Douglas Gourlay

Douglas Gourlay

Seattle, Washington, United States
8K followers 500+ connections

About

Experience in all aspects of go-to-market and product development at companies from…

Experience

  • Qumulo Graphic

    Qumulo

    Seattle, Washington, United States

  • -

    Global

  • -

    United States

  • -

    Greater San Diego Area

  • -

    Santa Clara, CA

  • -

    Menlo Park, CA

  • -

    Mountain View, California

  • -

    Global

  • -

    San Jose, CA

  • -

  • -

  • -

Volunteer Experience

  • Secretary, Board of Trustees

    Wentworth Military Academy

    - 3 years 9 months

    Education

  • Veterans Village of San Diego Graphic

    Member Board Of Directors

    Veterans Village of San Diego

    - Present 6 years 5 months

    Social Services

Publications

Patents

  • Method and system for virtual machine aware policy management

    Issued US 11075948

    A method and system for maintaining persistent network policies for a virtual machine (VM) that includes determining a name of the VM executing on a first host connected to a first network device; binding the name of the VM to a network policy for the VM on the first network device; acquiring from VM management software, using the name of the VM, a universally unique identifier (UUID) of the VM; associating the UUID to the network policy on the first network device; applying the network policy…

    A method and system for maintaining persistent network policies for a virtual machine (VM) that includes determining a name of the VM executing on a first host connected to a first network device; binding the name of the VM to a network policy for the VM on the first network device; acquiring from VM management software, using the name of the VM, a universally unique identifier (UUID) of the VM; associating the UUID to the network policy on the first network device; applying the network policy for the VM on the first network device; subscribing to receive notifications from the VM management software of changes to the configuration of the VM corresponding to the UUID; receiving notification from the VM management software of a configuration change made to the VM corresponding to the UUID; and updating the network policy of the VM to reflect the configuration change of the VM.

    Other inventors
    See patent
  • System and method of updating a network element

    Issued US 10,545,753

    A method and apparatus of a device that performs a hitless update a boot image of a network element. In this embodiment, the device identifies the network element to update and determines if the network element has redundant paths. If this network element has redundant paths, the device configures the network element to drain data processing of the network element. In addition, the device updates the network element to a new boot image when the data processing of the network element is drained.

    See patent
  • Method and system for monitoring and correcting defects of a network device

    Issued US 10,484,256

    A method for determining that a defect applies to a network device that includes receiving, at a monitoring module, network device information from the network device. The network device information includes state information for the network device and does not include hardware and software version information. The method includes storing, in a network device database, the network device information from the network device and receiving, at the monitoring module, defect information about a…

    A method for determining that a defect applies to a network device that includes receiving, at a monitoring module, network device information from the network device. The network device information includes state information for the network device and does not include hardware and software version information. The method includes storing, in a network device database, the network device information from the network device and receiving, at the monitoring module, defect information about a defect. The defect information includes network device criteria specifying what state information is required for a network device to be affected by the defect. The method includes storing the defect information in a defect database, determining that the defect applies to the network device based on analyzing the network device information and the defect information from their respective databases, and, based on the determination, informing a defect alert recipient that the defect applies to the network device.

    See patent
  • System and method for determining a cause of network congestion

    Issued US 10,262,700

    A method and apparatus of a device that determines a cause and effect of congestion in this device is described. In an exemplary embodiment, the device measures a queue group occupancy of a queue group for a port in the device, where the queue group stores a plurality of packets to be communicated through that port. In addition, the device determines if the measurement indicates a potential congestion of the queue group, where the congestion prevents a packet from being communicated within a…

    A method and apparatus of a device that determines a cause and effect of congestion in this device is described. In an exemplary embodiment, the device measures a queue group occupancy of a queue group for a port in the device, where the queue group stores a plurality of packets to be communicated through that port. In addition, the device determines if the measurement indicates a potential congestion of the queue group, where the congestion prevents a packet from being communicated within a time period. If potential congestion exists on that queue group, the device further gathers information regarding packets to be transmitted through that port. For example, the device can gather statistics packets that are stored in the queue group and/or new enqueue packets.

  • Intent Based Networking: Method and system for network topology enforcement

    Issued US 9,900,217

    A method and system for enforcing design intent onto a network topology. The method includes receiving, at a first port on a first switch, a second role associated with a second switch, where the second switch is connected to the first switch using the first port, and where the first switch is associated with a first role. The method further includes making a first determination, using the first role, the second role, and a network topology policy, that the first switch should not be connected…

    A method and system for enforcing design intent onto a network topology. The method includes receiving, at a first port on a first switch, a second role associated with a second switch, where the second switch is connected to the first switch using the first port, and where the first switch is associated with a first role. The method further includes making a first determination, using the first role, the second role, and a network topology policy, that the first switch should not be connected to the second switch. Sending, in response to the first determination, a first alert to an alert recipient, where the first alert specifies that the first switch is improperly connected to the second switch.

    See patent
  • System and method for determining an effect of network congestion

    Issued US 9,800,485

    A method and apparatus of a device that determines a cause and effect of congestion in this device is described. The device determines an effect of congestion in the device. The device measures a queue group occupancy of a queue group for a port in the device, where the queue group stores a plurality of packets to be communicated through that port. The device further determines if congestion exists on that queue group using the measurement, where the congestion prevents a packet of the…

    A method and apparatus of a device that determines a cause and effect of congestion in this device is described. The device determines an effect of congestion in the device. The device measures a queue group occupancy of a queue group for a port in the device, where the queue group stores a plurality of packets to be communicated through that port. The device further determines if congestion exists on that queue group using the measurement, where the congestion prevents a packet of the plurality of packets from being communicated within a time period. If the congestion exists on that queue group, the device additionally gathers information regarding packets to be transmitted through that port. For example, the device can gather statistics packets that are stored in the queue group and/or new enqueue packets.

  • System and method for determining a cause of network congestion

    Issued US 9,794,141

    A method and apparatus of a device that determines a cause and effect of congestion in this device is described. In an exemplary embodiment, the device measures a queue group occupancy of a queue group for a port in the device, where the queue group stores a plurality of packets to be communicated through that port. In addition, the device determines if the measurement indicates a potential congestion of the queue group, where the congestion prevents a packet from being communicated within a…

    A method and apparatus of a device that determines a cause and effect of congestion in this device is described. In an exemplary embodiment, the device measures a queue group occupancy of a queue group for a port in the device, where the queue group stores a plurality of packets to be communicated through that port. In addition, the device determines if the measurement indicates a potential congestion of the queue group, where the congestion prevents a packet from being communicated within a time period. If potential congestion exists on that queue group, the device further gathers information regarding packets to be transmitted through that port. For example, the device can gather statistics packets that are stored in the queue group and/or new enqueue packets.

  • Method and system for implementing a network policy using a VXLAN network identifier

    Issued US 9729578

    A method and system for applying a network policy in a virtual extensible local area network (VXLAN) environment. The method includes receiving, at a network device, a VXLAN frame that includes a source VXLAN network identifier (VNI). The network device includes a first network policy. The method also includes examining the VXLAN frame to determine the source VNI; obtaining, based on the source VNI, the first network policy; and processing the VXLAN frame based on the application of the first…

    A method and system for applying a network policy in a virtual extensible local area network (VXLAN) environment. The method includes receiving, at a network device, a VXLAN frame that includes a source VXLAN network identifier (VNI). The network device includes a first network policy. The method also includes examining the VXLAN frame to determine the source VNI; obtaining, based on the source VNI, the first network policy; and processing the VXLAN frame based on the application of the first network policy.

    Other inventors
    See patent
  • Method and system for using virtual tunnel end-point registration and virtual network identifiers to manage virtual extensible local area network access

    Issued US 9,705,930

    A method and system for securing a VXLAN environment, including configuring a default network policy, associated with interfaces of the network device, for dropping all VXLAN frames including a VXLAN attribute; obtaining, by the network device, registered VTEP identifiers; determining, using the registered VTEP identifiers, that an interface of the network device is operatively connected to a registered VTEP associated with a registered VTEP identifier; disassociating the default network policy…

    A method and system for securing a VXLAN environment, including configuring a default network policy, associated with interfaces of the network device, for dropping all VXLAN frames including a VXLAN attribute; obtaining, by the network device, registered VTEP identifiers; determining, using the registered VTEP identifiers, that an interface of the network device is operatively connected to a registered VTEP associated with a registered VTEP identifier; disassociating the default network policy from the interface based on the determination; receiving, at the interface, a frame; performing a first verification that the frame is a VXLAN frame by examining the frame to determine that the frame includes the VXLAN attribute; performing a second verification to determine that the VXLAN frame includes a registered VTEP identifier; allowing, based on the first verification and the second verification, the network device to process the VXLAN frame; and processing the VXLAN frame.

  • System and method for device failure notification

    Issued US 9680948

    A method and apparatus of a device that notifies another device of a failed device is described. In an exemplary embodiment, a network element detects that a first device is unavailable, where the network element couples the first device to the second device. In response to detecting that the first device is unavailable, the network element configures a proxy for the first device. The network element additionally receives network data that is destined for the first device, where the second…

    A method and apparatus of a device that notifies another device of a failed device is described. In an exemplary embodiment, a network element detects that a first device is unavailable, where the network element couples the first device to the second device. In response to detecting that the first device is unavailable, the network element configures a proxy for the first device. The network element additionally receives network data that is destined for the first device, where the second device originated the network data. If the proxy can process the network data, the network element transmits a response to the second device from the proxy, where the response indicates that the first device is unavailable, where the first response includes an address of the first device. If the proxy cannot process the network data, the network element drops the network data.

    Other inventors
    See patent
  • Method and system for auto-provisioning network devices in a data center using network device location in network topology

    Issued US 9621511

    A non-transitory computer readable medium includes instructions, which, when executed by a processor, perform a method on a network device. The method includes receiving, from a configuration server, a master configuration script that includes an instruction set, a network topology for network devices, and a dictionary. The dictionary includes network device specific configuration scripts for the network devices. The method also includes executing the instruction set on the network device to…

    A non-transitory computer readable medium includes instructions, which, when executed by a processor, perform a method on a network device. The method includes receiving, from a configuration server, a master configuration script that includes an instruction set, a network topology for network devices, and a dictionary. The dictionary includes network device specific configuration scripts for the network devices. The method also includes executing the instruction set on the network device to configure the network device. Executing the instruction set includes obtaining link layer discovery protocol (LLDP) information for the network device, determining a most common interface (MCI) connected to the network device using the LLDP information, determining a network device identity using the MCI, obtaining, from the dictionary, a network device specific configuration script for the network device based on the network device identity, and executing the network device specific configuration script to configure the network device.

    Other inventors
  • Determining when to switch to a standby intelligent adjunct network device

    Issued US 9621419

    An adjunct network device includes several ports, an uplink interface, and an adjunct forwarding engine coupled to the ports and the uplink interface. A first port is configured to receive a packet, which includes a destination address. The adjunct forwarding engine is configured to send the packet to the uplink interface if the destination address is not associated with any of the ports. The packet is sent to one of the ports if the destination address is associated with the one of the ports.

  • System and method for route health injection using virtual tunnel endpoints

    Issued US 9509603

    A system and method for route health injection using virtual tunnel endpoints. The method includes detecting, by a virtual tunnel endpoint (VTEP), that a new host is connected to the VTEP, where the VTEP is executing on the network device. The method further includes, based on the detecting, generating by the VTEP, a new route for the new host, where the new route is at least a longer match for the new host than currently existing routes for the new host, and providing the new route to a…

    A system and method for route health injection using virtual tunnel endpoints. The method includes detecting, by a virtual tunnel endpoint (VTEP), that a new host is connected to the VTEP, where the VTEP is executing on the network device. The method further includes, based on the detecting, generating by the VTEP, a new route for the new host, where the new route is at least a longer match for the new host than currently existing routes for the new host, and providing the new route to a default gateway for the new host.

    Other inventors
  • Method and system for network device maintenance

    Issued US 9442742

    A method for maintaining a switch. The method includes identifying a first phase to enter in a boot-up process for the switch, where the boot-up process includes a number of phases and the first phase is one of the phases. The method further includes determining a phase exit condition from a first snapshot of the switch, where the first snapshot includes state information for each of the of phases. The method further includes transitioning to the first phase and after transitioning to the first…

    A method for maintaining a switch. The method includes identifying a first phase to enter in a boot-up process for the switch, where the boot-up process includes a number of phases and the first phase is one of the phases. The method further includes determining a phase exit condition from a first snapshot of the switch, where the first snapshot includes state information for each of the of phases. The method further includes transitioning to the first phase and after transitioning to the first phase: starting a first countdown timer for the first phase, and executing, on the switch, a first networking protocol for the first phase. The method further includes determining, in response to the executing, that a first current state of the switch satisfies the phase exit condition, and exiting the first phase, where the first countdown timer is not expired when exiting the first phase.

    Other inventors
  • Method and system for zero touch replacement of network infrastructure

    Issued US 9225595

    A method for configuring a switch. The method includes receiving a configuration request from a switch, where the configuration request includes switch neighbor information (SNI) for the switch and a Media Access Control (MAC) address for the switch, identifying a replacement entry including a second MAC address and the SNI. The method further includes, based on the identification obtaining configuration information associated with the replacement entry, where the configuration information…

    A method for configuring a switch. The method includes receiving a configuration request from a switch, where the configuration request includes switch neighbor information (SNI) for the switch and a Media Access Control (MAC) address for the switch, identifying a replacement entry including a second MAC address and the SNI. The method further includes, based on the identification obtaining configuration information associated with the replacement entry, where the configuration information specifies a configuration of a second switch associated with the second MAC address, generating a configuration script using the configuration information and sending the configuration script to the switch, where the configuration script is executed by the switch to configure the switch.

    Other inventors
  • Network accessibility to any network attached device during reboot and power loss

    Issued US 8964574

    A data communication network (DCN) having a plurality of network devices coupled to the DCN with at least one of the network devices having a "boot once" connectivity manager processor (CMP). The CMP receives its power over the DCN rather than from the power applied to the network devices. The CMP can execute special operating system code and maintain network connectivity even if the network device itself is powered off, is being booted or is otherwise non-functional. The CMP is also coupled to…

    A data communication network (DCN) having a plurality of network devices coupled to the DCN with at least one of the network devices having a "boot once" connectivity manager processor (CMP). The CMP receives its power over the DCN rather than from the power applied to the network devices. The CMP can execute special operating system code and maintain network connectivity even if the network device itself is powered off, is being booted or is otherwise non-functional. The CMP is also coupled to the network device's memory so that it may respond to out-of-band polling requests for device status information from network management tools. With CMP, network administrators can monitor the boot process of network devices, determine that a network device is non-functional due to power loss and can maintain an accurate inventory status of spare network devices that are stored un-powered in a spares closet.

    Other inventors
  • Intelligent adjunct network device

    Issued US 8755382

    An adjunct network device includes several ports, an uplink interface, and an adjunct forwarding engine coupled to the ports and the uplink interface. A first port is configured to receive a packet, which includes a destination address. The adjunct forwarding engine is configured to send the packet to the uplink interface if the destination address is not associated with any of the ports. The packet is sent to one of the ports if the destination address is associated with the one of the ports.

    Other inventors
  • Communication embodiments and low latency path selection in a multi-topology network

    Issued US 8705381

    In one embodiment, a source device (e.g., a VOIP phone) establishes a call connection with a remote device depending on which of multiple network paths provides an acceptable latency (e.g., a lower latency). For example, in response to receiving a request to establish a connection with a remote destination device over a network, the source device (e.g., a caller's phone) obtains multiple service code values. The source device encodes each of multiple data packets to include a unique service…

    In one embodiment, a source device (e.g., a VOIP phone) establishes a call connection with a remote device depending on which of multiple network paths provides an acceptable latency (e.g., a lower latency). For example, in response to receiving a request to establish a connection with a remote destination device over a network, the source device (e.g., a caller's phone) obtains multiple service code values. The source device encodes each of multiple data packets to include a unique service code value for transmission of the messages over different network topologies to a remote destination. Thus, when transmitted, each of the multiple messages follows a different logical network topology of a network as specified by a respective service code value. Based on feedback from a remote device that receives the multiple messages, the source learns a preferred logical network topology of the network for establishing the call connection.

    Other inventors
  • Network Accessibility to any Network Attached Device During Reboot and Power Loss

    Issued US 8,509,097

    A data communication network (DCN) having a plurality of network devices coupled to the DCN with at least one of the network devices having a "boot once" connectivity manager processor (CMP). The CMP receives its power over the DCN rather than from the power applied to the network devices. The CMP can execute special operating system code and maintain network connectivity even if the network device itself is powered off, is being booted or is otherwise non-functional. The CMP is also coupled to…

    A data communication network (DCN) having a plurality of network devices coupled to the DCN with at least one of the network devices having a "boot once" connectivity manager processor (CMP). The CMP receives its power over the DCN rather than from the power applied to the network devices. The CMP can execute special operating system code and maintain network connectivity even if the network device itself is powered off, is being booted or is otherwise non-functional. The CMP is also coupled to the network device's memory so that it may respond to out-of-band polling requests for device status information from network management tools. With CMP, network administrators can monitor the boot process of network devices, determine that a network device is non-functional due to power loss and can maintain an accurate inventory status of spare network devices that are stored un-powered in a spares closet.

    Other inventors
  • Method and system of using counters to monitor a system port buffer

    Issued US 8531960

    Methods and systems for using counters to monitor port buffers are described. In one embodiment, the method includes receiving data packets into a system port buffer having different queues. Also, counters are associated with the queues. Further, the method includes scanning the counters, in which the counters count the number of dropped data packets associated with an individual queue of the different queues. Moreover, the method includes determining if the number of dropped data packets for…

    Methods and systems for using counters to monitor port buffers are described. In one embodiment, the method includes receiving data packets into a system port buffer having different queues. Also, counters are associated with the queues. Further, the method includes scanning the counters, in which the counters count the number of dropped data packets associated with an individual queue of the different queues. Moreover, the method includes determining if the number of dropped data packets for an individual queue is greater than a predetermined number. If the number of dropped data packets is greater than the predetermined number, then a message is generated.

    Other inventors
  • Energy efficient scaling of network appliance service performance

    Issued US 8422365

    Systems and methods for automatically controlling efficient operation of a plurality of network appliances operatively linked and networked to balance network traffic load across a plurality of network appliances that are selectively enabled. The system facilitating performance of the method includes at least a plurality of network appliances operatively connected to a switch and controlled by a network access control module. During system operation, at any given moment in time, the plurality…

    Systems and methods for automatically controlling efficient operation of a plurality of network appliances operatively linked and networked to balance network traffic load across a plurality of network appliances that are selectively enabled. The system facilitating performance of the method includes at least a plurality of network appliances operatively connected to a switch and controlled by a network access control module. During system operation, at any given moment in time, the plurality network appliances operate in one of two modes, fully operational or stand-by. The network appliances of the plurality that are fully operational and thereby consuming full operational power depends upon the network traffic load at any given moment in time. The network appliances functioning in a stand-by mode consume low power levels which are sufficient to allow a network appliance in stand-by mode to receive a command signal directing it to switch from stand-by to full operational mode.

  • Graceful removal and/or insertion of a network element

    Issued US 8315157

    In one embodiment, when a network element is to be removed from or inserted into a network a Graceful Operations Manager schedules graceful shut-down and/or start-up routines for different protocols and/or components on the network element in an optimal order based on dependencies between the different protocols and components. The Graceful Operations Manager communicates with the different components at different stages of their shut-down or start-up process and communicates information on the…

    In one embodiment, when a network element is to be removed from or inserted into a network a Graceful Operations Manager schedules graceful shut-down and/or start-up routines for different protocols and/or components on the network element in an optimal order based on dependencies between the different protocols and components. The Graceful Operations Manager communicates with the different components at different stages of their shut-down or start-up process and communicates information on the standby topology across components and/or protocols to enable the synchronization of the standby topology computation on all components and/or protocols that are affected by the removal or insertion.

    Other inventors
  • Method and System of Using Counters to Monitor a System Port Buffer

    Issued US 7,974,196

    Methods and systems for using counters to monitor port buffers are described. In one embodiment, the method includes receiving data packets into a system port buffer having different queues. Also, counters are associated with the queues. Further, the method includes scanning the counters, in which the counters count the number of dropped data packets associated with an individual queue of the different queues. Moreover, the method includes determining if the number of dropped data packets for…

    Methods and systems for using counters to monitor port buffers are described. In one embodiment, the method includes receiving data packets into a system port buffer having different queues. Also, counters are associated with the queues. Further, the method includes scanning the counters, in which the counters count the number of dropped data packets associated with an individual queue of the different queues. Moreover, the method includes determining if the number of dropped data packets for an individual queue is greater than a predetermined number. If the number of dropped data packets is greater than the predetermined number, then a message is generated.

    Other inventors
    See patent
  • Intelligent Adjunct Network Device (Smart Fabric Extender)

    Issued US 7,889,733

    An adjunct network device includes several ports, an uplink interface, and an adjunct forwarding engine coupled to the ports and the uplink interface. A first port is configured to receive a packet, which includes a destination address. The adjunct forwarding engine is configured to send the packet to the uplink interface if the destination address is not associated with any of the ports. The packet is sent to one of the ports if the destination address is associated with the one of the ports.

    Other inventors
    See patent
  • Path Selection System

    Issued US 7,720,997

    Methods and apparatus for processing a service request received from a client are disclosed. When a service request is received, a plurality of packets are transmitted, where each of the plurality of packets identify a different type of service via which to send the corresponding packet. In addition, a mapping of each different type of service to an IP address is preferably maintained, thereby enabling the service request to be processed via an IP address associated with a type of service…

    Methods and apparatus for processing a service request received from a client are disclosed. When a service request is received, a plurality of packets are transmitted, where each of the plurality of packets identify a different type of service via which to send the corresponding packet. In addition, a mapping of each different type of service to an IP address is preferably maintained, thereby enabling the service request to be processed via an IP address associated with a type of service identified in a first one of the plurality of packets to be received.

    Other inventors
    See patent
  • System for Proactive Time Domain Reflectometry

    Issued US 7,719,992

    A method for cable diagnostics in a network includes performing a test to determine initial state information for each of a plurality of lines coupled to a switch and storing the initial state information in a database. When a change in the state of a line is detected, the test is re-run to determine new state information of the line. The new state information is stored in the database and a message that identifies the change in state and a likely cause of the state change is issued to a…

    A method for cable diagnostics in a network includes performing a test to determine initial state information for each of a plurality of lines coupled to a switch and storing the initial state information in a database. When a change in the state of a line is detected, the test is re-run to determine new state information of the line. The new state information is stored in the database and a message that identifies the change in state and a likely cause of the state change is issued to a network operator. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.

    Other inventors
    See patent
  • Methods and apparatus for managing access to data through a network device

    Issued US 7,624,184

    The invention is directed to techniques for managing access to data available from a data access device using a network switching protocol to manage content requests from clients. A data communications device receives a request for content from a client. The data communications device, such as a network switch, exchanges signals using the network switching protocol with one or more data access devices, such as a web cache. The data communications device can then select one data access device to…

    The invention is directed to techniques for managing access to data available from a data access device using a network switching protocol to manage content requests from clients. A data communications device receives a request for content from a client. The data communications device, such as a network switch, exchanges signals using the network switching protocol with one or more data access devices, such as a web cache. The data communications device can then select one data access device to provide the requested content to the client based, for example, on load balancing considerations. The data communications device sends a data transfer approval signal to the selected data access device. The selected data access device establishes a connection with the client using information, such as the client's network address, provided by the signals. The selected data access device then bypasses the data communications device and sends the requested content to the client. Using the..

    Other inventors
    • James Aviani
    • Carl Sutton
    See patent
  • Internet Protocol Authentication in Layer-3 Multipoint Tunneling for Wireless Access Points

    Issued US 7,616,613

    Enhanced tunnel communication mode creation, management and tuning in a network that includes wireless access points (APs) and user authentication. Tunnels can be dynamically managed to adapt to the changing topology of a network with APs. User devices such as mobile phones, laptop computers, personal digital assistants, or other devices can be added or dropped from an assigned AP. APs, routers, switches or other devices can also be added, removed, or modified in their network characteristics…

    Enhanced tunnel communication mode creation, management and tuning in a network that includes wireless access points (APs) and user authentication. Tunnels can be dynamically managed to adapt to the changing topology of a network with APs. User devices such as mobile phones, laptop computers, personal digital assistants, or other devices can be added or dropped from an assigned AP. APs, routers, switches or other devices can also be added, removed, or modified in their network characteristics. Special control is also provided for IP multicast, Dynamic Host Configuration Protocol (DHCP), Address Resolution Protocol (ARP) and other network features.

    Other inventors
    • Ajit Sanzgiri
    See patent
  • Methods for Configuring a Communications Port (Global Port Profiles)

    Issued US 7,516,211

    A data communication device automatically configures its own communication ports based on attributes of a remote device with which it communicates. The process of configuring the communication ports includes monitoring a communications protocol associated with a remote device on a given communication port of the data communication device without participating in the communications protocol. The data communication device detects an attribute such as a network address associated with the remote…

    A data communication device automatically configures its own communication ports based on attributes of a remote device with which it communicates. The process of configuring the communication ports includes monitoring a communications protocol associated with a remote device on a given communication port of the data communication device without participating in the communications protocol. The data communication device detects an attribute such as a network address associated with the remote device based on the monitored communications. In response to detecting the attribute of the remote device, the data communication device selects one of multiple configuration profiles depending on the detected attribute of the remote device to configure the given communication port.

    Other inventors
    See patent
  • Phased learning approach to determining closest content serving sites

    Issued US 7349969

    In order to direct content requests to an appropriate content serving site in a computer network, a phased learning approach is utilized to ensure that, as best as possible, the request is made to content serving site with the shortest delay. In a setup phase, an indirect path return geographic sever load balancer times queries to all of the individual content serving sites so that the queries all arrive at the content serving sites at the same time. Therefore, when the requesting fixed…

    In order to direct content requests to an appropriate content serving site in a computer network, a phased learning approach is utilized to ensure that, as best as possible, the request is made to content serving site with the shortest delay. In a setup phase, an indirect path return geographic sever load balancer times queries to all of the individual content serving sites so that the queries all arrive at the content serving sites at the same time. Therefore, when the requesting fixed location receives communications from the content serving sites, it can easily tell which content serving site has the least delay by an established race condition. The winner of the race may then be relayed to the indirect path return geographic server load balancer for later usage. In an execution mode, only the m fastest content serving sites and n other sites (used to test random and new sites) are queried when a DNS request arrives from the requesting fixed location. The particular m fastest content serving sites and n other sites may be dynamically updated so as to ensure the most reliable directing of requests. This solution provides a very efficient and effective means by which to determine closest content serving sites while keeping load balancer-created traffic at a minimum.

  • Phased learning approach to determining closest content serving sites

    Issued US 7,349,969

    In order to direct content requests to an appropriate content serving site in a computer network, a phased learning approach is utilized to ensure that, as best as possible, the request is made to content serving site with the shortest delay. In a setup phase, an indirect path return geographic sever load balancer times queries to all of the individual content serving sites so that the queries all arrive at the content serving sites at the same time. Therefore, when the requesting fixed…

    In order to direct content requests to an appropriate content serving site in a computer network, a phased learning approach is utilized to ensure that, as best as possible, the request is made to content serving site with the shortest delay. In a setup phase, an indirect path return geographic sever load balancer times queries to all of the individual content serving sites so that the queries all arrive at the content serving sites at the same time. Therefore, when the requesting fixed location receives communications from the content serving sites, it can easily tell which content serving site has the least delay by an established race condition. The winner of the race may then be relayed to the indirect path return geographic server load balancer for later usage. In an execution mode, only the m fastest content serving sites and n other sites (used to test random and new sites) are queried when a DNS request arrives from the requesting fixed location. The particular m fastest...

    Other inventors
    • James Aviani
    See patent
  • COMMUNICATION EMBODIMENTS AND LOW LATENCY PATH SELECTION IN A MULTI-TOPOLOGY NETWORK

    Issued US 20080304472

    In one embodiment, a source device (e.g., a VOIP phone) establishes a call connection with a remote device depending on which of multiple network paths provides an acceptable latency (e.g., a lower latency). For example, in response to receiving a request to establish a connection with a remote destination device over a network, the source device (e.g., a caller's phone) obtains multiple service code values. The source device encodes each of multiple data packets to include a unique service…

    In one embodiment, a source device (e.g., a VOIP phone) establishes a call connection with a remote device depending on which of multiple network paths provides an acceptable latency (e.g., a lower latency). For example, in response to receiving a request to establish a connection with a remote destination device over a network, the source device (e.g., a caller's phone) obtains multiple service code values. The source device encodes each of multiple data packets to include a unique service code value for transmission of the messages over different network topologies to a remote destination. Thus, when transmitted, each of the multiple messages follows a different logical network topology of a network as specified by a respective service code value. Based on feedback from a remote device that receives the multiple messages, the source learns a preferred logical network topology of the network for establishing the call connection.

    Other inventors
    See patent
  • Content Routing Services Protocol

    Issued US 6,850,980

    Layer 7 switching may be accomplished using one or more caches placed throughout a computer network. Changes to a file on a server may be detected and propagated throughout the network. At the switch or router level, once notification of changes to a file is received, the content may be retrieved from the server and placed in a connected cache. A routing table entry may be created for the content and also placed in the cache. The routing table entry may contain an original location field…

    Layer 7 switching may be accomplished using one or more caches placed throughout a computer network. Changes to a file on a server may be detected and propagated throughout the network. At the switch or router level, once notification of changes to a file is received, the content may be retrieved from the server and placed in a connected cache. A routing table entry may be created for the content and also placed in the cache. The routing table entry may contain an original location field identifying the original location of the content, a distance field indicating a distance from the cache to the server, and a field indicating a version number of the content. Additional fields may also be contained within the routing table entry. When a user requests a specific file, rather than forward the request directly to the server containing the original file, the request may be handled by the router closest to the user which has a connected cache containing the content. This allows a user's...

    See patent
  • Method and apparatus for communicating hot objects of a server to the server's load balancer

    Issued US 7,062,560

    More effective load balancing by a Server Load Balancer may be achieved by implementing extended Server Load Balancing information in a server. The extended Server Load Balancing information includes a special listing of “hot” objects, or objects that have been designated for special handling by the Server Load Balancer. In order to determine which objects on a server are “hot” at any particular point in time, the available throughput for the server is determined. This is then multiplied by a…

    More effective load balancing by a Server Load Balancer may be achieved by implementing extended Server Load Balancing information in a server. The extended Server Load Balancing information includes a special listing of “hot” objects, or objects that have been designated for special handling by the Server Load Balancer. In order to determine which objects on a server are “hot” at any particular point in time, the available throughput for the server is determined. This is then multiplied by a “hotness” percentage, resulting in an Object Threshold Value (OTV). Each of N objects is then assigned an Object Request Value (ORV), the N objects determined by taking the N objects utilizing the most bandwidth. The ORVs are then compared with the OTV, and any of the objects whose ORV exceeds the OTV are labeled as “hot”. Finally, information on the “hot” objects is communicated to the Server Load Balancer (SLB) for special handling.

    See patent
  • Method and apparatus for assigning hot objects to server load balancer

    Issued US 6,820,123

    More effective load balancing by a Server Load Balancer may be achieved by implementing extended Server Load Balancing information in a server. The extended Server Load Balancing information includes a special listing of "hot" objects, or objects that have been designated for special handling by the Server Load Balancer. In order to determine which objects on a server are "hot" at any particular point in time, the available throughput for the server is determined. This is then multiplied by a…

    More effective load balancing by a Server Load Balancer may be achieved by implementing extended Server Load Balancing information in a server. The extended Server Load Balancing information includes a special listing of "hot" objects, or objects that have been designated for special handling by the Server Load Balancer. In order to determine which objects on a server are "hot" at any particular point in time, the available throughput for the server is determined. This is then multiplied by a "hotness" percentage, resulting in an Object Threshold Value (OTV). Each of N objects is then assigned an Object Request Value (ORV), the N objects determined by taking the N objects utilizing the most bandwidth. The ORVs are then compared with the OTV, and any of the objects whose ORV exceeds the OTV are labeled as "hot". Finally, information on the "hot" objects is communicated to the Server Load Balancer (SLB) for special handling.

    See patent
  • Method and System for Auto-provisioning Network Devices in a Data Center Using Network Device Location in Network Topology

    Filed US 18055/018001

  • System and Method for Device Failure Notification

    Filed US 20140280792

    A method and apparatus of a device that notifies another device of a failed device is described. In an exemplary embodiment, a network element detects that a first device is unavailable, where the network element couples the first device to the second device. In response to detecting that the first device is unavailable, the network element configures a proxy for the first device. The network element additionally receives network data that is destined for the first device, where the second…

    A method and apparatus of a device that notifies another device of a failed device is described. In an exemplary embodiment, a network element detects that a first device is unavailable, where the network element couples the first device to the second device. In response to detecting that the first device is unavailable, the network element configures a proxy for the first device. The network element additionally receives network data that is destined for the first device, where the second device originated the network data. If the proxy can process the network data, the network element transmits a response to the second device from the proxy, where the response indicates that the first device is unavailable, where the first response includes an address of the first device. If the proxy cannot process the network data, the network element drops the network data.

    Other inventors
  • Graceful Removal and/or Insertion of a Network Element

    Filed US 20100002577

    In one embodiment, when a network element is to be removed from or inserted into a network a Graceful Operations Manager schedules graceful shut-down and/or start-up routines for different protocols and/or components on the network element in an optimal order based on dependencies between the different protocols and components. The Graceful Operations Manager communicates with the different components at different stages of their shut-down or start-up process and communicates information on the…

    In one embodiment, when a network element is to be removed from or inserted into a network a Graceful Operations Manager schedules graceful shut-down and/or start-up routines for different protocols and/or components on the network element in an optimal order based on dependencies between the different protocols and components. The Graceful Operations Manager communicates with the different components at different stages of their shut-down or start-up process and communicates information on the standby topology across components and/or protocols to enable the synchronization of the standby topology computation on all components and/or protocols that are affected by the removal or insertion.

    Other inventors
  • System and method for selectively affecting a computing environment based on sensed data

    Filed US 20070260417

    A system and method for affecting computing resources. The method includes sensing variables associated with spatially dispersed computing resources and providing sensed data in response thereto. Subsequently the spatially dispersed computing resources are selectively automatically affected based on sensed variables associated with the computing resources. In a specific embodiment, the method further includes determining if the sensed data meet a predetermined criterion or criteria and…

    A system and method for affecting computing resources. The method includes sensing variables associated with spatially dispersed computing resources and providing sensed data in response thereto. Subsequently the spatially dispersed computing resources are selectively automatically affected based on sensed variables associated with the computing resources. In a specific embodiment, the method further includes determining if the sensed data meet a predetermined criterion or criteria and providing one or more control signals in response thereto. The specific method further includes moving virtual machines associated with computing resources that meet the predetermined criterion or criteria to computing resources that do not meet the predetermined criterion or criteria. The sensed data may include temperature, and the predetermined criteria or criterion may include a predetermined threshold beyond which temperature data is considered to meet the predetermined criterion. In an illustrative embodiment, the method further includes selectively activating one or more devices, such as cooling systems, that are adapted to alter sensed variables to cause the sensed data to no longer meet the predetermined criterion or criteria.

    Other inventors
  • Energy efficient scaling of network appliance service performance

    US 20110069613

    Other inventors
  • SYSTEM AND METHOD OF UPDATING A NETWORK ELEMENT

    US [PENDING]

    A method to update a network element without interruption of network services

Recommendations received

View Douglas’ full profile

  • See who you know in common
  • Get introduced
  • Contact Douglas directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Douglas Gourlay