enforcement at a network device of a network are disclosed. A packet is received at the network device. A tag associated with the packet is determined. The tag includes a field that indicates a path thru the network that is assigned to the packet. The path is between an entry network device of the packet and a destination network device of the packet. The tag is mapped to a policy of a plurality of policies based on information about a client device. The client information is not available within the packet. One or more rules associated with the policy are determined and enforced. | 01-26-2012 |
20130031621 | METHOD FOR APPLYING A HOST SECURITY SERVICE TO A NETWORK - A method for applying a host security service to a network is described herein. The network may include a host device and a network device. The network device may receive a request for security-based filtering. The request includes filtering parameters that restrict traffic between the host device and the network device. It is determined whether the filtering parameters conflict with an initial filtering configuration. The filtering parameters may be applied to traffic through the network device. | 01-31-2013 |