Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Similar
Filing Names

Juniper Networks Inc
Juniper Networks Inc_20100107
Juniper Networks Inc_20100121
Juniper Networks Inc_20100128
Juniper Networks Inc_20131212

Juniper Networks Inc patents


Recent patent applications related to Juniper Networks Inc. Juniper Networks Inc is listed as an Agent/Assignee. Note: Juniper Networks Inc may have other listings under different names/spellings. We're not affiliated with Juniper Networks Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "J" | Juniper Networks Inc-related inventors


 new patent  Optical transceiver with external laser source

A wavelength division multiplexing (WDM) transceiver module comprising an optical port and an optical modulator is disclosed herein. The optical port includes a data transmit and receive optical fiber connector and a laser source-in optical fiber connector. The laser source-in optical fiber connector is configured to couple to a laser... Juniper Networks Inc

Integrated wavelength locker

Described are various configurations of integrated wavelength lockers including asymmetric Mach-Zehnder interferometers (AMZIs) and associated detectors. Various embodiments provide improved wavelength-locking accuracy by using an active tuning element in the AMZI to achieve an operational position with high locking sensitivity, a coherent receiver to reduce the frequency-dependence of the locking... Juniper Networks Inc

Integrated wavelength locker

Described are various configurations of integrated wavelength lockers including asymmetric Mach-Zehnder interferometers (AMZIs) and associated detectors. Various embodiments provide improved wavelength-locking accuracy by using an active tuning element in the AMZI to achieve an operational position with high locking sensitivity, a coherent receiver to reduce the frequency-dependence of the locking... Juniper Networks Inc

Integrated wavelength locker

Described are various configurations of integrated wavelength lockers including asymmetric Mach-Zehnder interferometers (AMZIs) and associated detectors. Various embodiments provide improved wavelength-locking accuracy by using an active tuning element in the AMZI to achieve an operational position with high locking sensitivity, a coherent receiver to reduce the frequency-dependence of the locking... Juniper Networks Inc

Deterministically selecting a bypass lsp for a defined group of protected lsps

In one example, a method includes receiving, by a network device, first data defining a group of LSPs, receiving second data defining one or more constraints for one or more bypass LSPs, and receiving third data defining a mapping between the group of LSPs and the one or more bypass... Juniper Networks Inc

Multiple paths computation for label switched paths

In general, techniques are described for identifying a result set of multiple paths through a network for one or more label switched paths between a source node and a destination node. In some examples, the identified paths are computed to be broadly separate to avoid overlapping network elements. A device... Juniper Networks Inc

Rsvp make-before-break label reuse

Techniques are described for reusing downstream-assigned labels when establishing a new instance of a label switched path (LSP) prior to tearing down an existing instance of the LSP using make-before-break (MBB) procedures for RSVP. The techniques enable a routing engine of any non-ingress router along a path of the new... Juniper Networks Inc

Symmetric intersubnet traffic load balancing in multihomed networks

A device may receive a network address associated with a destination device. The network address may identify the destination device based on layer 3 of the Open Systems Interconnection model. The device may store next-hop information identifying a next hop associated with the destination device based on the network address.... Juniper Networks Inc

Distributing service function chain data and service function instance data in a network

In some examples, a computing device comprises a first service function instance to apply a service function and a service function forwarder to: receive a first layer 3 routing protocol route advertisement that includes service function instance data for a second service function instance, the service function instance data indicating... Juniper Networks Inc

Methods and apparatus related to virtualization of data center resources

In one embodiment, an apparatus includes a switch core that has a multi-stage switch fabric. A first set of peripheral processing devices coupled to the multi-stage switch fabric by a set of connections that have a protocol. Each peripheral processing device from the first set of peripheral processing devices is... Juniper Networks Inc

Evpn designated forwarder state propagation to customer edge devices using connectivity fault management

Techniques are described to provide designated forwarder state propagation to customer edge network devices using connectivity fault management (CFM) so as to ensure that customer edge (CE) network devices are aware of a change in designated forwarder election in an Ethernet Virtual Private Network (EVPN). In one example, a method... Juniper Networks Inc

Predicting firewall rule ranking value

A device may obtain information regarding firewall rules. The information, for a firewall rule of the firewall rules, may include one or more match condition values and a ranking value. The firewall rule may be applicable to packets that are associated with packet information that matches the match condition values.... Juniper Networks Inc

Session-identifer based twamp data session provisioning in computer networks

Techniques are described for performing session identifier (“SID”) based two-way active measurement protocol (TWAMP) data session provisioning between two endpoints in a computer network. According to the techniques, a SID assigned to each data session is used to uniquely identify the data session, instead of a source and destination address/port... Juniper Networks Inc

Methods and virtual soft handoff

In some embodiments, a non-transitory processor-readable medium includes code to cause a processor to receive at a tunnel server, a data unit addressed to a communication device, and define, a first instance of the data unit and a second instance of the data unit. The first instance of the data... Juniper Networks Inc

Simple hierarchical label-switched paths

A device may identify a portion of a label-switched path (LSP) on which a simple hierarchical LSP (sH-LSP) is to be used for transferring traffic via a network. The device may determine attribute information associated with the sH-LSP. The attribute information may include information associated with one or more characteristics... Juniper Networks Inc

Detection and compensation of power imbalances for a transmitter

An optical device may include a transmitter to provide an optical signal via a set of channels and a modulator. The optical device may include two or more tributary modulators to modulate the set of channels with a training pattern. The optical device may include a set of optics to... Juniper Networks Inc

Preventing data traffic loops associated with designated forwarder selection

A device may receive a route identifier that includes a range identifier or a configuration identifier. The range identifier may identify a range of broadcast domain identifiers associated with a first device. The configuration identifier may identify an Ethernet segment identifier (ESI) configuration of the first device. The device may... Juniper Networks Inc

Multicast flow overlay using registration over a reliable transport

An example method includes exchanging targeted hello messages to establish a targeted neighbor connection between a first routing device and a second routing device, wherein one of the routing devices comprises a central routing device, and wherein another one of the routing devices comprises an ingress routing device. The example... Juniper Networks Inc

Multicasting within distributed control plane of a switch

In some embodiments, a non-transitory processor-readable medium stores code representing instructions configured to cause a processor to receive, from an access switch, a first signal including forwarding state information associated with a first peripheral processing device from a set of peripheral processing devices. The code can further represent instructions configured... Juniper Networks Inc

Methods and low-loss reconfigurable optical quadrature amplitude modulation (qam) signal generation

In some embodiments, an apparatus includes a quadrature amplitude modulation (QAM) optical modulator which includes a first phase modulator (PM), a second PM, a tunable optical coupler (TOC), and an optical combiner (OC). The TOC is configured to split a light wave at an adjustable power splitting ratio to produce... Juniper Networks Inc

Selective transmission of bidirectional forwarding detection (bfd) messages for verifying multicast connectivity

A network device may identify first interfaces used by the network device to communicate with other network devices. The network device may use second interfaces to communicate with multicast receiver devices that are different from the other network devices. The network device may store information that identifies the first interfaces... Juniper Networks Inc

Filtering and route lookup in a switching device

Methods and devices for processing packets are provided. The processing device may include an input interface for receiving data units containing header information of respective packets; a first module configurable to perform packet filtering based on the received data units; a second module configurable to perform traffic analysis based on... Juniper Networks Inc

Communicating igmp leave requests between load-balanced, multi-homed provider-edge routers in an ethernet virtual private network

In general, the disclosure describes techniques for communicating multicast group leave requests between two or more load-balanced, multi-homed PE routers included in an Ethernet Virtual Private Network (EVPN). The techniques of the disclosure enable the two or more PE routers to synchronize IGMP state and routing information amongst one another... Juniper Networks Inc

Adaptive load balancing for single active redundancy using evpn designated forwarder election

A provider edge (PE) device may receive an indication to perform a designated forwarder (DF) election associated with a network segment that includes the PE device, one or more other PE devices, and a client edge (CE) device. The PE device, the one or more other PE devices, and the... Juniper Networks Inc

Filtering data using malicious reference information

A device may receive data from a first endpoint device. The device may identify a network protocol. The network protocol may be associated with receiving the data. The device may identify a format. The format may be associated with encoding textual information in the data. The device may determine, based... Juniper Networks Inc

Method, system, and reducing the size of route updates

The disclosed method may include (1) establishing a communication session between a plurality of network nodes to enable the plurality of network nodes to exchange route updates with one another, and then during the communication session, (2) detecting, at one of the network nodes, at least one route update to... Juniper Networks Inc

Monitoring packet residence time and correlating packet residence time to input sources

An output circuit, included in a device, may determine counter information associated with a packet provided via an output queue managed by the output circuit. The output circuit may determine that a latency event, associated with the output queue, has occurred. The output circuit may provide the counter information and... Juniper Networks Inc

Automatically detecting an error in a communication and automatically determining a source of the error

A device may monitor a communication between network devices for an error associated with the communication. The device may detect the error associated with the communication between the network devices. The device may perform a comparison of an error metric and a threshold error metric. The error metric may be... Juniper Networks Inc

Auto discovery and auto scaling of services in software-defined network environment

Techniques are described for automatic discovery of two or more virtual service instances configured to apply a given service to a packet in a software-defined networking (SDN)/network functions virtualization (NFV) environment. Virtual service instances may be deployed as virtual entities hosted on one or more physical devices to offer individual... Juniper Networks Inc

Remotely updating routing tables

A network device may receive an instruction to update a data structure implemented by the network device and update the data structure based on receiving the instruction. The data structure may include a routing instruction to direct the network device to provide a data flow to a server device for... Juniper Networks Inc

Processing data flows based on information provided via beacons

A first component of a network device may provide an offload request to a second component of the network device to offload a data flow from the first component. The offload request may direct the second component to provide the data flow towards a destination device and bypass the first... Juniper Networks Inc

Bandwidth management for resource reservation protocol lsps and non-resource reservation protocol lsps

In general, techniques described are for bandwidth sharing between resource reservation protocol label switched paths (LSPs) and non-resource reservation protocol LSPs. For example, in networks where resource reservation protocol LSPs and non-resource reservation protocol LSPs co-exist within the same domain, resource reservation protocol LSPs and non-resource reservation protocol LSPs may... Juniper Networks Inc

Disaggregated broadband network gateway functionality for efficient content delivery network peering

A first device may receive information that assigns a function related to network traffic associated with a content delivery network. The first device may implement the function based on the information that assigns the function. The first device may receive the network traffic from the content delivery network and may... Juniper Networks Inc

Generating automatic bandwidth adjustment policies per label-switched path

A device may identify a plurality of first values associated with network traffic of a label-switched path of a plurality of label-switched paths. The device may determine an adjustment policy based on the plurality of first values. The adjustment policy may include one or more factors associated with a plurality... Juniper Networks Inc

Layer 3 convergence for evpn link failure

A network device is configured to provide, via an Ethernet segment with a customer network, active-active multi-homing L2 virtual bridge connectivity to the customer network using an EVPN instance (EVI) and L3 routing using an IRB interface that is a L3 routing interface assigned to the EVI; to receive, from... Juniper Networks Inc

01/04/18 / #20180007063

Selective verification of signatures by network nodes

A network node may include one or more processors. The one or more processors may receive a message that is associated with one or more signatures and one or more second signatures. The one or more signatures may have been validated by a particular node. The one or more processors... Juniper Networks Inc

01/04/18 / #20180007064

Malware detection using internal and/or external malware detection operations

A system may determine to perform an internal and an external malware detection operation to detect a malware infection associated with a client device. The system may perform the internal operation by modifying an environment, executing on a particular device, to form a modified environment. The system may perform the... Juniper Networks Inc

01/04/18 / #20180007809

Mechanism to provide physical location information to any network device

An apparatus may be configured to be mounted on a rack. The apparatus may include a communication component. The communication component may be used for communicating with a network device when the network device is mounted on the rack. The apparatus may include a storage device. The storage device may... Juniper Networks Inc

12/28/17 / #20170373973

Signaling ip address mobility in ethernet virtual private networks

In some examples, a provider edge device provides L2 virtual bridge connectivity for at least one customer network using an EVPN instance and L3 routing using an IRB interface that is a L3 routing interface assigned to the EVPN instance; the provider edge device obtains an indication of a new... Juniper Networks Inc

12/21/17 / #20170366286

Master/slave negotiation associated with a synchronous ethernet network

A device may determine a link master/slave relationship for an Ethernet link associated with a connection between a component of the device and a component of another device. The device may determine that Synchronous Ethernet (SyncE) is to be enabled on the Ethernet link. The device may identify the component... Juniper Networks Inc

12/21/17 / #20170366437

Extended ping protocol for determining status for remote interfaces without requiring network reachability

An extend ping protocol is described that allow connectivity tests to be performed for individual network interfaces of a target device without requiring network reachability between the testing device and the remote interface whose status is being queried. Moreover, the extend ping protocol supports a plurality of different probe types... Juniper Networks Inc

12/21/17 / #20170366444

Scaled inter-domain metrics for link state protocols

In general, techniques are described by which to provide a scaled end-to-end view of link metrics to integrate multiple non-uniform Interior Gateway Protocol (“IGP”) domains. For example, an Accumulated Interior Gateway Protocol (“AIGP”) attribute, a non-transitive BGP attribute, which includes a link metric assigned to a link within a first... Juniper Networks Inc

12/21/17 / #20170366452

Service chaining within computer networks

Techniques are described for providing session-aware, stateful network services to subscriber packet flows. Devices within a service provider network direct subscriber packets along service chains. Each tunnel is established to direct traffic according a particular ordered set of network services for the corresponding service chain. An ingress device for the... Juniper Networks Inc

12/14/17 / #20170359758

Preserving mobile network session data during radio access technology handover

An example gateway device determines that a first policy, applicable to a subscriber device when the subscriber device is coupled to a first access network, indicates that packets from the subscriber device are to be sent to a service device, and forwards a first set of packets from the subscriber... Juniper Networks Inc

12/07/17 / #20170351124

Dissipating heat from an active region of an optical device

A device, such as an electroabsorption modulator, can modulate a light intensity by controllably absorbing a selectable fraction of the light. The device can include a substrate. A waveguide positioned on the substrate can guide light. An active region positioned on the waveguide can receive guided light from the waveguide,... Juniper Networks Inc

12/07/17 / #20170353402

Supplemental connection fabric for chassis-based network device

A system may receive, by a switching component of the system, network traffic to be provided to an I/O component of the network device. The system may route, by the switching component, the network traffic to the I/O component based on whether the I/O component is connected to the switching... Juniper Networks Inc

11/30/17 / #20170344740

Configuring a sandbox environment for malware testing

A device may receive a file to be analyzed in a sandbox environment, and may determine configuration information for configuring the sandbox environment. The configuration information may be determined based on at least one of: file information associated with the file to be analyzed, or client device information associated with... Juniper Networks Inc

11/30/17 / #20170344744

Detecting keylogging

A device may detect or emulate a sequence of keystrokes to be used to detect a keystroke logger application. The device may determine a sequence of characters associated with the sequence of keystrokes. The sequence of characters may correspond to the sequence of keystrokes or a portion of the sequence... Juniper Networks Inc

11/30/17 / #20170346703

Monitoring network management activity

A device is configured to receive, from a network device, a first message associated with a network management activity performed by using an application of the network device. The device is further configured to determine whether the first message satisfies a criterion, and to classify the first message based on... Juniper Networks Inc

11/30/17 / #20170346763

Switching fabric topology based on traversing asymmetric routes

A system may include a set of 4N packet processors and a switching fabric to interconnect the set of 4N packet processors. The switching fabric may include the following switching elements having a size of at least 3N×3N: a first switching element, a second switching element, a third switching element,... Juniper Networks Inc

11/30/17 / #20170346796

Distributed learning and aging for management of internet protocol (ip) addresses

A device includes a security process unit (SPU) associated with a logical ring of SPUs. The SPU receives a packet with an address associated with a malicious source, and creates, based on the packet, an entry in a data structure associated with the SPU. The entry includes information associated with... Juniper Networks Inc

11/30/17 / #20170346827

Using a probability-based model to detect random content in a protocol field associated with network traffic

A device may receive network traffic. The device may identify candidate text included in a protocol field associated with the network traffic. The device may identify a set of candidate strings included in the candidate text. The device may identify a set of characters that precedes or follows a candidate... Juniper Networks Inc

11/30/17 / #20170346838

Detecting a malicious file infection via sandboxing

A device may receive a trigger to determine whether a malicious file is operating on a client device. The device may determine a network activity profile associated with the malicious file based on receiving the trigger to determine whether the malicious file is operating on the client device. The network... Juniper Networks Inc

11/23/17 / #20170337375

Identifying malware based on a relationship between a downloader file and a downloaded file

A device may analyze a first file for malware. The device may determine that the first file causes a second file to be downloaded. The device may store linkage information that identifies a relationship between the first file and the second file based on determining that the first file causes... Juniper Networks Inc

11/23/17 / #20170339052

Egress node protection for broadcast, unknown unicast, or multicast traffic in evpn topologies

A first device may receive network traffic including a first label. The first label may be an inclusive multicast label associated with a second device. The second device may be a designated forwarder for an Ethernet segment. The first device may determine a second label based on receiving the network... Juniper Networks Inc

11/16/17 / #20170331634

Detecting and preventing man-in-the-middle attacks on an encrypted connection

A client device may provide, to a host device, a request to access a website associated with a host domain. The client device may receive, based on the request, verification code that identifies a verification domain and a resource, associated with the verification domain, to be requested to verify a... Juniper Networks Inc

11/09/17 / #20170323101

Dynamically optimizing performance of a security appliance

A device may identify a set of features associated with the unknown object. The device may determine, based on inputting the set of features into a threat prediction model associated with a set of security functions, a set of predicted threat scores. The device may determine, based on the set... Juniper Networks Inc

11/09/17 / #20170324679

Multi-chassis switch having a modular center stage chassis

A system may comprise a first group of switches, each switch including a first group of inputs and outputs, and a first group of controllers, each controller being independent from one another and corresponding to a switch of the first group of switches, to selectively control the switch to connect... Juniper Networks Inc

11/09/17 / #20170324756

Remote remediation of malicious files

A device may determine that a file of a client device is a malicious file. The device may obtain remote access to the client device using a connection tool. The connection tool may provide access and control of the client device. The remote access may include access to a file... Juniper Networks Inc

11/02/17 / #20170317777

Methods and logical associations between routers and optical nodes within a wavelength division multiplexing (wdm) system

An apparatus includes a memory and a processor operatively coupled to the memory. The processor is configured to partition a set of ports of an optical multiplexer into a set of port groups including a first port group having a first set of ports and a second port group having... Juniper Networks Inc

11/02/17 / #20170317780

Point-to-multipoint path computation for wide area network optimization

In some examples, a controller for a network includes a path computation module configured for execution by one or more processors to obtain configuration information for at least one point-to-multipoint label switched path (P2MP LSP); obtain, from the network via at least one protocol, network topology information defining a network... Juniper Networks Inc

11/02/17 / #20170317849

Using a multicast address as a tunnel remote gateway address in a layer 2 tunneling protocol access concentrator

A layer 2 tunneling protocol access concentrator (LAC) may receive an indication to set up a layer 2 tunneling protocol (L2TP) tunnel. The LAC may determine, based on the indication, a multicast address associated with initiating setup of the L2TP tunnel. The LAC may provide, to the multicast address, a... Juniper Networks Inc

10/26/17 / #20170308422

Method, system, and debugging networking malfunctions within network nodes

The disclosed computer-implemented method for debugging network nodes may include (1) detecting a computing event that is indicative of a networking malfunction within a network node, (2) determining, based at least in part on the computing event, one or more potential causes of the networking malfunction, (3) identifying one or... Juniper Networks Inc

10/26/17 / #20170308503

Virtual network optimizing a physical network

One or more devices are configured to receive information regarding network devices associated with a physical network. The one or more devices are configured further to generate configuration data based on the information regarding the network devices. The one or more devices are configured further to generate a virtual network... Juniper Networks Inc

10/26/17 / #20170310587

Efficient synchronization of stored information using a parallel ring network topology

A routing system may include a primary message group to be used for synchronizing stored information. The primary message group may include multiple primary network devices. The multiple primary network devices may be configured with a first configuration regarding synchronizing the stored information. The primary message group may form a... Juniper Networks Inc

Patent Packs
10/26/17 / #20170310589

Egress peer engineering using ipv4-mapped ipv6 addresses

A first device may determine an Internet Protocol version R (IPvR) interface address associated with a second device, where R is greater than or equal to four. The first device and the second device may be associated with an external border gateway protocol peering session. The first device may generate... Juniper Networks Inc

10/19/17 / #20170302085

Mitigating an effect of a downstream failure in an automatic transfer switching system

A system may comprise a first switch connected to an output of a first power source, a second switch connected to an output of a second power source, a first sensor connected to an output of the first switch, a second sensor connected to an output of the second switch,... Juniper Networks Inc

10/19/17 / #20170302519

Overlay tunnel and underlay path correlation

A device may receive an indication to generate a probe packet associated with a tunnel included in a first network. The tunnel may include a first tunnel endpoint and a second tunnel endpoint and may correspond to a path, associated with a second network, between the first tunnel endpoint and... Juniper Networks Inc

10/19/17 / #20170302548

Service latency monitoring using two way active measurement protocol

A device may establish a communication session, with a client device, for monitoring a latency of a service. The device may receive, from the client device, a request for a monitored service list. The monitored service list may identify one or more services for which service latency monitoring is supported.... Juniper Networks Inc

10/19/17 / #20170302566

Bit index explicit replication (bier) forwarding for network device components

A network device receives multicast packets that include information identifying destinations in the network, identifies next hops associated with the destinations, and populates a cache with the destinations and addresses of the identified next hops. The network device receives a particular multicast packet that includes information identifying particular destinations included... Juniper Networks Inc

10/19/17 / #20170302699

Limiting the efficacy of a denial of service attack by increasing client resource demands

A device may detect an attack. The device may receive, from a client device, a request for a resource. The device may determine, based on detecting the attack, a computationally expensive problem to be provided to the client device, where the computationally expensive problem requires a computation by the client... Juniper Networks Inc

10/05/17 / #20170288946

Performing a protocol, such as micro bidirectional forwarding detection, on member links of an aggregated link that uses an address of the aggregated link

The problem of being unable to run microBFD using an IPv6 address over any member links of a layer 2 LAG when the LAG is DOWN (and its IPv6 address becomes or is TENTATIVE), is solved by running DAD for the address configured for the microBFD once the individual link... Juniper Networks Inc

10/05/17 / #20170288948

Failure handling for active-standby redundancy in evpn data center interconnect

Techniques are described for avoiding traffic black-holing in a multi-homed Ethernet virtual private networks (EVPNs) in which a customer device (CE) is multi-homed to a plurality of multi-homing provider edge devices (PEs) via respective links of an Ethernet segment. An overlay network is created over the Ethernet segment, and the... Juniper Networks Inc

10/05/17 / #20170288970

Mass mac withdrawal for evpn-dci using virtual esi

The techniques described are directed to providing mass withdrawal of media access control (MAC) routes for network devices in an Ethernet virtual private network data center interconnect (EVPN DCI). MAC routes to reach the learned MAC addresses are stored in routing tables with corresponding top-of-rack Ethernet segment identifier (TOR-ESI) values... Juniper Networks Inc

10/05/17 / #20170288987

Application signature generation and distribution

A network device may receive network traffic for an application. The network device may identify an application layer protocol being used for the network traffic. The network device may obtain contextual information, from the network traffic, to obtain an item of contextual information, and the item of contextual information may... Juniper Networks Inc

10/05/17 / #20170289013

Method, system, and improving forwarding capabilities during route convergence

The disclosed computer-implemented method for improving forwarding capabilities during route convergence may include (1) identifying, at an upstream network device, a set of updated routes that define network paths that have each experienced at least one topology change since the upstream network device last converged with a downstream network device,... Juniper Networks Inc

10/05/17 / #20170289027

Routing inter-as lsps with centralized controller

Techniques are described for routing inter-AS LSPs with a centralized controller taking inter-AS TE metric values for inter-AS links into account. The inter-AS TE metric values, e.g., local preference values, MED values, or EROS, indicate route preferences for routes between ASes. The disclosed techniques enable network devices within either or... Juniper Networks Inc

10/05/17 / #20170289028

Label switched path reporting

Techniques are described for reporting, by non-ingress routers for traffic engineering label switched paths (TE LSPs) and to a path computation element, actual paths taken by the TE LSPs through the network. A first network device: receives, from a second network device, an LSP path signaling message that includes a... Juniper Networks Inc

10/05/17 / #20170289094

Performing duplicate address detection for an integrated routing and bridging device

A device may activate a layer 3 interface of the device based on activation of a first layer 2 interface associated with the layer 3 interface. The device may detect activation of a second layer 2 interface, associated with the layer 3 interface, after activating the layer 3 interface. The... Juniper Networks Inc

10/05/17 / #20170289216

Hot root standby support for multicast

In general, techniques are described for providing Hot-Root Standby in Global Table Multicast (GTM) environments. For example, in such GTM environments, normally a single unicast route to the customer multicast source (“C-Source”) will be available to egress provider edge (PE) routers. As described herein, ingress PE routers may advertise multiple... Juniper Networks Inc

Patent Packs
10/05/17 / #20170289217

Selectively signaling selective tunnels in multicast vpns

In some examples, a method includes receiving, by a first ingress network device for a network, a source tree join route message from an egress network device for the network, specifying a multicast source and a multicast group, and in response to receiving the source tree join route message, determining,... Juniper Networks Inc

10/05/17 / #20170289291

Providing user subscription nomadicity in wireline broadband networks

In general, techniques are described for providing user nomadicity in wireline broadband networks. A network device positioned in a wireline broadband network comprising a processor and an interface may be configured to perform the techniques. The processor may be configured to execute a first virtual customer premises equipment to provide,... Juniper Networks Inc

09/28/17 / #20170279675

Methods and a self-organized layer-2 enterprise network architecture

In some embodiments, an apparatus includes a network node operatively coupled within a network. The network node is configured to send a first authentication message upon boot up, and receive, in response to the first authentication message, a second authentication message configured to be used to authenticate the network node.... Juniper Networks Inc

09/28/17 / #20170279705

Method, system, and preventing tromboning in inter-subnet traffic within data center architectures

The disclosed computer-implemented method for preventing tromboning in inter-subnet traffic within data center architectures may include (1) detecting, at a leaf node of a data center, a route advertisement that advertises a route to a spine node of another data center that interfaces with the data center, (2) identifying, at... Juniper Networks Inc

09/28/17 / #20170279709

Method, system, and forwarding network traffic using minimal forwarding information bases

The disclosed computer-implemented method for forwarding network traffic using minimal Forwarding Information Bases (FIBS) may include (1) identifying a Routing Information Base (RIB) that includes a set of routes that define paths to destinations both inside and outside a network and then (2) creating a FIB that includes a subset... Juniper Networks Inc

09/28/17 / #20170279773

Dynamic prioritization of network traffic based on reputation

A network device may determine a plurality of reputation indicators that indicate a measure of reputation associated with the flow. A first reputation indicator, of the plurality of reputation indicators, may be determined based on applying a first reputation analysis technique in association with the flow. A second reputation indicator,... Juniper Networks Inc

09/21/17 / #20170272307

Methods and a common control protocol for wired and wireless nodes

In some embodiments, an apparatus comprises of a control module implemented in at least one of a memory or a processing device that is configured to receive, via a network and from a wireless access point or an access network node, a control packet defined based on a control protocol.... Juniper Networks Inc

09/21/17 / #20170272312

Methods and centralized virtual switch fabric control

In some embodiments, an apparatus comprises a processing module, disposed within a first switch fabric element, configured to detect a second switch fabric element having a routing module when the second switch fabric element is operatively coupled to the first switch fabric element. The processing module is configured to define... Juniper Networks Inc

09/07/17 / #20170257311

Processing inter-vlan traffic in an ethernet tree

A device may receive, from a first device associated with a first LAN, network traffic destined for a second LAN. The device may provide the first LAN with access to a core network. The device may not provide the second LAN with access to the core network. The device may... Juniper Networks Inc

09/07/17 / #20170257328

Methods and flow control associated with a switch fabric

In some embodiments, an apparatus includes a flow control module configured to receive a first data packet from an output queue of a stage of a multi-stage switch at a first rate when an available capacity of the output queue crosses a first threshold. The flow control module is configured... Juniper Networks Inc

08/31/17 / #20170250904

Split-horizon packet forwarding in a multi-home pbb-evpn network

Techniques are described to provide split-horizon packet forwarding so as to ensure that packets from the customer network that are injected into the provider backbone bridging Ethernet Virtual Private Network (PBB-EVPN) by one of the provider edge (PE) devices of the multi-homed Ethernet segment are not forwarded back toward the... Juniper Networks Inc

08/31/17 / #20170250995

Obtaining suspect objects based on detecting suspicious activity

A device may detect a suspicious activity. The device may automatically obtain a suspect object from a client device that is associated with the suspicious activity and based on detecting the suspicious activity. The suspect object may be an object that is possibly associated with the suspicious activity. The device... Juniper Networks Inc

08/31/17 / #20170251038

Failure detection manager

A network device is configured to receive information regarding a group of content streams and determine a buffer size for each of the content streams. The network device is further configured to receive the content streams from one or more encoding devices. The network device is further configured to buffer... Juniper Networks Inc

08/24/17 / #20170244621

Lsp ping and traceroute for bypass tunnels

A method performed by a network device may include assembling a multiprotocol label switching (MPLS) echo request, the echo request including an instruction for a transit node to forward the echo request via a bypass path associated with the transit node, and an instruction for an egress node to send... Juniper Networks Inc

08/17/17 / #20170237661

Processing packets by a network device

A method and apparatus for performing a lookup in a switching device of a packet switched network where the lookup includes a plurality of distinct operations each of which returns a result that includes a pointer to a next operation in a sequence of operations for the lookup. The method... Juniper Networks Inc

08/10/17 / #20170228542

Multi-file malware analysis

A device may identify a plurality of files for a multi-file malware analysis. The device may execute the plurality of files in a malware testing environment. The device may monitor the malware testing environment for behavior indicative of malware. The device may detect the behavior indicative of malware. The device... Juniper Networks Inc

07/13/17 / #20170201389

System for avoiding traffic flooding due to asymmetric mac learning and achieving predictable convergence for pbb-evpn active-active redundancy

In one example, a method includes performing L2 learning of a C-MAC address included in a first L2 data message by a first provider edge (PE) router included in an Ethernet Segment of a Provider-Backbone Bridging Ethernet Virtual Private Network (PBB-EVPN); sending to a second PE router within the Ethernet... Juniper Networks Inc

07/13/17 / #20170200026

Apparatus, system, and detecting theft of network devices

The disclosed apparatus may include a secure storage device that securely stores an initial geographic location of a network device that facilitates network traffic within a network. This apparatus may also include a processing unit communicatively coupled to the secure storage device. The processing unit may determine a current geographic... Juniper Networks Inc

07/13/17 / #20170201979

Methods and controlling wireless access points

In some embodiments, an apparatus comprises of a first Control And Provisioning of Wireless Access Points (CAPWAP) module implemented in at least one of a memory or a processing device that is configured to be designated as a backup control module for a wireless access point during a first time... Juniper Networks Inc

07/06/17 / #20170195135

Traffic black holing avoidance and fast convergence for active-active pbb-evpn redundancy

In one example, a method includes configuring a first provider edge (PE) router of a Provider Backbone Bridging (PBB) Ethernet Virtual Private Network (EVPN) to join an Ethernet Segment in active-active mode with at least a second PE router that is operating as a designated forwarder for the Ethernet Segment;... Juniper Networks Inc

07/06/17 / #20170195199

Oam mechanisms for evpn active-active services

A method and network device to execute an Ethernet Virtual Private Network (EVPN) protocol to configure the network device to participate as one of a plurality of customer edge (CE) routers that provide an active-active configuration for an Ethernet segment coupling the CE routers to a plurality of provider edge... Juniper Networks Inc

07/06/17 / #20170195209

Reducing false alarms when using network keep-alive messages

Techniques are described to reduce false alarms in network devices utilizing keepalive messaging schemes. In order to potentially avoid false alarms, a transmitting network device adjusts quality of service QOS/TOS settings in keep-alive probe packets that are sent later in a current detection interval such that the keep-alive probe packets... Juniper Networks Inc

07/06/17 / #20170195210

Static route advertisement

A network device operable as a provide edge router is described. The network device comprises one or more processors operably coupled to a memory; a configuration interface configured for execution by the one or more processors to receive configuration data configuring the network device as a provider edge router of... Juniper Networks Inc

07/06/17 / #20170195216

Refresh interval independent fast reroute facility protection tear down messaging

In one example, techniques of this disclosure may enable a point of local repair (PLR) network device to signal availability of link protection or node protection to a merge point (MP) network device and enable a network device to actively determine whether or not it is a merge point router.... Juniper Networks Inc

07/06/17 / #20170195220

Media access control address and internet protocol address binding proxy advertisement for network devices of a network

A device may receive, via a first message, first route information for directing network traffic for a network. The first route information may identify a media access control (MAC) route corresponding to a MAC address associated with a host device connecting to a subnet of the network. The first route... Juniper Networks Inc

07/06/17 / #20170195291

Network session data sharing

In general, techniques for sharing of network session data are described. The techniques may enable security devices to leverage application classification information in a federated manner. An example security device includes a memory and one or more processors. The processor(s) are configured to receive data representative of an application classification... Juniper Networks Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Juniper Networks Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Juniper Networks Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###