-
11.
公开(公告)号:US20240137264A1
公开(公告)日:2024-04-25
申请号:US18399987
申请日:2023-12-29
Applicant: Juniper Networks, Inc.
Inventor: Jisheng Wang , Xiaoying Wu , Yedunandan Siddalingappa-Vitalapur , Abhiram Madhugiri Shamsundar , Robert J. Friday , Sudheer Matta , Sunalini Sankhavaram , Kush Shah , Randall Frei , Sujai Hajela , Jacob Thomas
IPC: H04L41/0631 , H04L41/0604 , H04L41/12 , H04L41/22
CPC classification number: H04L41/064 , H04L41/0627 , H04L41/12 , H04L41/22
Abstract: A network management system (NMS) is described that provides a granular troubleshooting workflow at an application session level using an application session-specific topology from a client device to a cloud-based application server. During an application session of a cloud-based application, a client device running the application exchanges data through one or more access point (AP) devices, one or more switches at a wired network edge, and one or more network nodes, e.g., switches, routers, and/or gateway devices, to reach a cloud-based application server. For a particular application session, the NMS generates a topology based on network data received from a subset of network devices, e.g., client devices, AP devices, switches, routers, and/or gateways, that were involved in the particular application session over a duration of the particular application session. In this way, the NMS enables backward-looking troubleshooting of the particular application session.
-
公开(公告)号:US20240073117A1
公开(公告)日:2024-02-29
申请号:US18501190
申请日:2023-11-03
Applicant: Juniper Networks, Inc.
Inventor: Jisheng Wang , Charl Matthee , Randall Frei , Jie C. Jiang
IPC: H04L43/12 , H04L43/026 , H04L43/028
CPC classification number: H04L43/12 , H04L43/026 , H04L43/028
Abstract: Systems, devices and techniques for an adaptive application-specific probing scheme are disclosed. An example network device includes memory configured to store a network address and probe protocol usable for probing a first network device associated with a source of an application, and one or more processors configured to determine a network address and probe protocol usable for probing the first network device, wherein the first network device comprises a server that is responsive to the probing, the server executing the application for the data flow, or a closest network device, to the server, that is responsive to the probing. The one or more processors are also configured to send to a second network device at a location serviced by the application, a message specifying the network address and probe protocol usable for probing the first network device.
-
公开(公告)号:US11777802B2
公开(公告)日:2023-10-03
申请号:US17457602
申请日:2021-12-03
Applicant: Juniper Networks, Inc.
Inventor: Osman Sarood , Randall Frei , Robert J. Friday , Keh-Ming Luoh
IPC: H04L12/70 , H04L41/0806 , H04W48/08 , H04L67/12 , H04L41/082 , G06F8/65 , H04L43/0817 , H04L43/12 , H04L9/40
CPC classification number: H04L41/082 , G06F8/65 , H04L43/0817 , H04L43/12 , H04L63/02
Abstract: The disclosed embodiments provide for rules-based deployment of software installations. In some aspects, operational parameters for a computer system are monitored over time to generate a historical database of values for the operational parameters. The computer system may include multiple instances of a software installation. A portion of the multiple instances is updated with a new version of software. The operational parameters are then monitored to quantify whether the new version results in an improvement or degradation of performance of the computer system. The improvement or degradation is based on comparing values of the operational parameters after deployment to their historical values. Depending on the evaluation of the operational parameters after the installation, the installation may be rolled back if a degradation is indicated. Otherwise, the new software version may be propagated to additional installation instances.
-
公开(公告)号:US20230308374A1
公开(公告)日:2023-09-28
申请号:US17812676
申请日:2022-07-14
Applicant: Juniper Networks, Inc.
Inventor: Jisheng Wang , Jing Cheng , Abhiram Madhugiri Shamsundar , Randall Frei
IPC: H04L43/0876 , H04L41/0631 , H04L45/48 , H04L43/062
CPC classification number: H04L43/0876 , H04L41/0631 , H04L45/48 , H04L43/062
Abstract: A method includes receiving, by a network management system, network data from a plurality of network devices configured to provide a network at a site; receiving, by the processing circuitry, user impact data from a plurality of client devices that access the network at the site; determining, based on the network data, a pattern of one or more network events occurring over time; correlating in time the pattern of the one or more network events to an adverse user impact event indicated by the user impact data received from the plurality of client devices; and determining, in response to the correlating, an instance of overwhelming network traffic having an adverse user impact. In some examples, the network data includes network traffic impact data, such as a number of packets dropped at a switch port due to congestion.
-
公开(公告)号:US20230047635A1
公开(公告)日:2023-02-16
申请号:US17644984
申请日:2021-12-17
Applicant: Juniper Networks, Inc.
Inventor: Kevin Friday , Randall Frei , Nagarjun Srinivasan , Sunalini Sankhavaram
IPC: H04W48/08 , H04W48/16 , H04B17/318 , H04W4/02
Abstract: Techniques are described by which a network management system (NMS) is configured to generate and monitor an RSSI-based proximity zone for a wireless network using a user interface (UI). The NMS may generate a UI comprising UI elements representing access point (AP) devices configured to provide a wireless network at a site; receive, at the user interface, an indication of a user input selecting one or more UI elements representing selected AP devices; establish a proximity zone for each of the selected AP devices based on an RSSI threshold value; receive network data comprising proximity information of a client device relative to the selected AP devices; generate, based on proximity assessments using the proximity information and the RSSI threshold value of the proximity zone, one or more proximity events indicating the client device relation to the proximity zone; and invoke, based on the proximity events, one or more actions.
-
公开(公告)号:US20220094592A1
公开(公告)日:2022-03-24
申请号:US17457602
申请日:2021-12-03
Applicant: Juniper Networks, Inc.
Inventor: Osman Sarood , Randall Frei , Robert J. Friday , Keh-Ming Luoh
Abstract: The disclosed embodiments provide for rules-based deployment of software installations. In some aspects, operational parameters for a computer system are monitored over time to generate a historical database of values for the operational parameters. The computer system may include multiple instances of a software installation. A portion of the multiple instances is updated with a new version of software. The operational parameters are then monitored to quantify whether the new version results in an improvement or degradation of performance of the computer system. The improvement or degradation is based on comparing values of the operational parameters after deployment to their historical values. Depending on the evaluation of the operational parameters after the installation, the installation may be rolled back if a degradation is indicated. Otherwise, the new software version may be propagated to additional installation instances.
-
17.
公开(公告)号:US11051169B2
公开(公告)日:2021-06-29
申请号:US15679128
申请日:2017-08-16
Applicant: Juniper Networks, Inc.
Inventor: Randall Frei , Sujai Hajela , Guy Goldstone , Nicolas Dade , Linker Cheng
Abstract: Methods and apparatus for controlling access to and/or forwarding of communicated information, e.g. traffic, in a wireless communication system are described. The key, e.g., PSK, used to secure data that is transmitted to an access point for communication to a destination device is taken into consideration when deciding whether or not to provide the destination device access to the communicated content. The decision of whether or not to provide the destination device access to a communication may involve deciding whether or not to forward the received data to another device, e.g., another access point, for delivery to the destination device and/or may involve deciding whether or not to transmit the data to the destination device. If the destination device is not associated with, e.g., does not have access to and/or authorization to use, the key used to secure the received data, the data is not communicated to the destination device.
-
公开(公告)号:US12058535B2
公开(公告)日:2024-08-06
申请号:US17664201
申请日:2022-05-19
Applicant: Juniper Networks, Inc.
Inventor: Robert J. Friday , Neal Dante Castagnoli , Randall Frei
Abstract: Methods and apparatus for using beacon signals are described. One or more sectorized base stations are used in some embodiments to transmit beacon signals into zones, e.g., each zone being at least partially covered by one or more beacon signals. Use of sectorized base stations allows a single base station, e.g., a Bluetooth or other base station capable of transmitting beacon signals, to cover a number of different zones avoiding the need for multiple different beacon transmitters at different locations to establish different beacon coverage areas. Sectorization of a Bluetooth base station and the ability to remotely or locally configure the base station allows for great flexibility to use beacon signals in stores or other locations without the need for numerous individual battery powered beacon transmitters at floor or display level.
-
公开(公告)号:US12047863B2
公开(公告)日:2024-07-23
申请号:US18073380
申请日:2022-12-01
Applicant: Juniper Networks, Inc.
Inventor: Robert J. Friday , Neal Dante Castagnoli , Randall Frei
CPC classification number: H04W40/244 , H04B17/318 , H04W4/029 , H04W64/00 , H04W64/003 , H04W48/12 , H04W88/02
Abstract: Methods and apparatus relating to use of actual and/or virtual beacons are described. Virtual beacons are virtual in that an actual beacon need not be transmitted but a rather a virtual beacon transmitter at a desired location maybe considered to transmit virtual beacons. In some embodiments a set of beacon transmitter information for one or more beacons is supplied to devices in a communications system. The beacon transmitter information indicates transmission power and location of actual and virtual beacon transmitters as well as information to be communicated by virtual beacons. Devices with access to beacon information can determine based on the location of a wireless terminal whether the wireless terminal is within coverage area of a virtual beacon and report reception of the virtual beacon to the wireless terminal or a component of the wireless terminal which acts upon receiving an indication of beacon reception.
-
公开(公告)号:US12021722B2
公开(公告)日:2024-06-25
申请号:US17812676
申请日:2022-07-14
Applicant: Juniper Networks, Inc.
Inventor: Jisheng Wang , Jing Cheng , Abhiram Madhugiri Shamsundar , Randall Frei
IPC: H04L43/0876 , H04L41/0631 , H04L43/062 , H04L45/48
CPC classification number: H04L43/0876 , H04L41/0631 , H04L43/062 , H04L45/48
Abstract: A method includes receiving, by a network management system, network data from a plurality of network devices configured to provide a network at a site; receiving, by the processing circuitry, user impact data from a plurality of client devices that access the network at the site; determining, based on the network data, a pattern of one or more network events occurring over time; correlating in time the pattern of the one or more network events to an adverse user impact event indicated by the user impact data received from the plurality of client devices; and determining, in response to the correlating, an instance of overwhelming network traffic having an adverse user impact. In some examples, the network data includes network traffic impact data, such as a number of packets dropped at a switch port due to congestion.
-
-
-
-
-
-
-
-
-