scispace - formally typeset
Search or ask a question

Showing papers by "Arista Networks published in 2021"


Proceedings Article•DOI•
05 Jan 2021
TL;DR: In this paper, the best possible rate achievable under the joint transmission approach, and then use these findings to address the problem of performing joint scheduling in a common practical deployment scenario, is discussed.
Abstract: For the new joint transmission paradigm being discussed under the IEEE 802.11be standardization efforts, we report the findings of our attempt at addressing the possible gains, and strategies, of using such a scheme. We look at the best possible rate achievable under the Joint Transmission approach, and then use these findings to address the problem of performing joint scheduling in a common practical deployment scenario.

8 citations


Patent•
12 Jan 2021
TL;DR: In this paper, the authors proposed a method for programming a network element that includes detecting an addition of a first route in a routing information base (RIB) on the network element, adding, in response to detecting the addition, a first-route network prefix associated with the first route to a network prefix trie (NPT), identifying, based on the adding, first parent network prefix for the first- route network prefix using the NPT, making a first determination that the first routes and the first parent prefix are reachable via a first common next hop connected to the
Abstract: In general, the invention relates to a method for programming a network element. The method includes detecting an addition of a first route in a routing information base (RIB) on the network element, adding, in response to detecting the addition, a first route network prefix associated with the first route to a network prefix trie (NPT), identifying, based on the adding, a first parent network prefix for the first route network prefix using the NPT, making a first determination that the first route network prefix and the first parent network prefix are reachable via a first common next hop connected to the network element, and waiving, based on the first determination, a creation of a forwarding information base (FIB) entry associated with the first route network prefix in a FIB on the network element.

1 citations


Patent•
11 Mar 2021
TL;DR: In this paper, a method sets a threshold for utilization of a first table, wherein the utilization is based on layer (3) addresses and layer (2) addresses being stored in the first table.
Abstract: In some embodiments, a method sets a threshold for utilization of a first table, wherein the utilization is based on layer (3) addresses and layer (2) addresses being stored in the first table. When a utilization of the first table does not meet the threshold, the method stores a layer (3) address in the first table. The first table uses a first type of lookup to determine a next hop address for the layer (3) addresses or the layer (2) addresses, and the first table also stores one or more layer (2) addresses. When the utilization of the first table meets the threshold, the method stores the layer (3) address in a second table where the second table uses a second type of lookup to determine the next hop address for layer (3) addresses.

Patent•
09 Mar 2021
TL;DR: In this paper, a method and network device for tagging network traffic flows is presented, which involves the incorporation of static user-defined tag information and dynamic screener defined tag information into flow tracking information exported from flow tracking-capable network devices to one or more flow collectors.
Abstract: A method and network device for tagging network traffic flows. Specifically, the method and system disclosed herein entail the incorporation of static user-defined tag information, as well as dynamic screener-defined tag information (if appropriate), into flow tracking information exported from flow tracking-capable network devices to one or more flow collectors. Incorporation of the aforementioned tag information enhances the ability of the flow collector(s) to index, as well as retrieve, the flow tracking information. Through enhanced indexing and retrieval, speedier analysis of the flow tracking information, by one or more flow analyzers, may also be possible.

Patent•
Akhtar Nadeem1, Parekh Jatin•
16 Mar 2021
TL;DR: In this paper, the first wireless device may determine if a first wireless transmission is below a threshold, and a second wireless transmission using a second protocol between a plurality of wireless devices is not intended for processing by the first.
Abstract: Embodiments of the present disclosure include a systems and methods for concurrent wireless transmission. In one embodiment the present disclosure includes a wireless transmission method. A first wireless device may determine that a first wireless transmission using a first protocol between a plurality of wireless devices is not intended for processing by the first wireless device. The first wireless device may determine if a first power level of the first wireless transmission is below a threshold. The first wireless device may perform a second wireless transmission using a second protocol between the first wireless device and at least a second wireless device during the first wireless transmission when the first power level is below the threshold. A second power level of the second wireless transmission may be set to a first value determined based on the threshold. In other embodiments, techniques for sending packets concurrently are disclosed.

Patent•
04 Feb 2021
TL;DR: In this article, a first network device is configured with a rule preventing network traffic from traveling from the first network node to one or more other nodes, and the first node determines that the second node has failed.
Abstract: A first network device is configured with a rule preventing network traffic from travelling from the first network device to one or more other network devices. The first network device is configured to receive and distribute network traffic to the one or more other network devices. A second network device receives and distributes network traffic to the one or more other network devices. The first network device determines that the second network device has failed. In response to determining that the second network device has failed, the first network device removes the rule so that the first network device receives and distributes network traffic to the one or more other network devices.

Patent•
Cananzi David A1•
16 Feb 2021
TL;DR: In this paper, a method for testing a printed circuit board is presented, based on adjacency assessment in the list of conductive lands of the board and a list of pairs of adjacent conductive land pairs.
Abstract: A method for testing a printed circuit board is provided. The method includes accessing a list of conductive lands of a printed circuit board to be tested and forming a list of pairs of adjacent conductive lands, based on adjacency assessment in the list of conductive lands. The method includes performing high-potential testing on the printed circuit board, on each of the pairs of adjacent conductive lands.

Patent•
Hsu Fred1, Pech Andre•
10 Jun 2021
TL;DR: In this paper, the authors present a method for determining a physical topology of a network and monitoring network events based on control plane information received from one or more devices in the network.
Abstract: In some implementations, a method is provided. The method includes determining a physical topology of a network and monitoring network events based, at least in part, on control plane information received from one or more devices in the network. The method also includes monitoring the performance of each of a plurality of applications running on the network based, at least in part, on a set of application calls initiated by each application. When a drop in performance of an application is detected, the drop in performance is correlated with one or more of a plurality of detected network events to determine a cause of the drop in performance.

Proceedings Article•DOI•
05 Jan 2021
TL;DR: P-Tracer as mentioned in this paper is a contact tracing solution, which uses users wifi association data from Arista Networks' Cloud-Vision Wifi to detect new hot zones and possible new cases.
Abstract: COVID-19 pandemic has impacted millions of people worldwide. To tackle the spread of disease, governments all over the world had to impose sudden lockdowns with strict restrictions and has resulted in stressing most of the enterprises on the financial fronts. As the governments all over the world are now relaxing the restrictions, businesses are re-opening gradually and employees are returning back to work. There is huge responsibility on the enterprises to stay vigilant when an employee tests positive for COVID-19. To target the issue, we have come up with a contact tracing solution, P-Tracer application which uses users wifi association data from Arista Networks’ Cloud-Vision Wifi. This paper shortly presents the P-Tracer application working principle. We claim that the application will be useful in tracing the users association journey and detection of new hot zones and possible new cases.

Patent•
Uy Alexander1, Kheraj Stefan•
28 Jan 2021
TL;DR: In this paper, a method and network device for overlay tunnel termination and mirroring spanning datacenters is presented, which entail the traversal of mirrored network traffic from data centers lacking traffic analysis tools to other data centers.
Abstract: A method and network device for overlay tunnel termination and mirroring spanning datacenters. Specifically, the method and network device disclosed herein entail the traversal of mirrored network traffic from datacenters lacking traffic analysis tools to other datacenters including the sought after traffic analysis tools. Further, the aforementioned traversal of mirrored network traffic may utilize virtual network layer overlay domain tunnels.

Patent•
18 Feb 2021
TL;DR: In this paper, a trunk port can be associated with a master/slave setting for each logical network that it is configured for, i.e., virtual local area networks, VLANs.
Abstract: Synchronization of clocks among computing devices in a network includes determining master/slave relations among the computing devices. Some computing devices (e.g., switches) include trunk ports configured to carry traffic for several logical networks; e.g., virtual local area networks, VLANs. A trunk port can be associated with a master / slave setting for each logical network that it is configured for. Synchronization of clocks among the computing devices further includes running a synchronization sequence between a trunk port and each computing device on each of the logical networks configured on the trunk port.

Patent•
16 Mar 2021
TL;DR: In this article, an electronic circuit includes a first conductor configured horizontally on a first layer and a second conductor configured on a second layer, separated from the first conductor by a plurality of layers.
Abstract: An electronic circuit includes a first conductor configured horizontally on a first layer and a second conductor configured horizontally on a second layer. The second conductor is separated from the first conductor by a plurality of layers. A third conductor is configured between the first layer and the second layer. The third conductor electrically couples the first conductor and the second conductor. One or more intermediate conductors are electrically coupled to the third conductor, with the one or more intermediate conductors configured on one or more intermediate layers between the first layer and the second layer.

Patent•
22 Apr 2021
TL;DR: In this article neighbor equivalence groups on a network device are provided, where a group of peers of the network device that communicate identical control plane state information for a given network protocol to the network devices.
Abstract: Techniques for implementing neighbor equivalence groups on a network device are provided, where a neighbor equivalence group is a group of peers of the network device that communicate identical control plane state information for a given network protocol to the network device. In the context of Border Gateway Protocol (BGP), these techniques can include (1) creating, by the network device, a neighbor equivalence group for a set of BGP peers that advertise the same BGP paths to the device, (2) maintaining, by the network device, a single path database for the neighbor equivalence group (rather than one path database for each BGP peer in the group), and (3) immediately processing. by the network device, BGP path update/withdrawal messages received from any of the BGP peers in the group against the single path database, without waiting for the same message to be received from every peer.

Patent•
04 Feb 2021
TL;DR: In this article, the authors describe methods, systems, and/or instructions stored on non-transitory computer readable mediums for managing a boot personality of a network device, which may include rebooting the network device; initializing, based on the configuration of the hardware component, a second processor before the first processor; and executing a second operating system while the network devices is in the second boot personality.
Abstract: Embodiments described herein may relate to methods, systems, and/or instructions stored on non-transitory computer readable mediums for managing a boot personality of a network device. Managing a boot personality may include, while executing a first operating system on a network device in a first boot personality using a first processor, executing a command to modify a configuration of a hardware component of the network device to cause the network device to be configured in a second boot personality. The method may also include rebooting the network device; initializing, based on the configuration of the hardware component, a second processor before the first processor; and executing, after the initialization, a second operating system while the network device is in the second boot personality.

Patent•
21 Jan 2021
TL;DR: In this article, a set of filtering devices are used to determine whether a given NTDU can ultimately be transmitted to, and processed by, a protected resource, and the protected resources are logically surrounded by a perimeter.
Abstract: In general, embodiments of the invention relate to processing network traffic data units (NTDUs). More specifically, embodiments of the invention relate to processing NTDUs transmitted between client device and the one or more protected resources. The protected resources are logically surrounded by a perimeter, which is implemented as a set of network devices that manage the flow of NTDUs between client devices and the protected resources. The perimeter works in conjunction with a set of filtering devices to determine whether a given NTDU can ultimately be transmitted to, and processed by, a protected resource.

Patent•
16 Mar 2021
TL;DR: In this article, a latching assembly is proposed to mechanically aid an operative connection between electrical modules, which enables a user to physically latch electrical modules to one another and to retain the latching of the electrical modules.
Abstract: In general, embodiments relate to systems for latching electrical modules to one another. Specifically, embodiments provide for a latching assembly to mechanically aid an operative connection between electrical modules. Further, embodiments enable a user to physically latch electrical modules to one another and to retain the latching of the electrical modules.

Patent•
26 Jan 2021
TL;DR: In this paper, the authors describe methods and systems for comparing values using an associative memory, which includes sets of mask rows that are configured such that the associative return a result of true when the sum of the first number and the second number is equal to the third number.
Abstract: Methods and systems are described for comparing values using an associative memory. An associative memory lookup is performed based on a key that comprises a first number, a second number, and a third number. The associative memory includes sets of mask rows that are configured such that the associative memory returns a result of true when the sum of the first number and the second number is equal to the third number. The result of the associative memory lookup is outputted. The associative memory configured in this manner may be used, for example, by a packet forwarding device to perform a zero-value boundary condition check or packet sequence check.

Patent•
18 May 2021
TL;DR: In this paper, the address resolution probe is handled by sending an address resolution message to a third device on the network regardless of whether a binding for a destination internet protocol (IP) address is stored in a bindings table accessible to the first device.
Abstract: Systems and methods for handling an address resolution probe. An illustrative method includes receiving, at a first device on a network, an address resolution message from a second device on the network, determining whether the address resolution message is an address resolution probe message, and in response to determining that the address resolution message is an address resolution probe message, transmitting the address resolution message to a third device on the network regardless of whether a binding for a destination internet protocol (IP) address included in the address resolution message is stored in a bindings table accessible to the first device.