-
公开(公告)号:US11902404B1
公开(公告)日:2024-02-13
申请号:US17837406
申请日:2022-06-10
Applicant: Juniper Networks, Inc.
Inventor: Amit Arora , Erin C. MacNeil , Harmeet Singh , Sairam Neelam
IPC: H04L47/62 , H04L45/74 , H04W28/10 , H04W28/02 , H04L69/163 , H04L69/22 , H04L47/193 , H04L47/28 , H04L43/04
CPC classification number: H04L69/163 , H04L43/04 , H04L47/193 , H04L47/28 , H04L69/22
Abstract: A network device may monitor a TCP session with another network device, and may identify ingress and/or egress packets, a TCP header, and a socket of the TCP session. The network device may inspect the ingress and/or egress packets, the TCP header, and the socket to identify a zero window advertisement, details of a last quantity of packets sent or received, synchronize, finish, or reset packets sent or received, negotiated TCP options, or buffer space utilization, and may temporarily record identified data based on the inspection. The network device may detect a TCP session flap when a finish packet or a reset packet is identified and recorded, and may store, in a dead TCP session list, the identified data based on the TCP session flap being detected.
-
公开(公告)号:US11463914B2
公开(公告)日:2022-10-04
申请号:US17031802
申请日:2020-09-24
Applicant: Juniper Networks, Inc.
Inventor: Digambar Yashwant Sawant , Bhagat Singh Mariappan , Harmeet Singh , Rahul Chandra Khali , Prateek Halwe
Abstract: A wireless access point comprises a memory; and one or more processors operably coupled to the memory configured to: receive a first packet for an application; configure an initial packet flow for the application including a first forwarding action to send traffic for the application via a tunnel path; learn the application of the first packet; generate, based on a policy of the application, an entry in an application server address cache specifying an address of the application server and a second forwarding action to send traffic for the application via a local breakout path; receive a second packet for the application; and configure, in response to determining that a destination address of the second packet matches the entry in the application server address cache, a subsequent packet flow for the application including the second forwarding action to send traffic for the application via the local breakout path.
-
公开(公告)号:US20210397536A1
公开(公告)日:2021-12-23
申请号:US17247903
申请日:2020-12-29
Applicant: Juniper Networks, Inc.
Inventor: Prateek Halwe , Amit Arora , Harmeet Singh , Rahul Chandra Khali
Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.
-
公开(公告)号:US11950139B2
公开(公告)日:2024-04-02
申请号:US17821904
申请日:2022-08-24
Applicant: Juniper Networks, Inc.
Inventor: Digambar Yashwant Sawant , Bhagat Singh Mariappan , Harmeet Singh , Rahul Chandra Khali , Prateek Halwe
Abstract: A wireless access point comprises a memory; and one or more processors operably coupled to the memory configured to: receive a first packet for an application; configure an initial packet flow for the application including a first forwarding action to send traffic for the application via a tunnel path; learn the application of the first packet; generate, based on a policy of the application, an entry in an application server address cache specifying an address of the application server and a second forwarding action to send traffic for the application via a local breakout path; receive a second packet for the application; and configure, in response to determining that a destination address of the second packet matches the entry in the application server address cache, a subsequent packet flow for the application including the second forwarding action to send traffic for the application via the local breakout path.
-
5.
公开(公告)号:US11886304B2
公开(公告)日:2024-01-30
申请号:US17837355
申请日:2022-06-22
Applicant: Juniper Networks, Inc.
Inventor: Amit Arora , Erin C. MacNeil , Harmeet Singh , Sairam Neelam
CPC classification number: G06F11/1464 , G06F11/0757 , G06F11/1451
Abstract: A network device may execute a master application communicating with another network device via a session, and may receive, by a backup application replication layer, a replicated data object. The backup application replication layer may provide the replicated data object to a backup application, and may calculate a time delta between when the replicated data object is received and when the replicated data object arrives at the backup application. The backup application replication layer may determine whether the time delta exceeds a first threshold or a second threshold, and may generate a session flag based on the time delta exceeding the first threshold or the second threshold. The backup application replication layer may provide the session flag to a master application replication layer and to the backup application, and the master application replication layer may provide details of the session to the master application and the backup application.
-
公开(公告)号:US11960382B2
公开(公告)日:2024-04-16
申请号:US18056834
申请日:2022-11-18
Applicant: Juniper Networks, Inc.
Inventor: Prateek Halwe , Amit Arora , Harmeet Singh , Rahul Chandra Khali
CPC classification number: G06F11/366 , G06F11/1438 , G06F11/3037 , G06F11/3075 , G06F11/3648
Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.
-
公开(公告)号:US20230086373A1
公开(公告)日:2023-03-23
申请号:US18056834
申请日:2022-11-18
Applicant: Juniper Networks, Inc.
Inventor: Prateek Halwe , Amit Arora , Harmeet Singh , Rahul Chandra Khali
Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.
-
公开(公告)号:US12184535B1
公开(公告)日:2024-12-31
申请号:US18112886
申请日:2023-02-22
Applicant: Juniper Networks, Inc.
Inventor: Amit Arora , Erin C. MacNeil , Harmeet Singh , Sairam Neelam
IPC: G06F15/173 , G06F15/16 , H04L45/02 , H04L45/44 , H04L67/145
Abstract: A network device may establish, via a routing protocol daemon (RPD) of the network device, border gateway protocol (BGP) sockets with peer network devices and may establish a socket between the RPD and a periodic packet management daemon (PPMD) of the network device. The network device may provide file descriptors of the BGP sockets from the RPD to the PPMD, via the socket, and may provide, from the RPD and via the BGP sockets, non-keep alive protocol data units (PDUs) to the peer network devices. The network device may provide, from the PPMD and via the BGP sockets, keep alive PDUs to the peer network devices.
-
公开(公告)号:US11750441B1
公开(公告)日:2023-09-05
申请号:US16125369
申请日:2018-09-07
Applicant: Juniper Networks, Inc.
Inventor: Reji Thomas , Harmeet Singh , Amit Arora , Jimmy Jose , Sairam Neelam , Vinod Arumugham Chettiar
IPC: H04L41/0677 , H04L67/145 , H04L69/16 , H04L61/5007
CPC classification number: H04L41/0677 , H04L61/5007 , H04L67/145 , H04L69/16
Abstract: A method and network device for detecting a TCP socket failure is described. A network device may be configured to detect a failure of a link between a first node and a second node, determine one or more transmission control protocol (TCP) sockets of a plurality of TCP sockets on the first node that are communicating over the link between the first node and the second node, write information to a TCP stack for the determined one or more TCP sockets, the information indicating that the determined one or more TCP sockets have an error, and remediate the determined one or more TCP sockets in response to the information.
-
10.
公开(公告)号:US11606719B2
公开(公告)日:2023-03-14
申请号:US17031802
申请日:2020-09-24
Applicant: Juniper Networks, Inc.
Inventor: Digambar Yashwant Sawant , Bhagat Singh Mariappan , Harmeet Singh , Rahul Chandra Khali , Prateek Halwe
Abstract: A wireless access point comprises a memory; and one or more processors operably coupled to the memory configured to: receive a first packet for an application; configure an initial packet flow for the application including a first forwarding action to send traffic for the application via a tunnel path; learn the application of the first packet; generate, based on a policy of the application, an entry in an application server address cache specifying an address of the application server and a second forwarding action to send traffic for the application via a local breakout path; receive a second packet for the application; and configure, in response to determining that a destination address of the second packet matches the entry in the application server address cache, a subsequent packet flow for the application including the second forwarding action to send traffic for the application via the local breakout path.
-
-
-
-
-
-
-
-
-