-
公开(公告)号:US20160011862A1
公开(公告)日:2016-01-14
申请号:US14865764
申请日:2015-09-25
Applicant: Juniper Networks, Inc.
Inventor: Sandip Shah , Surinder Singh
CPC classification number: G06F8/63 , G06F8/65 , G06F8/658 , G06F17/30268 , H04L41/0853 , H04L41/0866 , H04L41/0873 , H04L63/123
Abstract: In some embodiments, an apparatus includes a network device configured to receive an anomaly database of a first image that stores a set of differences between the first image and a base image. The network device is configured to compare the anomaly database of the first image with an anomaly database of a second image storing a set of differences between the second image and the base image to determine if the first and second images include at least one incompatible critical feature or incompatible non-critical feature. The network device is configured to send a signal associated with a first action if the first and second images include the at least one incompatible critical feature. The network device is configured to send a signal associated with a second action different from the first action if the first and second images include the at least one incompatible non-critical feature.
-
公开(公告)号:US09787529B1
公开(公告)日:2017-10-10
申请号:US14599453
申请日:2015-01-16
Applicant: Juniper Networks, Inc.
Inventor: Usha Sharma , Surinder Singh
CPC classification number: H04L41/0226 , H04L67/00 , H04L69/162
Abstract: The disclosed method for tunneling socket calls across operating systems may include (1) intercepting a socket call issued by an application running on a first operating system, (2) determining that the socket call is directed to a network interface that is (A) accessible to a second operating system installed on a virtual machine running on the first operating system and (B) inaccessible to the first operating system and then, in response to determining that the socket call is directed to the network interface, (3) tunneling the socket call to the second operating system installed on the virtual machine, and (4) executing the socket call within the second operating system to initiate at least one networking action with respect to the network interface on behalf of the application. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US09444768B1
公开(公告)日:2016-09-13
申请号:US13750926
申请日:2013-01-25
Applicant: Juniper Networks, Inc.
Inventor: Sriram Raghunathan , Yong Luo , Wai Leung Chan , Surinder Singh , Abbas Sakarwala , Harmeet Sahni , Jian Cui
IPC: H04L12/931 , H04L12/741 , H04L12/28 , H04L12/773 , H04L12/721 , H04L12/933 , H04L12/947
CPC classification number: H04L49/40 , H04L12/2896 , H04L45/44 , H04L45/58 , H04L45/60 , H04L45/66 , H04L45/68 , H04L45/745 , H04L49/15 , H04L49/25 , H04L49/70
Abstract: A multi-router system is described in which hardware and software components of one or more standalone routers can be partitioned into multiple logical routers. The multiple logical routers are isolated from each other in terms of routing and forwarding functions yet allow network interfaces to be shared between the logical routers. Moreover, different logical routers can share network interfaces without impacting the ability of any of the logical routers to be independently scaled to meet the bandwidth demands of the customers serviced by the logical router.
-
公开(公告)号:US09823916B2
公开(公告)日:2017-11-21
申请号:US14865764
申请日:2015-09-25
Applicant: Juniper Networks, Inc.
Inventor: Sandip Shah , Surinder Singh
CPC classification number: G06F8/63 , G06F8/65 , G06F8/658 , G06F17/30268 , H04L41/0853 , H04L41/0866 , H04L41/0873 , H04L63/123
Abstract: In some embodiments, an apparatus includes a network device configured to receive an anomaly database of a first image that stores a set of differences between the first image and a base image. The network device is configured to compare the anomaly database of the first image with an anomaly database of a second image storing a set of differences between the second image and the base image to determine if the first and second images include at least one incompatible critical feature or incompatible non-critical feature. The network device is configured to send a signal associated with a first action if the first and second images include the at least one incompatible critical feature. The network device is configured to send a signal associated with a second action different from the first action if the first and second images include the at least one incompatible non-critical feature.
-
-
-