Patents by Inventor Eswara Chinthalapati

Eswara Chinthalapati has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10728176
    Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.
    Type: Grant
    Filed: August 31, 2018
    Date of Patent: July 28, 2020
    Assignee: Extreme Networks, Inc.
    Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Chhabria
  • Publication number: 20190116133
    Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.
    Type: Application
    Filed: August 31, 2018
    Publication date: April 18, 2019
    Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Chhabria
  • Patent number: 10069764
    Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.
    Type: Grant
    Filed: February 6, 2017
    Date of Patent: September 4, 2018
    Assignee: Extreme Networks, Inc.
    Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Chhabria
  • Patent number: 9853874
    Abstract: Techniques for performing flow-specific failure detection in SDN networks are provided. In one embodiment, a computer system (e.g., an SDN controller) can determine a flow to be monitored in a network. The computer system can then transmit first and second messages to first and second network devices in the network respectively, where the first network device is an upstream device in the flow, where the second network device is a downstream device in the flow, and where the first and second messages instruct the first and second network devices to collect local data rate information for the flow.
    Type: Grant
    Filed: October 27, 2015
    Date of Patent: December 26, 2017
    Assignee: Brocade Communications Systems, Inc.
    Inventors: Eswara Chinthalapati, Sayed Mohd Saquib, Dilip Kumar
  • Patent number: 9742648
    Abstract: Techniques for performing efficient topology failure detection in SDN networks are provided. In one embodiment, a computer system (e.g., an SDN controller) can transmit a first message to a first network device, where the first message instructs the first network device to begin sending probe packets to a second network device at a predetermined rate. The computer system can further transmit a second message to the second network device, where the second message instructs the second network device to monitor for the probe packets sent by the first network device and to notify the computer system when one or more of the probe packets are not received by the second network device. If the computer system receives such a notification from the second network device, the computer system can determine that a port, link, or node failure has occurred between the first and second network devices.
    Type: Grant
    Filed: October 27, 2015
    Date of Patent: August 22, 2017
    Assignee: Brocade Communications Systems, Inc.
    Inventors: Sayed Mohd Saquib, Eswara Chinthalapati, Dilip Kumar
  • Publication number: 20170187649
    Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.
    Type: Application
    Filed: February 6, 2017
    Publication date: June 29, 2017
    Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Nand Chhabria
  • Patent number: 9565138
    Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: February 7, 2017
    Assignee: Brocade Communications Systems, Inc.
    Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Chhabria
  • Publication number: 20160285729
    Abstract: Techniques for performing flow-specific failure detection in SDN networks are provided. In one embodiment, a computer system (e.g., an SDN controller) can determine a flow to be monitored in a network. The computer system can then transmit first and second messages to first and second network devices in the network respectively, where the first network device is an upstream device in the flow, where the second network device is a downstream device in the flow, and where the first and second messages instruct the first and second network devices to collect local data rate information for the flow.
    Type: Application
    Filed: October 27, 2015
    Publication date: September 29, 2016
    Inventors: Eswara Chinthalapati, Sayed Mohd Saquib, Dilip Kumar
  • Publication number: 20160285750
    Abstract: Techniques for performing efficient topology failure detection in SDN networks are provided. In one embodiment, a computer system (e.g., an SDN controller) can transmit a first message to a first network device, where the first message instructs the first network device to begin sending probe packets to a second network device at a predetermined rate. The computer system can further transmit a second message to the second network device, where the second message instructs the second network device to monitor for the probe packets sent by the first network device and to notify the computer system when one or more of the probe packets are not received by the second network device. If the computer system receives such a notification from the second network device, the computer system can determine that that a port, link, or node failure has occurred between the first and second network devices.
    Type: Application
    Filed: October 27, 2015
    Publication date: September 29, 2016
    Inventors: Sayed Mohd Saquib, Eswara Chinthalapati, Dilip Kumar
  • Publication number: 20150350077
    Abstract: Techniques for transforming a legacy network into a Software Defined Networking (SDN) enabled network are provided. In one embodiment, a route server can receive one or more routing protocol packets originating from a network device, where the one or more routing protocol packets are forwarded to the route server via a cross connect configured on a network router. The route server can further establish a routing protocol session between the route server and the network device based on the one or more routing protocol packets, and can add a routing entry to a local routing table. Upon adding the routing entry, the route server can automatically invoke an application programming interface (API) for transmitting the routing entry to a Software Defined Networking (SDN) controller.
    Type: Application
    Filed: May 26, 2015
    Publication date: December 3, 2015
    Inventors: Muhammad Durrani, Syed Natif Nawaz, Eswara Chinthalapati, Yi Zhang, Sindhu Payankulath
  • Publication number: 20150180802
    Abstract: Using a hash function, an L2/L3 switch can produce an FID for a data packet. The L2/L3 switch can select, from among potentially several stored VLAN flooding tables, a particular VLAN flooding table that is associated with a particular VLAN on which the data packet is to be carried. The rows of the particular VLAN flooding table can specify different combinations of the particular VLAN's egress ports. The L2/L3 switch can locate, in the particular VLAN flooding table, a particular row that specifies the FID. The L2/L3 switch can read, from the particular row, a specified subset of the egress ports that are associated with the particular VLAN. The L2/L3 switch can transmit copies of the data packet out each of the egress ports specified in the subset, toward analytic servers connected to those egress ports.
    Type: Application
    Filed: June 30, 2014
    Publication date: June 25, 2015
    Inventors: Xiaochu Chen, Ivy Pei-Shan Hsu, Eswara Chinthalapati, Sanjeev Chhabria
  • Publication number: 20140204760
    Abstract: Techniques for optimizing traffic flows via MAC synchronization when server virtualization is used with dynamic routing are provided. In one embodiment, a first network device can store an interface MAC address of a second network device in an L2 forwarding table, where the first network device and the second network device are peer nodes in an MC-LAG cluster. Further, the first network device can enable a flag for the interface MAC address in the L2 forwarding table. When the first network device receives a data packet that includes the interface MAC address of the second network device as a destination MAC address, the first network device can determine that the interface MAC address is included in the L2 forwarding table with the flag enabled. The first network device can then perform a lookup into its L3 routing table, identify a next hop destination for the data packet, and route the packet to the destination.
    Type: Application
    Filed: October 7, 2013
    Publication date: July 24, 2014
    Applicant: Brocade Communications Systems, Inc.
    Inventors: Muhammad Durrani, Mukhtiar Shaikh, Eswara Chinthalapati, Yi Zhang, Michael William Chen, Sadashiv Kudlamath, Matthew Robert Eclavea