Patents by Inventor Arindam Paul

Arindam Paul has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7885260
    Abstract: Disclosed are, inter alia, methods, apparatus, computer-readable media, mechanisms used in one embodiment configured for, and means for, determining packet forwarding information for packets sent from a protocol offload engine in a packet switching device. The protocol offload engine performs the protocol processing for a protocol application (e.g., BGP) running on a separate control plane processing system, and generates packets to be sent to external devices. The protocol offload engine sends these packets to one of the line cards without using the routing information lookup facility of the control plane processing system, thereby, freeing the control plane processing system to use those processing cycles to perform other tasks.
    Type: Grant
    Filed: November 20, 2007
    Date of Patent: February 8, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Arindam Paul, Somala Krishna Reddy, David Delano Ward, Fan Sun, Shyamsundar Nandkishor Maniyar
  • Patent number: 7882283
    Abstract: Support for virtualization in a storage area networks may be provided using a variety of techniques. In one embodiment of the present invention, exchange level load balancing may be provided by determining if input/outputs (IOs) received by a device are new. If a particular IO is new, the IO may be assigned to a particular data path processor and an context may be created corresponding to the IO and to the processor. Then, when an event corresponding to the IO is received, the event may be forwarded to the processor assigned to the IO.
    Type: Grant
    Filed: November 28, 2006
    Date of Patent: February 1, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Maurilio Cometto, Jeevan Kamisetty, Arindam Paul, Hua Zhong, Varagur V. Chandrasekaran
  • Publication number: 20100312936
    Abstract: In one embodiment, a solution is provided wherein a lock client sends lock requests to a lock manager upon receipt of an input/output (I/O) and receives back a lock grant. At some point later, the lock client may send a lock release. The lock manager, upon receipt of a lock release from a lock client, remove a first lock request corresponding to the lock release from a lock grant queue corresponding to the lock manager. Then, for each dependency queue lock request in a dependency queue corresponding to the first lock request, the lock manager may determine whether the dependency queue lock request conflicts with a second lock request in the lock grant queue, and then may process the dependency queue lock request according to whether the dependency queue lock requires conflicts with a second lock request in the lock grant queue.
    Type: Application
    Filed: July 22, 2010
    Publication date: December 9, 2010
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Maurilio Cometto, Arindam Paul, Varagur V. Chandrasekaran
  • Patent number: 7844784
    Abstract: In one embodiment, a solution is provided wherein a lock manager is kept moving among multiple cores or processors in a multi-core or multi-processor environment. By “hopping” the lock manager from processor to processor, a bottleneck at any of the processors is prevented. The frequency of movement may be based on, for example, a counter that counts the number of input/outputs handled by the lock manager and moves the lock manager to a different processor once a determined threshold is met. In another embodiment of the present invention, the frequency of the movement between processors may be based on a time that counts the amount of time the lock manager has been operating on the processor and moves the lock manager to a different processor once a predetermined time is reached.
    Type: Grant
    Filed: November 27, 2006
    Date of Patent: November 30, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Maurilio Cometto, Jeevan Kamisetty, Arindam Paul, Varagur V. Chandrasekaran
  • Patent number: 7783805
    Abstract: In one embodiment, a solution is provided wherein a lock client sends lock requests to a lock manager upon receipt of an input/output (I/O) and receives back a lock grant. At some point later, the lock client may send a lock release. The lock manager, upon receipt of a lock release from a lock client, remove a first lock request corresponding to the lock release from a lock grant queue corresponding to the lock manager. Then, for each dependency queue lock request in a dependency queue corresponding to the first lock request, the lock manager may determine whether the dependency queue lock request conflicts with a second lock request in the lock grant queue, and then may process the dependency queue lock request according to whether the dependency queue lock requires conflicts with a second lock request in the lock grant queue.
    Type: Grant
    Filed: November 29, 2006
    Date of Patent: August 24, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Maurilio Cometto, Arindam Paul, Varagur V. Chandrasekaran
  • Patent number: 7765194
    Abstract: Methods and apparatus are provided for detecting and maintaining version compatibility in network devices. Interfaces associated with network devices and components are controlled in order to generate compatibility information at compile time. Version compatibility information embedded in image headers is checked during installation. Version compatibility information is also used to generate access control lists. Access control lists prevent incompatible device communication during run time.
    Type: Grant
    Filed: March 17, 2006
    Date of Patent: July 27, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Samar Sharma, Arindam Paul, Umesh Mahajan
  • Publication number: 20090172816
    Abstract: Embodiments of the invention improve the detection of malicious software applications, such as a rootkit, on hosts configured to access storage volumes over a storage area network (SAN). A rootkit detection program running on a switch may be configured to detect rootkits present on the storage volumes of the SAN. Because the switch may mount and access storage volumes independently from the (possibly comprised) hosts, the rootkit is not able to conceal itself from the rootkit detection program running on the switch.
    Type: Application
    Filed: December 31, 2007
    Publication date: July 2, 2009
    Inventors: FABIO R. MAINO, DINESH G. DUTT, SAMAR SHARMA, ARINDAM PAUL
  • Publication number: 20090129380
    Abstract: Disclosed are, inter alia, methods, apparatus, computer-readable media, mechanisms used in one embodiment configured for, and means for, determining packet forwarding information for packets sent from a protocol offload engine in a packet switching device. The protocol offload engine performs the protocol processing for a protocol application (e.g., BGP) running on a separate control plane processing system, and generates packets to be sent to external devices. The protocol offload engine sends these packets to one of the line cards without using the routing information lookup facility of the control plane processing system, thereby, freeing the control plane processing system to use those processing cycles to perform other tasks.
    Type: Application
    Filed: November 20, 2007
    Publication date: May 21, 2009
    Inventors: Arindam Paul, Somala Krishna Reddy, David Delano Ward, Fan Sun, Shyamsundar Nandkishor Maniyar
  • Publication number: 20090019142
    Abstract: In one embodiment, a network device receives a port login directed to a target from a first host. The network device determines whether at least one other host is currently logged in to the target. The network device may then send a port login to the target corresponding to whether at least one other host is currently logged in to the target.
    Type: Application
    Filed: July 11, 2007
    Publication date: January 15, 2009
    Inventors: Dinesh G. Dutt, Sanjaya Kumar, Arindam Paul, Samar Sharma
  • Publication number: 20080175160
    Abstract: In one embodiment, a solution is provided wherein a minimum and/or maximum bandwidth may be guaranteed for specific flows. These guarantees can be associated to various levels of granularity, such as target (T), target-Logical Unit Number (LUN) coupling (TL), initiator-target-LUN coupling (ITL), and initiator-target coupling (IT). This may be accomplished by rate limiting frames in the storage area network based upon quality of service information provided by a user. As such, the traffic can be shaped in a way that guarantees requested levels of service without dropping frames.
    Type: Application
    Filed: January 22, 2007
    Publication date: July 24, 2008
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Maurilio Cometto, Jeevan Kamisetty, Arindam Paul, Varagur V. Chandrasekaran
  • Publication number: 20080126647
    Abstract: In one embodiment, a solution is provided wherein a lock client sends lock requests to a lock manager upon receipt of an input/output (I/O) and receives back a lock grant. At some point later, the lock client may send a lock release. The lock manager, upon receipt of a lock release from a lock client, remove a first lock request corresponding to the lock release from a lock grant queue corresponding to the lock manager. Then, for each dependency queue lock request in a dependency queue corresponding to the first lock request, the lock manager may determine whether the dependency queue lock request conflicts with a second lock request in the lock grant queue, and then may process the dependency queue lock request according to whether the dependency queue lock requires conflicts with a second lock request in the lock grant queue.
    Type: Application
    Filed: November 29, 2006
    Publication date: May 29, 2008
    Applicant: Cisco Technology, Inc.
    Inventors: Maurilio Cometto, Arindam Paul, Varagur V. Chandrasekaran
  • Publication number: 20080127198
    Abstract: Fine granularity exchange level load balancing may be performed in a device in a storage area network in order to ensure that processors in a multi-core environment are not overloaded. This may be accomplished by assigning input/outputs relating to a particular exchange to a specific processor, and maintaining that association so that subsequent related input/outputs are handled by the same processor. In this process, the system may first determine if a received IO is new. If so, then it may assign the IO to a particular data path processor and create a context corresponding to the IO and the processor, as well as to the type of the non-command frame. Subsequently, an event may be received corresponding to the IO, which may then be forwarded to the processor assigned to the IO.
    Type: Application
    Filed: November 28, 2006
    Publication date: May 29, 2008
    Applicant: Cisco Technology, Inc.
    Inventors: Maurilio Cometto, Jeevan Kamisetty, Arindam Paul, Varagur V. Chandrasekaran
  • Publication number: 20080126693
    Abstract: Support for virtualization in a storage area networks may be provided using a variety of techniques. In one embodiment of the present invention, exchange level load balancing may be provided by determining if input/outputs (IOs) received by a device are new. If a particular IO is new, the IO may be assigned to a particular data path processor and an context may be created corresponding to the IO and to the processor. Then, when an event corresponding to the IO is received, the event may be forwarded to the processor assigned to the IO.
    Type: Application
    Filed: November 28, 2006
    Publication date: May 29, 2008
    Applicant: Cisco Technology, Inc.
    Inventors: Maurilio Cometto, Jeevan Kamisetty, Arindam Paul, Hua Zhong, Varagur V. Chandrasekaran
  • Publication number: 20080126726
    Abstract: In one embodiment, a solution is provided wherein a lock manager is kept moving among multiple cores or processors in a multi-core or multi-processor environment. By “hopping” the lock manager from processor to processor, a bottleneck at any of the processors is prevented. The frequency of movement may be based on, for example, a counter that counts the number of input/outputs handled by the lock manager and moves the lock manager to a different processor once a determined threshold is met. In another embodiment of the present invention, the frequency of the movement between processors may be based on a time that counts the amount of time the lock manager has been operating on the processor and moves the lock manager to a different processor once a predetermined time is reached.
    Type: Application
    Filed: November 27, 2006
    Publication date: May 29, 2008
    Applicant: Cisco Technology, Inc.
    Inventors: Maurilio Cometto, Jeevan Kamisetty, Arindam Paul, Varagur V. Chandrasekaran