1
Stephen R Haddock, Justin N Chueh, Shehzad T Merchant, Andrew H Smith, Michael Yip: Policy based quality of service. Extreme Networks, Blakely Sokoloff Taylor & Zafman, August 15, 2000: US06104700 (575 worldwide citation)

A flexible, policy-based, mechanism for managing, monitoring, and prioritizing traffic within a network and allocating bandwidth to achieve true quality of service (QoS) is provided. According to one aspect of the present invention, a method is provided for managing bandwidth allocation in a network ...


2
Stephen R Haddock, Justin N Chueh, Shehzad T Merchant, Andrew H Smith, Michael Yip: Policy based quality of service. Extreme Networks, Blackely Sokoloff Taylor & Zafman, January 13, 2004: US06678248 (181 worldwide citation)

A flexible, policy-based, mechanism for managing, monitoring, and prioritizing traffic within a network and allocating bandwidth to achieve true quality of service (QoS) is provided. According to one aspect of the present invention, a method is provided for managing bandwidth allocation in a network ...


3
Hui Zhang, Erik de la Iglesia, Miguel Gomez, Liang Liu, Rick K Lowe, Mark Aaron Wallace, Wei Wang: Method of and system for allocating resources to resource requests. Extreme Networks, Blakely Sokoloff Taylor & Zafman, January 22, 2008: US07321926 (150 worldwide citation)

A system and method of allocating a resource to a service request. Servers are virtually assigned through a hierarchy including groups of servers and super groups of the groups of servers. Each service request type is associated with a service index that determines both a super group and a load bala ...


4
Rana Dayal, Donald B Grosser, Michael D Mroz, Daniel L Schweitzer: Methods and systems for hitless switch management module failover and upgrade. Extreme Networks, Jenkins Wilson Taylor & Hunt P A, January 27, 2009: US07483370 (149 worldwide citation)

Methods and systems for hitless switch management module failover and upgrade are disclosed. According to one method, a master switch management module participates in network protocols and performs packet forwarding operations. The master switch management module distributes protocol state and pack ...


5
Manish M Rathi, Vipin K Jain, Shehzad T Merchant, Victor C Lin: Method and system for detecting and preventing access intrusion in a network. Extreme Networks, Blakely Sokoloff Taylor & Zafman, April 22, 2014: US08707432 (144 worldwide citation)

A wireless computer network includes components cooperating together to prevent access intrusions by detecting unauthorized devices connected to the network, disabling the network connections to the devices, and then physically locating the devices. The network can detect both unauthorized client st ...


6
Shehzad T Merchant, Manish M Rathi, Victor C Lin, Vipin K Jain, Jia Ru Li, Amit K Maitra, Matthew R Peters, Derek H Pitcher, Balaji Srinivasan: Unified, configurable, adaptive, network architecture. Extreme Networks, Howrey, December 18, 2007: US07310664 (141 worldwide citation)

A network switch having a unified, adaptive management paradigm for wireless network devices is disclosed. The switch includes configurable ports for connecting devices. A software application running on the switch allows a network administrator to selectively configure each port to support either a ...


7
Jean Walrand, Ayman Fawaz, Rajarshi Gupta: Provisional IP-aware virtual paths over networks. Extreme Networks, Blakely Sokoloff Taylor & Zafman, May 16, 2006: US07046665 (138 worldwide citation)

In accordance with the invention, a system and method for providing QoS to packets formatted in accordance with one protocol (e.g., IP or Ethernet) carried over networks that are originally designed to be used with another protocol (e.g., ATM, WDM, or TDM). In one embodiment of the invention, such a ...


8
Michael Yip, Sunil P Shah, Michelle M Ragonese: Ethernet automatic protection switching. Extreme Networks, Blakely Sokoloff Taylor & Zafman, July 20, 2004: US06766482 (119 worldwide citation)

A method and apparatus is provided for automatic protection switching in a ring network by creating a protection domain having a control vlan and protected data vlans and designating a master node and transit nodes connected by a primary port and a secondary port. The master node blocks the secondar ...


9
Manish Rathi, Tim Aiken: Method and apparatus for management of configuration in a network. Extreme Networks, Blakely Sokoloff Taylor & Zafman, August 16, 2005: US06930985 (102 worldwide citation)

A method for configuring and managing network elements comprising receiving a request at a network element to monitor at least one object on the network element; logging information by the network element in response to a change in value of the object; transmitting an indication from the network ele ...


10
Xuguang Yang, Prakash Kashyap: Method and system for inter-domain loop protection using a hierarchy of loop resolving protocols. Extreme Networks, Blakely Sokoloff Taylor & Zafman, October 24, 2006: US07126923 (97 worldwide citation)

A method and system is provided for inter-domain loop protection using a hierarchy of loop resolving protocols. The method includes receiving messages from inter-domain switches. The inter-domain switches belong to a plurality of loop-free network topology domains. A logical domain is abstracted tha ...