1
Stephen R Haddock, Justin N Chueh, Shehzad T Merchant, Andrew H Smith, Michael Yip: Policy based quality of service. Extreme Networks, Blakely Sokoloff Taylor & Zafman, August 15, 2000: US06104700 (575 worldwide citation)

A flexible, policy-based, mechanism for managing, monitoring, and prioritizing traffic within a network and allocating bandwidth to achieve true quality of service (QoS) is provided. According to one aspect of the present invention, a method is provided for managing bandwidth allocation in a network ...


2
Stephen R Haddock, Justin N Chueh, Shehzad T Merchant, Andrew H Smith, Michael Yip: Policy based quality of service. Extreme Networks, Blackely Sokoloff Taylor & Zafman, January 13, 2004: US06678248 (181 worldwide citation)

A flexible, policy-based, mechanism for managing, monitoring, and prioritizing traffic within a network and allocating bandwidth to achieve true quality of service (QoS) is provided. According to one aspect of the present invention, a method is provided for managing bandwidth allocation in a network ...


3
Manish M Rathi, Vipin K Jain, Shehzad T Merchant, Victor C Lin: Method and system for detecting and preventing access intrusion in a network. Extreme Networks, Blakely Sokoloff Taylor & Zafman, April 22, 2014: US08707432 (144 worldwide citation)

A wireless computer network includes components cooperating together to prevent access intrusions by detecting unauthorized devices connected to the network, disabling the network connections to the devices, and then physically locating the devices. The network can detect both unauthorized client st ...


4
Shehzad T Merchant, Manish M Rathi, Victor C Lin, Vipin K Jain, Jia Ru Li, Amit K Maitra, Matthew R Peters, Derek H Pitcher, Balaji Srinivasan: Unified, configurable, adaptive, network architecture. Extreme Networks, Howrey, December 18, 2007: US07310664 (141 worldwide citation)

A network switch having a unified, adaptive management paradigm for wireless network devices is disclosed. The switch includes configurable ports for connecting devices. A software application running on the switch allows a network administrator to selectively configure each port to support either a ...


5
Stephen R Haddock, Justin N Chueh, Shehzad T Merchant, Andrew H Smith, Michael Yip: Policy based quality of service. Extreme Networks, Blakely Sokoloff Taylor & Zafman, February 22, 2005: US06859438 (89 worldwide citation)

A flexible, policy-based, mechanism for managing, monitoring, and prioritizing traffic within a network and allocating bandwidth to achieve true quality of service (QoS) is provided. According to one aspect of the present invention, a method is provided for managing bandwidth allocation in a network ...


6
Michael Yip, Shehzad T Merchant, Kenneth T Yin: Method and system for VLAN aggregation. Extreme Networks, Blakely Sokoloff Taylor & Zafman, July 5, 2005: US06914905 (56 worldwide citation)

A method and system for an aggregated virtual local area network (VLAN) architecture in which several VLANs in a network share the same default router address and subnet mask, but remain isolated from one another's network traffic. Instead of the traditional method of assigning one subnet to a VLAN, ...


7
Shehzad T Merchant, Brian W Bailey: Method and system for a virtual local area network to span multiple loop free network topology domains. Extreme Networks, Blakely Sokoloff Taylor & Zafman, December 26, 2006: US07154861 (34 worldwide citation)

A method and system is provided for a virtual local network to span multiple loop free network topology domains. According to one aspect of the invention, a network contains at least two loop free network topology domains and a virtual local area network spanning at least a portion of each of the tw ...


8
Manish M Rathi, Vipin K Jain, Shehzad T Merchant, Victor C Lin: Method and system for detecting and preventing access intrusion in a network. Extreme Networks, Blakely Sokoloff Taylor & Zafman, October 26, 2010: US07823199 (29 worldwide citation)

A wireless computer network includes components cooperating together to prevent access intrusions by detecting unauthorized devices connected to the network, disabling the network connections to the devices, and then physically locating the devices. The network can detect both unauthorized client st ...


9
Shehzad T Merchant, Derek H Pitcher, Victor C Lin, Manish M Rathi, Jia Ru Li, Matthew R Peters, Balaji Srinivasan, Vipin K Jain, Amit K Maitra: Apparatus, method and system for improving network security. Extreme Networks, Howrey, August 18, 2009: US07577996 (13 worldwide citation)

Devices, systems and related methods are disclosed for improving operational security of a network and/or network devices, such as wireless access points (APs). In the disclosed systems, a network device is not fully operational until it is attached to a network and downloads sensitive information. ...


10
Michael Yip, Shehzad T Merchant, Kenneth T Yin, Eric Knudstrup: Method and system for VLAN aggregation. Extreme Networks, Blakely Sokoloff Taylor & Zafman, September 7, 2010: US07792058 (12 worldwide citation)

A method and system for an aggregated virtual local area network (VLAN) architecture in which several VLANs in a network share the same default router address and subnet mask, but remain isolated from one another's network traffic. Instead of the traditional method of assigning one subnet to a VLAN, ...