-
公开(公告)号:US20230231776A1
公开(公告)日:2023-07-20
申请号:US18057019
申请日:2022-11-18
Applicant: Juniper Networks, Inc.
Inventor: Jisheng Wang , Xiaoying Wu , Amin Toghi Eshghi , Prathamesh Dnyanesh Kumkar
IPC: H04L41/22
CPC classification number: H04L41/22
Abstract: A network management system (NMS) comprises one or more processors coupled to memory. The one or more processors of are configured to determine a list of network devices from the plurality of network devices based on an entity type and determine a suggested filter attribute based on the list of network devices and one or more of a user profile, a current state of the plurality of network devices, or a current state of the networking services. The one or more processors are further configured to output, in a user interface, an indication of the suggested filter attribute and, in response to receiving user input representative of a selection of the indication of the suggested filter attribute, determine a filtered list of network devices from the list of network devices using the suggested filter attribute and output, in the user interface, an indication of the filtered list of network devices.
-
62.
公开(公告)号:US20230231762A1
公开(公告)日:2023-07-20
申请号:US17935704
申请日:2022-09-27
Applicant: Juniper Networks, Inc.
Inventor: Jisheng Wang , Xiaoying Wu , Yedunandan Siddalingappa-Vitalapur , Abhiram Madhugiri Shamsundar , Robert J. Friday , Sudheer Matta , Sunalini Sankhavaram , Kush Shah , Randall Frei , Sujai Hajela , Jacob Thomas
IPC: H04L41/0631 , H04L41/0604 , H04L41/22 , H04L41/12
CPC classification number: H04L41/064 , H04L41/0627 , H04L41/22 , H04L41/12
Abstract: A network management system (NMS) is described that provides a granular troubleshooting workflow at an application session level using an application session-specific topology from a client device to a cloud-based application server. During an application session of a cloud-based application, a client device running the application exchanges data through one or more access point (AP) devices, one or more switches at a wired network edge, and one or more network nodes, e.g., switches, routers, and/or gateway devices, to reach a cloud-based application server. For a particular application session, the NMS generates a topology based on network data received from a subset of network devices, e.g., client devices, AP devices, switches, routers, and/or gateways, that were involved in the particular application session over a duration of the particular application session. In this way, the NMS enables backward-looking troubleshooting of the particular application session.
-
公开(公告)号:US20230128098A1
公开(公告)日:2023-04-27
申请号:US17452344
申请日:2021-10-26
Applicant: Juniper Networks, Inc.
Inventor: Kaushik Adesh Agrawal , Jisheng Wang , Greg Schrock
IPC: H04L12/26 , H04L29/08 , H04L12/725
Abstract: Techniques are disclosed for the identification of applications from communication sessions of network traffic between client devices and the generation of application-specific metrics for network traffic associated with the applications. In one example, a router obtains metrics for a plurality of packets. The router determines a session of a plurality of sessions associated with each packet. For each determined session, the router generates metrics for the session from the metrics of the packets associated with the session and determines an application of a plurality of applications associated with the session. For each determined application, the router generates metrics for the application from the metrics of the sessions associated with the application and transmits, to a device, the metrics for the application. In some examples, the router generates the metrics for each application on a per-client, per-next-hop, or per-traffic class basis.
-
公开(公告)号:US11637753B1
公开(公告)日:2023-04-25
申请号:US17452962
申请日:2021-10-29
Applicant: Juniper Networks, Inc.
Inventor: Jisheng Wang , Ruchit Rajkumar Mehta , Kaushik Adesh Agrawal , Patrick Timmons , Patrick J. MeLampy , Michael Baj
IPC: G06F15/173 , H04L41/0893 , H04L41/5009 , H04L41/16
Abstract: An example method includes receiving, by an SD-WAN system, WAN link characterization data for a plurality of WAN links of the SD-WAN system over a time period; and for each site of a plurality of sites of the SD-WAN system, generating, by the SD-WAN system, a local policy for the site, wherein generating the local policy is based on a machine learning model trained with the WAN link characterization data for the plurality of WAN links, and providing the local policy to an SD-WAN edge device of the site.
-
公开(公告)号:US20230069434A1
公开(公告)日:2023-03-02
申请号:US17446601
申请日:2021-08-31
Applicant: Juniper Networks, Inc.
Inventor: Jing Cheng , Jisheng Wang , Kush Shah
Abstract: Techniques are described by which a network management system (NMS) is configured to provide identification of root cause failure through the detection of network scope failures. For example, the NMS comprises one or more processors; and a memory comprising instructions that when executed by the one or more processors cause the one or more processors to: generate a hierarchical attribution graph comprising attributes representing different network scopes at different hierarchical levels; receive network event data, wherein the network event data is indicative of operational behavior of the network, including one or more of successful events or one or more failure events associated with one or more client devices; and apply a machine learning model to the network event data and to a particular network scope in the hierarchical attribution graph to detect whether the particular network scope has failure.
-
公开(公告)号:US20230012609A1
公开(公告)日:2023-01-19
申请号:US17377078
申请日:2021-07-15
Applicant: Juniper Networks, Inc.
Inventor: Jisheng Wang , Charl Matthee , Randall Frei , Jie C. Jiang
IPC: H04L12/26
Abstract: Systems, devices and techniques for an adaptive application-specific probing scheme are disclosed. An example network device includes memory configured to store a network address and probe protocol usable for probing a first network device associated with a source of an application, and one or more processors configured to determine a network address and probe protocol usable for probing the first network device, wherein the first network device comprises a server that is responsive to the probing, the server executing the application for the data flow, or a closest network device, to the server, that is responsive to the probing. The one or more processors are also configured to send to a second network device at a location serviced by the application, a message specifying the network address and probe protocol usable for probing the first network device.
-
公开(公告)号:US20220321379A1
公开(公告)日:2022-10-06
申请号:US17808226
申请日:2022-06-22
Applicant: Juniper Networks, Inc.
Inventor: Jisheng Wang
IPC: H04L12/46 , G06N20/00 , H04L49/354
Abstract: Disclosed are methods for detecting misconfigured VLANs. In some embodiments, traffic on a VLAN across multiple access points is categorized. Traffic on the VLAN at a single access point is then also categorized. The categorization of the VLAN traffic at the single access point can be in response to, for example, communication errors or other conditions. The two categorizations are then compared to determine if the VLAN traffic at the AP is consistent with the VLAN traffic across a network (e.g., an enterprise network). If the VLAN traffic at the AP is generally consistent with that across the network, this may indicate that a downstream network component, such as a switch or router, is misconfigured. Thus, some embodiments programmatically reconfigure the downstream component to forward traffic for the VLAN.
-
公开(公告)号:US11388022B2
公开(公告)日:2022-07-12
申请号:US16782568
申请日:2020-02-05
Applicant: Juniper Networks, Inc.
Inventor: Jisheng Wang
IPC: H04L12/46 , G06N20/00 , H04L49/354
Abstract: Disclosed are methods for detecting misconfigured VLANs. In some embodiments, traffic on a VLAN across multiple access points is categorized. Traffic on the VLAN at a single access point is then also categorized. The categorization of the VLAN traffic at the single access point can be in response to, for example, communication errors or other conditions. The two categorizations are then compared to determine if the VLAN traffic at the AP is consistent with the VLAN traffic across a network (e.g., an enterprise network). If the VLAN traffic at the AP is generally consistent with that across the network, this may indicate that a downstream network component, such as a switch or router, is misconfigured. Thus, some embodiments programmatically reconfigure the downstream component to forward traffic for the VLAN.
-
公开(公告)号:US20220075679A1
公开(公告)日:2022-03-10
申请号:US17448108
申请日:2021-09-20
Applicant: Juniper Networks, Inc.
Inventor: Jisheng Wang , Gaurav Sunil Nandode , Winson Benedict Fernandes
Abstract: The disclosed embodiments provide for identification of a remedial action based on analysis of a system log file. In some example embodiments, messages from the system log file are used as input to generate vectors within a vector space. Portions of the log messages may generate vectors that cluster into a region in the vector space. The region of vector space is associated with one or more remedial actions. The disclosed embodiments are configured, in some example embodiments, to perform the one or more remedial actions when activity in the log file maps to the region of vector space associated with the one or more remedial actions. In some example embodiments, a remedial action can include submitting a problem report to a problem tracking database.
-
公开(公告)号:US11138059B2
公开(公告)日:2021-10-05
申请号:US16583064
申请日:2019-09-25
Applicant: Juniper Networks, Inc.
Inventor: Jisheng Wang , Gaurav Sunil Nandode , Winson Benedict Fernandes
Abstract: The disclosed embodiments provide for identification of a remedial action based on analysis of a system log file. In some example embodiments, messages from the system log file are used as input to generate vectors within a vector space. Portions of the log messages may generate vectors that cluster into a region in the vector space. The region of vector space is associated with one or more remedial actions. The disclosed embodiments are configured, in some example embodiments, to perform the one or more remedial actions when activity in the log file maps to the region of vector space associated with the one or more remedial actions. In some example embodiments, a remedial action can include submitting a problem report to a problem tracking database.
-
-
-
-
-
-
-
-
-