-
公开(公告)号:US12184535B1
公开(公告)日:2024-12-31
申请号:US18112886
申请日:2023-02-22
Applicant: Juniper Networks, Inc.
Inventor: Amit Arora , Erin C. MacNeil , Harmeet Singh , Sairam Neelam
IPC: G06F15/173 , G06F15/16 , H04L45/02 , H04L45/44 , H04L67/145
Abstract: A network device may establish, via a routing protocol daemon (RPD) of the network device, border gateway protocol (BGP) sockets with peer network devices and may establish a socket between the RPD and a periodic packet management daemon (PPMD) of the network device. The network device may provide file descriptors of the BGP sockets from the RPD to the PPMD, via the socket, and may provide, from the RPD and via the BGP sockets, non-keep alive protocol data units (PDUs) to the peer network devices. The network device may provide, from the PPMD and via the BGP sockets, keep alive PDUs to the peer network devices.
-
公开(公告)号:US11750441B1
公开(公告)日:2023-09-05
申请号:US16125369
申请日:2018-09-07
Applicant: Juniper Networks, Inc.
Inventor: Reji Thomas , Harmeet Singh , Amit Arora , Jimmy Jose , Sairam Neelam , Vinod Arumugham Chettiar
IPC: H04L41/0677 , H04L67/145 , H04L69/16 , H04L61/5007
CPC classification number: H04L41/0677 , H04L61/5007 , H04L67/145 , H04L69/16
Abstract: A method and network device for detecting a TCP socket failure is described. A network device may be configured to detect a failure of a link between a first node and a second node, determine one or more transmission control protocol (TCP) sockets of a plurality of TCP sockets on the first node that are communicating over the link between the first node and the second node, write information to a TCP stack for the determined one or more TCP sockets, the information indicating that the determined one or more TCP sockets have an error, and remediate the determined one or more TCP sockets in response to the information.
-
公开(公告)号:US11165684B2
公开(公告)日:2021-11-02
申请号:US16835970
申请日:2020-03-31
Applicant: Juniper Networks, Inc.
Inventor: Vasudevan Navaneetha Krishnan , Raveendra Torvi , Srikanth Venakta Gandiboyina , Ashish Kumar , Srihari Ramachandra Sangli , Jimmy Jose , Amit Arora , Harmeet Singh
IPC: H04L12/66 , H04L12/755 , H04L12/721 , H04L12/46
Abstract: In general, this disclosure describes a network device that checks consistency between routing objects in a routing information base (RIB), a forwarding information base (FIB), and packet forwarding engine (PFE) forwarding tables. A method includes generating a marker that causes a routing protocol daemon, a control plane kernel, and PFEs of a network device to calculate zonal checksums for a plurality of zones using consistency values for each routing object within a RIB, a FIB, and corresponding forwarding tables respectively. The method includes performing a consistency check on the RIB, the FIB, and the forwarding tables to determine whether the routing objects in each of the RIB, the FIB, and the forwarding tables are consistent with each other. The method includes, when the RIB, the FIB, and the forwarding tables are not consistent, performing an action related to at least one of RIB, the FIB, or the forwarding tables.
-
公开(公告)号:US11960382B2
公开(公告)日:2024-04-16
申请号:US18056834
申请日:2022-11-18
Applicant: Juniper Networks, Inc.
Inventor: Prateek Halwe , Amit Arora , Harmeet Singh , Rahul Chandra Khali
CPC classification number: G06F11/366 , G06F11/1438 , G06F11/3037 , G06F11/3075 , G06F11/3648
Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.
-
公开(公告)号:US20230086373A1
公开(公告)日:2023-03-23
申请号:US18056834
申请日:2022-11-18
Applicant: Juniper Networks, Inc.
Inventor: Prateek Halwe , Amit Arora , Harmeet Singh , Rahul Chandra Khali
Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.
-
公开(公告)号:US10742553B1
公开(公告)日:2020-08-11
申请号:US15991694
申请日:2018-05-29
Applicant: Juniper Networks, Inc.
Inventor: Reji Thomas , Jimmy Jose , Amit Arora , Sairam Neelam
IPC: H04L12/28 , H04L12/747 , H04L29/06 , H04L12/741 , H04L29/08
Abstract: A network device may determine a control plane session type associated with a control plane session. The control plane session may be associated with the network device. The network device may determine whether the control plane session type is associated with a forwarding information base (FIB) cache on the network device. The network device may obtain, based on determining that the control plane session type is associated with the FIB cache, forwarding information associated with the control plane session. The forwarding information may be stored in a FIB, associated with the FIB cache, on the network device. The network device may store the forwarding information in the FIB cache and process the control plane session using the forwarding information stored in the FIB cache.
-
公开(公告)号:US10268510B1
公开(公告)日:2019-04-23
申请号:US15263775
申请日:2016-09-13
Applicant: Juniper Networks, Inc.
Inventor: Amit Arora , Srinivasa DS
IPC: G06F9/46 , G06F9/48 , H04L12/751 , G06F9/50
Abstract: A device may receive one or more first objects and one or more second objects to be processed. The device may store, in a first queue, information identifying the one or more first objects, the one or more second objects, and an order in which the one or more first objects and the one or more second objects were received. The device may store, in a second queue, information identifying the one or more first objects based on the one or more first objects being associated with the first priority level. The device may process the one or more first objects and the one or more second objects based on the first queue and the second queue. The device may perform one or more actions based on processing the one or more first objects and the one or more second objects.
-
8.
公开(公告)号:US11886304B2
公开(公告)日:2024-01-30
申请号:US17837355
申请日:2022-06-22
Applicant: Juniper Networks, Inc.
Inventor: Amit Arora , Erin C. MacNeil , Harmeet Singh , Sairam Neelam
CPC classification number: G06F11/1464 , G06F11/0757 , G06F11/1451
Abstract: A network device may execute a master application communicating with another network device via a session, and may receive, by a backup application replication layer, a replicated data object. The backup application replication layer may provide the replicated data object to a backup application, and may calculate a time delta between when the replicated data object is received and when the replicated data object arrives at the backup application. The backup application replication layer may determine whether the time delta exceeds a first threshold or a second threshold, and may generate a session flag based on the time delta exceeding the first threshold or the second threshold. The backup application replication layer may provide the session flag to a master application replication layer and to the backup application, and the master application replication layer may provide details of the session to the master application and the backup application.
-
公开(公告)号:US11902404B1
公开(公告)日:2024-02-13
申请号:US17837406
申请日:2022-06-10
Applicant: Juniper Networks, Inc.
Inventor: Amit Arora , Erin C. MacNeil , Harmeet Singh , Sairam Neelam
IPC: H04L47/62 , H04L45/74 , H04W28/10 , H04W28/02 , H04L69/163 , H04L69/22 , H04L47/193 , H04L47/28 , H04L43/04
CPC classification number: H04L69/163 , H04L43/04 , H04L47/193 , H04L47/28 , H04L69/22
Abstract: A network device may monitor a TCP session with another network device, and may identify ingress and/or egress packets, a TCP header, and a socket of the TCP session. The network device may inspect the ingress and/or egress packets, the TCP header, and the socket to identify a zero window advertisement, details of a last quantity of packets sent or received, synchronize, finish, or reset packets sent or received, negotiated TCP options, or buffer space utilization, and may temporarily record identified data based on the inspection. The network device may detect a TCP session flap when a finish packet or a reset packet is identified and recorded, and may store, in a dead TCP session list, the identified data based on the TCP session flap being detected.
-
公开(公告)号:US20210397536A1
公开(公告)日:2021-12-23
申请号:US17247903
申请日:2020-12-29
Applicant: Juniper Networks, Inc.
Inventor: Prateek Halwe , Amit Arora , Harmeet Singh , Rahul Chandra Khali
Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.
-
-
-
-
-
-
-
-
-