Articles by John
Activity
-
AI’s future isn’t about isolated systems—it’s about interworking and interoperability built on trust and openness. That’s why #DellTechnologies is…
AI’s future isn’t about isolated systems—it’s about interworking and interoperability built on trust and openness. That’s why #DellTechnologies is…
Shared by John Roese
-
Enjoyed my conversation with Matt Barrington about the rise of #agentic AI and strategies for achieving enterprise AI at scale. Watch the video for…
Enjoyed my conversation with Matt Barrington about the rise of #agentic AI and strategies for achieving enterprise AI at scale. Watch the video for…
Shared by John Roese
Publications
-
Switched Lans: Implementation, Operation, Maintenance
Mcgraw-Hill Series on Computer Communications
The vendor-independent guide to large-scale switched networks. LAN design has taken a 180-degree turn, moving away from hubs and routers towards the switch-based systems known as Layer 3 switches. In face,if you're a LAN designer or administrator, numerous vendors are agressively competing for your business - making it more important than ever to cut through their new product hype and find what works for you. Drawing on extensive practical experience and LAN design expertise, John Roese has…
The vendor-independent guide to large-scale switched networks. LAN design has taken a 180-degree turn, moving away from hubs and routers towards the switch-based systems known as Layer 3 switches. In face,if you're a LAN designer or administrator, numerous vendors are agressively competing for your business - making it more important than ever to cut through their new product hype and find what works for you. Drawing on extensive practical experience and LAN design expertise, John Roese has created the complete guide to switched LANs from a system perspective. It delivers all the tools you'll need to design, build, operate, and troubleshoot a large-scale switched network, with special emphasis on: Scaling issues in flat-switched networks; Internet Protocol and Dynamic Host Configuration Protocol (DHCP), the next generation of switching products; Novell NetWare and other protocols.
Roese gives you a full, unbiased look at the practical issues involved in structuring your switched LAN and its protocols and services for long-term successful operation. Under his guidance you'll learn to implement LAN switches into any network design, whether it features existing or emerging technology. Because your network isn't a laboratory...it's a critical element of your business.
Patents
-
DYNAMICALLY COMPOSED COMPUTE NODES COMPRISING DISAGGREGATED COMPONENTS
Filed US 20150381426
A method, article of manufacture, and apparatus for creating dynamically composed compute nodes from disaggregated hardware components is discussed. These components may be dynamically allocated from resource pools to the compute nodes
-
MIGRATING PRIVATE INFRASTRUCTURE SERVICES TO A CLOUD
Filed US 20150381435
Implementations are provided herein for the migration of known infrastructure services, such as those existing on a private cloud infrastructure, to a public cloud environment, that enables private cloud operators to migrate their applications and data to a public cloud environment that meets the same trust, security, and resiliency standards currently employed in the private cloud environment. In one implementation, a private cloud can communicate an infrastructure services manifest to a…
Implementations are provided herein for the migration of known infrastructure services, such as those existing on a private cloud infrastructure, to a public cloud environment, that enables private cloud operators to migrate their applications and data to a public cloud environment that meets the same trust, security, and resiliency standards currently employed in the private cloud environment. In one implementation, a private cloud can communicate an infrastructure services manifest to a public or hybrid cloud provider, which highlights the application and the data that will be moved to the public or hybrid cloud. The public or hybrid cloud can then use the infrastructure services manifest to establish an optimum virtualized environment containing the infrastructure services detailed in the infrastructure services manifest.
-
APPLICATION AND INFORMATION MOVEMENT IN A CLOUD ENVIRONMENT
Filed US 20150381525
computer implemented method, system and computer program product comprising observing a mobile device's interaction with a set of resources, and creating a usage profile for the set of resources based on the mobile devices interactions with the resources; wherein the resources are ranked by the type an frequency of interactions with the mobile device; wherein the usage profile dictates what resources of the set of resources are to be migrated to a new location when the mobile device moves to a…
computer implemented method, system and computer program product comprising observing a mobile device's interaction with a set of resources, and creating a usage profile for the set of resources based on the mobile devices interactions with the resources; wherein the resources are ranked by the type an frequency of interactions with the mobile device; wherein the usage profile dictates what resources of the set of resources are to be migrated to a new location when the mobile device moves to a new location.
-
Location-based access control in a data network
Issued US 8,972,589
A request for network access is received from a client device at a network entry device of a network infrastructure. The network infrastructure determines a physical location of the client device and determines authorization of the client device based on the physical location. The approach can include providing the physical location along with other user credentials to an authorizing device. The method can also include determining a level of service based on the physical location. Communication…
A request for network access is received from a client device at a network entry device of a network infrastructure. The network infrastructure determines a physical location of the client device and determines authorization of the client device based on the physical location. The approach can include providing the physical location along with other user credentials to an authorizing device. The method can also include determining a level of service based on the physical location. Communication for the approach can make use of the IEEE 802.1X protocol.
-
SOFTWARE OVERLAYS FOR DISAGGREGATED COMPONENTS
Filed US 20150378706
A method, article of manufacture, and apparatus for installing software on disaggregated hardware components are discussed. The disaggregated components may be grouped into a dynamically composed compute node. The compute node may be presented as a virtual computer, and the software may be installed on that virtual computer.
-
CLOUDBOOK
Filed US 20150378788
A computer implemented method, system and computer program product enabling cloud service providers to register in a cloud book; wherein the cloud book includes a profile for each cloud service provider of the cloud service providers including the services and terms of service for each cloud service provider of the cloud service providers; and enabling consumers to register in the cloud book; wherein the users are able to connect to each other; wherein the users are able to browse the cloud…
A computer implemented method, system and computer program product enabling cloud service providers to register in a cloud book; wherein the cloud book includes a profile for each cloud service provider of the cloud service providers including the services and terms of service for each cloud service provider of the cloud service providers; and enabling consumers to register in the cloud book; wherein the users are able to connect to each other; wherein the users are able to browse the cloud service providers' connection to consumers; wherein each consumer is enabled to compare the services and terms of service to determine which service provider has services that match the consumer; further wherein the cloud book enables a first consumer to sign up for services with a first cloud service provider.
-
Systems and methods of controlling network access
Issued US 8,578,444
A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further…
A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
-
System and method for dynamic distribution of intrusion signatures
Issued US 8,347,375
The intrusion detection function monitors for and reports detected intrusion signatures. The dynamic intrusion signatures function determines whether reported intrusion signatures exist in a library of signatures associated with a particular intrusion detection function. If the reported signature does not exist in the library, the library is updated. Detected intrusion signatures are reported to similarly enabled devices for library analysis and updating, if necessary. The related method…
The intrusion detection function monitors for and reports detected intrusion signatures. The dynamic intrusion signatures function determines whether reported intrusion signatures exist in a library of signatures associated with a particular intrusion detection function. If the reported signature does not exist in the library, the library is updated. Detected intrusion signatures are reported to similarly enabled devices for library analysis and updating, if necessary. The related method includes the steps of monitoring for intrusion signatures or other triggering events, analyzing the events and updating IDS signature libraries as necessary.
-
Method for network traffic mirroring with data privacy
Issued US 8,239,960
Systems and methods are provided for preserving the privacy of data contained in mirrored network traffic. The mirrored network traffic may comprise data that may be considered confidential, privileged, private, or otherwise sensitive data. For example, the data payload of a frame of mirrored network traffic may include private Voice over IP (VoIP) communications between users on one or more networks. The present invention provides various techniques for securing the privacy of data contained…
Systems and methods are provided for preserving the privacy of data contained in mirrored network traffic. The mirrored network traffic may comprise data that may be considered confidential, privileged, private, or otherwise sensitive data. For example, the data payload of a frame of mirrored network traffic may include private Voice over IP (VoIP) communications between users on one or more networks. The present invention provides various techniques for securing the privacy of data contained in the mirrored network traffic. Using the techniques of the present invention, network traffic comprising confidential, privileged, private, or otherwise sensitive data may be mirrored in such a manner as to provide for the privacy of such data over at least a portion if not all of the mirrored communications between the mirror source point and the mirror destination point.
-
System and method for address block enhanced dynamic network policy management
Issued US 7,945,945
A method, computer readable medium, and system for acquiring address block information for an attached function that initiates network access on a distributed computing network. Additional policy information in acquired concerning the attached function. One or more access policies are set based, at least in part, on the address block information and the additional policy information.
-
Method and apparatus of virtual class of service and logical queue representation through network traffic distribution over multiple port interfaces
Issued US 7,936,770
A method and apparatus are provided that allows for the representation of a larger number of classes of network traffic and logical queues than is physically available on a per port basis within a network device. A number of logical queues, whose number can match the number of classes of network traffic a network device handles, may be supported across an aggregated set of ports even though the network device has fewer physical queues per port than there are classes of network traffic. The…
A method and apparatus are provided that allows for the representation of a larger number of classes of network traffic and logical queues than is physically available on a per port basis within a network device. A number of logical queues, whose number can match the number of classes of network traffic a network device handles, may be supported across an aggregated set of ports even though the network device has fewer physical queues per port than there are classes of network traffic. The method and apparatus improve the management of network traffic sensitive to time delay and jitter, and further facilitates the operation of these applications in a simultaneous or near simultaneous manner.
-
Using signal characteristics to determine the physical location of devices in a data network
Issued US 7,898,977
A method of determining a physical location of a device connected to a data network infrastructure including a plurality of connection points at different physical locations, the method including establishing a connection with the data network infrastructure via a cable-based transmission medium, wherein a communication signal passes via the cable-based transmission medium including at least one of the plurality of connection points. A connection point identifier is determined based, at least…
A method of determining a physical location of a device connected to a data network infrastructure including a plurality of connection points at different physical locations, the method including establishing a connection with the data network infrastructure via a cable-based transmission medium, wherein a communication signal passes via the cable-based transmission medium including at least one of the plurality of connection points. A connection point identifier is determined based, at least in part, upon the at least one of the plurality of connection points. A signal characteristic of the communication signal passing via the cable-based transmission medium between the device and the data network infrastructure through the at least one of the plurality of connection points is measured. A first physical location of the device is determined based on the determined connection point identifier, including accessing stored information associating the determined connection point identifier with location information. A second physical location of the device is determined based on the determined first physical location and the measured signal characteristic, including accessing stored information associating signal characteristics with location information.
-
Creating, modifying and storing service abstractions and role abstractions representing one or more packet rules
Issued US 7,855,972
The present invention provides a method and system for controlling usage of network resources on a communications network. The method comprising acts of: (a) creating one or more packet rules for analyzing packets received at one or more devices of the communications network, each rule including a condition and action to be taken if a packet received at a device satisfies the condition; and (b) creating one or more service abstractions associated with a user of the communication network, each…
The present invention provides a method and system for controlling usage of network resources on a communications network. The method comprising acts of: (a) creating one or more packet rules for analyzing packets received at one or more devices of the communications network, each rule including a condition and action to be taken if a packet received at a device satisfies the condition; and (b) creating one or more service abstractions associated with a user of the communication network, each service abstraction representing a named set of one or more of the packet rules. In some embodiments one or more role abstractions may be created, each role abstraction representing a role of a user with respect to the communications network, and each role abstraction including a set of one or more packet rules, and possibly one or more service abstractions.
-
Verified device locations in a data network
Issued US 7,606,938
One or more trusted network devices within a data network infrastructure determine a physical location of a client device requesting access to the data network infrastructure. A trusted physical location is generated and associated with the client device. The approach can include determining whether a candidate network device is a trusted network device based on a likelihood that the candidate network device can be modified to provide false physical location data. The approach also can include…
One or more trusted network devices within a data network infrastructure determine a physical location of a client device requesting access to the data network infrastructure. A trusted physical location is generated and associated with the client device. The approach can include determining whether a candidate network device is a trusted network device based on a likelihood that the candidate network device can be modified to provide false physical location data. The approach also can include determining a response for an access request by the client and controlling network resources provided to the client based on the trusted physical location.
-
Optical interface identification system
Issued US 7,347,628
A connector assembly, configured to releasably couple a socket assembly, includes zero or more data conductors. An optical pathway is configured to: receive an optical signal from an optical light source positioned within the socket assembly; and provide at least a portion of the optical signal to an optical light target positioned within the socket assembly.
-
Method for network traffic mirroring with data privacy
Issued US 7,690,040
Systems and methods are provided for preserving the privacy of data contained in mirrored network traffic. The mirrored network traffic may comprise data that may be considered confidential, privileged, private, or otherwise sensitive data. For example, the data payload of a frame of mirrored network traffic may include private Voice over IP (VoIP) communications between users on one or more networks. The present invention provides various techniques for securing the privacy of data contained…
Systems and methods are provided for preserving the privacy of data contained in mirrored network traffic. The mirrored network traffic may comprise data that may be considered confidential, privileged, private, or otherwise sensitive data. For example, the data payload of a frame of mirrored network traffic may include private Voice over IP (VoIP) communications between users on one or more networks. The present invention provides various techniques for securing the privacy of data contained in the mirrored network traffic. Using the techniques of the present invention, network traffic comprising confidential, privileged, private, or otherwise sensitive data may be mirrored in such a manner as to provide for the privacy of such data over at least a portion if not all of the mirrored communications between the mirror source point and the mirror destination point.
-
System and method for IEEE 802.1X user authentication in a network entry device
Filed US 20040158735
A system and method to authenticate attached functions seeking access to network services through a network entry device. The system includes a relay function of the network entry device for forwarding authentication messages to a device having full IEEE Standard 802.1X Port Access Entity (PAE) functionality. The relay function directs authentication information to the PAE device to perform the authentication function pursuant to that standard. The relay function eliminates the need for the…
A system and method to authenticate attached functions seeking access to network services through a network entry device. The system includes a relay function of the network entry device for forwarding authentication messages to a device having full IEEE Standard 802.1X Port Access Entity (PAE) functionality. The relay function directs authentication information to the PAE device to perform the authentication function pursuant to that standard. The relay function eliminates the need for the network entry device to operate as a PAE device. The relay function may forward the authentication messages in a form compatible with IEEE Standard 802.1D or IEEE Standard 802.1Q.
-
Distributed intrusion response system
Issued US 7,581,249
A system and method to respond to intrusions detected on a network system including attached functions and a network infrastructure. The system includes means for receiving from an intrusion detection function information about intrusions, a directory service function for gathering and reporting at least the physical and logical addresses of devices of the network infrastructure associated with the detected intrusions, and a plurality of distributed enforcement devices of the network…
A system and method to respond to intrusions detected on a network system including attached functions and a network infrastructure. The system includes means for receiving from an intrusion detection function information about intrusions, a directory service function for gathering and reporting at least the physical and logical addresses of devices of the network infrastructure associated with the detected intrusions, and a plurality of distributed enforcement devices of the network infrastructure for enforcing policies responsive to the detected intrusions. A policy decision function evaluates the reported detected intrusions and makes a determination whether one or more policy changes are required on the enforcement devices in response to a detected intrusion. A policy manager function configures the distributed enforcement devices with the responsive changed policy or policies. Policy changes rules can vary from no change to complete port blocking on one or more identified enforcement devices associated with the detected intrusion, to redirecting the associated traffic including the intrusion and these policies may be modified or removed over time as warranted by network operation.
-
System and method for dynamic network policy management
Issued US 7,526,541
Abstract
A system and method that provides dynamic network policy management. The system enables a network administrator to regulate usage of network services upon initiation of and throughout network sessions. The system employs a method of identifying selectable characteristics of attached functions to establish static and dynamic policies, which policies may be amended before, during and after any session throughout the network based on the monitored detection of any of a number of…Abstract
A system and method that provides dynamic network policy management. The system enables a network administrator to regulate usage of network services upon initiation of and throughout network sessions. The system employs a method of identifying selectable characteristics of attached functions to establish static and dynamic policies, which policies may be amended before, during and after any session throughout the network based on the monitored detection of any of a number of specified triggering events or activities. Particular policies associated with a particular identified attached function in prior sessions may be cached or saved and employed in subsequent sessions to provide network usage permissions more rapidly in such subsequent sessions. The cached or saved policy information may also be used to identify network usage, control, and security. The system and method of the present invention provides static and dynamic policy allocation for network usage provisioning. -
Locating devices in a data network
Issued US 7,739,402
A system that associates physical locations with network-linked devices in a network to which such devices are connected. This system employs a variety of techniques for establishing device location. The system configuration can vary and can include any type of data network, including LANs, MANs, Wide Area Networks (WANs), Personal Area Networks (PANs), and Home Networks. The system provides location information for particular devices to the network devices and management, and may be used in…
A system that associates physical locations with network-linked devices in a network to which such devices are connected. This system employs a variety of techniques for establishing device location. The system configuration can vary and can include any type of data network, including LANs, MANs, Wide Area Networks (WANs), Personal Area Networks (PANs), and Home Networks. The system provides location information for particular devices to the network devices and management, and may be used in any of a variety of ways to improve configuration accuracy, control, and security. The location information may also be used to control or secure a device itself.
-
Location based data
Issued US 7,092,943
Data is provided with location-based access control information. Access to the data at a physical location is then limited according to the location-based access control information. A physical location of a device accessing the data can be determined, and the limiting of the access is then according to the determined physical location. The data can be provided in encrypted form, and limiting access to the data includes enabling decryption of the data according to the physical location.
-
Location discovery in a data network
Issued US 7,295,556
A method for location discovery in a data network includes receiving, at a first device, connection information from a neighboring network device and determining a physical location of the first device based on the connection information. The method can include receiving, at the first device, the physical location transmitted from the neighboring network device. The method can further include associating a level of trust with the physical location based on the neighboring network device. The…
A method for location discovery in a data network includes receiving, at a first device, connection information from a neighboring network device and determining a physical location of the first device based on the connection information. The method can include receiving, at the first device, the physical location transmitted from the neighboring network device. The method can further include associating a level of trust with the physical location based on the neighboring network device. The first device be one of a variety of devices, such as a router, a switch, a network entry device, a firewall device, or a gateway.
Honors & Awards
-
Next Generation Executive of the Year
OCRI
2008 OCRI Next Generation Executive of the Year - Ottawa CA
More activity by John
-
This video shares what CTOs and CIOs across the industry are quickly learning. The best AI strategy is to turn a business problem into an AI…
This video shares what CTOs and CIOs across the industry are quickly learning. The best AI strategy is to turn a business problem into an AI…
Shared by John Roese
-
Congratulations #UNH IOL on a significant milestone! Very excited to have #Dell contribute to this very important program. Looking forward to…
Congratulations #UNH IOL on a significant milestone! Very excited to have #Dell contribute to this very important program. Looking forward to…
Liked by John Roese
-
It’s a new and exciting challenge to be asked to share my perspective (and a degree of optimism that surprises even me) on current challenges in the…
It’s a new and exciting challenge to be asked to share my perspective (and a degree of optimism that surprises even me) on current challenges in the…
Liked by John Roese
-
"The question isn't whether America can compete with China in telecommunications—it's whether we have the political will to acknowledge the magnitude…
"The question isn't whether America can compete with China in telecommunications—it's whether we have the political will to acknowledge the magnitude…
Liked by John Roese
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named John Roese in United States
-
John Roese
Supervisor-Hospital Transport Services at The Ohio State University Wexner Medical Center
-
John Roese
TELECOM TECH at IBEW LOCAL 164
-
John Roese
Branch Lead Color Blender at Sherwin-Williams
-
John T. Roese Jr
--
4 others named John Roese in United States are on LinkedIn
See others named John Roese