Patents by Inventor Joji Thomas Mekkattuparamban
Joji Thomas Mekkattuparamban has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11438236Abstract: Systems, methods, and computer-readable storage media are provided for managing connected data transfer sessions in a computing network. A controller included in the computing network can monitor connected data transfer sessions to determine whether a predetermined threshold has been met or exceeded and, if so, terminate at least one connected data transfer session in the computing network. The threshold can include a threshold number of connected data communication sessions and/or a threshold amount of resources utilized by the connected data communication sessions. The controller can terminate connected data transfer sessions until the total number of connected data communication sessions and/or threshold amount of resources falls below the threshold.Type: GrantFiled: September 9, 2020Date of Patent: September 6, 2022Assignee: Cisco Technology, Inc.Inventors: Joji Thomas Mekkattuparamban, Suraj Nellikar
-
Patent number: 11102059Abstract: Systems, methods, and computer-readable storage media are provided for managing status of state machines in a computing network. Various embodiments of the present technology can be used to track and maintain an active log associated with each state machine in a computing network. The active log of a state machine can be periodically analyzed at a predetermined time interval to determine an anticipated state of the state machine and a current state of the state machine. In response to determining that the state machine is in an inconsistent state (i.e., the anticipated state does not match the current state of the state machine), a suitable action can be taken to switch the current state of the state machine from the inconsistent state to a suitable new state.Type: GrantFiled: March 20, 2020Date of Patent: August 24, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Joji Thomas Mekkattuparamban, Michael Robinson
-
Publication number: 20200412618Abstract: Systems, methods, and computer-readable storage media are provided for managing connected data transfer sessions in a computing network. A controller included in the computing network can monitor connected data transfer sessions to determine whether a predetermined threshold has been met or exceeded and, if so, terminate at least one connected data transfer session in the computing network. The threshold can include a threshold number of connected data communication sessions and/or a threshold amount of resources utilized by the connected data communication sessions. The controller can terminate connected data transfer sessions until the total number of connected data communication sessions and/or threshold amount of resources falls below the threshold.Type: ApplicationFiled: September 9, 2020Publication date: December 31, 2020Inventors: Joji Thomas Mekkattuparamban, Suraj Nellikar
-
Patent number: 10791031Abstract: Systems, methods, and computer-readable storage media are provided for managing connected data transfer sessions in a computing network. A controller included in the computing network can monitor connected data transfer sessions to determine whether a predetermined threshold has been met or exceeded and, if so, terminate at least one connected data transfer session in the computing network. The threshold can include a threshold number of connected data communication sessions and/or a threshold amount of resources utilized by the connected data communication sessions. The controller can terminate connected data transfer sessions until the total number of connected data communication sessions and/or threshold amount of resources falls below the threshold.Type: GrantFiled: July 8, 2015Date of Patent: September 29, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Joji Thomas Mekkattuparamban, Suraj Nellikar
-
Publication number: 20200228394Abstract: Systems, methods, and computer-readable storage media are provided for managing status of state machines in a computing network. Various embodiments of the present technology can be used to track and maintain an active log associated with each state machine in a computing network. The active log of a state machine can be periodically analyzed at a predetermined time interval to determine an anticipated state of the state machine and a current state of the state machine. In response to determining that the state machine is in an inconsistent state (i.e., the anticipated state does not match the current state of the state machine), a suitable action can be taken to switch the current state of the state machine from the inconsistent state to a suitable new state.Type: ApplicationFiled: March 20, 2020Publication date: July 16, 2020Inventors: Joji Thomas Mekkattuparamban, Michael Robinson
-
Patent number: 10601642Abstract: Systems, methods, and computer-readable storage media are provided for managing status of state machines in a computing network. Various embodiments of the present technology can be used to track and maintain an active log associated with each state machine in a computing network. The active log of a state machine can be periodically analyzed at a predetermined time interval to determine an anticipated state of the state machine and a current state of the state machine. In response to determining that the state machine is in an inconsistent state (i.e., the anticipated state does not match the current state of the state machine), a suitable action can be taken to switch the current state of the state machine from the inconsistent state to a suitable new state.Type: GrantFiled: July 17, 2015Date of Patent: March 24, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Joji Thomas Mekkattuparamban, Michael Robinson
-
Patent number: 10320687Abstract: Systems, methods, and computer-readable media are provided for enforcing policy for upstream (e.g., traffic from an endpoint to the physical network layer or hardware fabric of a data center) flood traffic (e.g., broadcast, unknown unicast, or multicast traffic) originating from a virtual endpoint via a network fabric. In one embodiment, upstream flood traffic can be transmitted using a special multicast group to which only elements of the data center fabric (e.g., physical switches, routers) are subscribed. That is, upstream flood traffic is assigned to the special multicast group, resulting in unintended endpoints not receiving the flood traffic. However, the hardware fabric receives the flood traffic and will then enforce applicable policies to route the packets to intended endpoints.Type: GrantFiled: October 24, 2017Date of Patent: June 11, 2019Assignee: CISCO TECHNOLOGY, INC.Inventors: Joji Thomas Mekkattuparamban, Vijay Chander
-
Publication number: 20180063003Abstract: Systems, methods, and computer-readable media are provided for enforcing policy for upstream (e.g., traffic from an endpoint to the physical network layer or hardware fabric of a data center) flood traffic (e.g., broadcast, unknown unicast, or multicast traffic) originating from a virtual endpoint via a network fabric. In one embodiment, upstream flood traffic can be transmitted using a special multicast group to which only elements of the data center fabric (e.g., physical switches, routers) are subscribed. That is, upstream flood traffic is assigned to the special multicast group, resulting in unintended endpoints not receiving the flood traffic. However, the hardware fabric receives the flood traffic and will then enforce applicable policies to route the packets to intended endpoints.Type: ApplicationFiled: October 24, 2017Publication date: March 1, 2018Inventors: Joji Thomas Mekkattuparamban, Vijay Chander
-
Patent number: 9825814Abstract: Systems, methods, and computer-readable storage media are provided for dynamically setting an end point group for an end point. An endpoint can be assigned a default end point group when added to a network. For example, the default end point group can be a baseline port/security group which is considered an untrusted group. The end point can then be dynamically assigned an end point group based on a set of group selection rules. For example, the group selection rules can identify an end point group based on the MAC address or other attributes. When the end point is added to the network, the MAC address and/or other attributes of the end point can be determined and used to assign an end point group. As another example, an end point group can be assigned based on the amount of traffic or guest operation system.Type: GrantFiled: July 27, 2015Date of Patent: November 21, 2017Assignee: CISCO TECHNOLOGY, INC.Inventors: Joji Thomas Mekkattuparamban, Vijay Chander, Saurabh Jain, Van Lieu, Badhri Madabusi Vijayaraghavan, Praveen Jain, Munish Mehta, Michael R. Smith, Narender Enduri
-
Patent number: 9807020Abstract: Systems, methods, and computer-readable media are provided for enforcing policy for upstream (e.g., traffic from an endpoint to the physical network layer or hardware fabric of a data center) flood traffic (e.g., broadcast, unknown unicast, or multicast traffic) originating from a virtual endpoint via a network fabric. In one embodiment, upstream flood traffic can be transmitted using a special multicast group to which only elements of the data center fabric (e.g., physical switches, routers) are subscribed. That is, upstream flood traffic is assigned to the special multicast group, resulting in unintended endpoints not receiving the flood traffic. However, the hardware fabric receives the flood traffic and will then enforce applicable policies to route the packets to intended endpoints.Type: GrantFiled: July 7, 2015Date of Patent: October 31, 2017Assignee: Cisco Technology, Inc.Inventors: Joji Thomas Mekkattuparamban, Vijay Chander
-
Publication number: 20160352597Abstract: Systems, methods, and computer-readable storage media are provided for managing connected data transfer sessions in a computing network. A controller included in the computing network can monitor connected data transfer sessions to determine whether a predetermined threshold has been met or exceeded and, if so, terminate at least one connected data transfer session in the computing network. The threshold can include a threshold number of connected data communication sessions and/or a threshold amount of resources utilized by the connected data communication sessions. The controller can terminate connected data transfer sessions until the total number of connected data communication sessions and/or threshold amount of resources falls below the threshold.Type: ApplicationFiled: July 8, 2015Publication date: December 1, 2016Inventors: Joji Thomas Mekkattuparamban, Suraj Nellikar
-
Publication number: 20160352576Abstract: Systems, methods, and computer-readable storage media are provided for dynamically setting an end point group for an end point. An endpoint can be assigned a default end point group when added to a network. For example, the default end point group can be a baseline port/security group which is considered an untrusted group. The end point can then be dynamically assigned an end point group based on a set of group selection rules. For example, the group selection rules can identify an end point group based on the MAC address or other attributes. When the end point is added to the network, the MAC address and/or other attributes of the end point can be determined and used to assign an end point group. As another example, an end point group can be assigned based on the amount of traffic or guest operation system.Type: ApplicationFiled: July 27, 2015Publication date: December 1, 2016Inventors: Joji Thomas Mekkattuparamban, Vijay Chander, Saurabh Jain, Van Lieu, Badhri Madabusi Vijayaraghavan, Praveen Jain, Munish Mehta, Michael R. Smith, Narender Enduri
-
Publication number: 20160352566Abstract: Systems, methods, and computer-readable storage media are provided for managing status of state machines in a computing network. Various embodiments of the present technology can be used to track and maintain an active log associated with each state machine in a computing network. The active log of a state machine can be periodically analyzed at a predetermined time interval to determine an anticipated state of the state machine and a current state of the state machine. In response to determining that the state machine is in an inconsistent state (i.e., the anticipated state does not match the current state of the state machine), a suitable action can be taken to switch the current state of the state machine from the inconsistent state to a suitable new state.Type: ApplicationFiled: July 17, 2015Publication date: December 1, 2016Inventors: Joji Thomas Mekkattuparamban, Michael Robinson
-
Publication number: 20160330125Abstract: Systems, methods, and computer-readable media are provided for enforcing policy for upstream (e.g., traffic from an endpoint to the physical network layer or hardware fabric of a data center) flood traffic (e.g., broadcast, unknown unicast, or multicast traffic) originating from a virtual endpoint via a network fabric. In one embodiment, upstream flood traffic can be transmitted using a special multicast group to which only elements of the data center fabric (e.g., physical switches, routers) are subscribed. That is, upstream flood traffic is assigned to the special multicast group, resulting in unintended endpoints not receiving the flood traffic. However, the hardware fabric receives the flood traffic and will then enforce applicable policies to route the packets to intended endpoints.Type: ApplicationFiled: July 7, 2015Publication date: November 10, 2016Inventors: Joji Thomas Mekkattuparamban, Vijay Chander
-
Patent number: 8705366Abstract: Flows of packets are dynamically mapped to resource queues. Flows of packets are received at a network device to be routed from the network device in a network. Each flow comprises packets to be sent from a source to a connection. Data is stored for a queue allocation table that maintains a plurality of buckets to which received packets for a flow are assigned and indicating which of a plurality of resource queues are allocated for respective buckets. For each packet in a flow, a hash function is computed from values in a header of the packet and the packet is assigned to one of the plurality of buckets based on the computed hash function. One of a plurality of resource queues is allocated for each bucket to which packets are assigned based on the computed hash function.Type: GrantFiled: January 23, 2012Date of Patent: April 22, 2014Assignee: Cisco Technology, Inc.Inventors: Joji Thomas Mekkattuparamban, Narender Enduri, Udayakumar Srinivasan
-
Publication number: 20130188494Abstract: Flows of packets are dynamically mapped to resource queues. Flows of packets are received at a network device to be routed from the network device in a network. Each flow comprises packets to be sent from a source to a connection. Data is stored for a queue allocation table that maintains a plurality of buckets to which received packets for a flow are assigned and indicating which of a plurality of resource queues are allocated for respective buckets. For each packet in a flow, a hash function is computed from values in a header of the packet and the packet is assigned to one of the plurality of buckets based on the computed hash function. One of a plurality of resource queues is allocated for each bucket to which packets are assigned based on the computed hash function.Type: ApplicationFiled: January 23, 2012Publication date: July 25, 2013Applicant: CISCO TECHNOLOGY, INC.Inventors: Joji Thomas Mekkattuparamban, Narender Enduri, Udayakumar Srinivasan
-
Patent number: 8335172Abstract: Techniques are provided herein to add multicast media streams to teleconferencing sessions without the unwanted side effects that occur when a speaker's own media is echoed back to the speaker. Multicast and unicast media streams are generated by a network device, e.g., a conference bridge, and distributed to any number of endpoints, e.g., conference endpoints. A media selector is provided that selects the appropriate multicast or unicast media stream for forwarding to an associated network endpoint.Type: GrantFiled: June 10, 2010Date of Patent: December 18, 2012Assignee: Cisco Technology, Inc.Inventors: Cheng-Jia Lai, Jing Li, Din-I Tsai, Joji Thomas Mekkattuparamban, Ming Chen
-
Publication number: 20110305170Abstract: Techniques are provided herein to add multicast media streams to teleconferencing sessions without the unwanted side effects that occur when a speaker's own media is echoed back to the speaker. Multicast and unicast media streams are generated by a network device, e.g., a conference bridge, and distributed to any number of endpoints, e.g., conference endpoints. A media selector is provided that selects the appropriate multicast or unicast media stream for forwarding to an associated network endpoint.Type: ApplicationFiled: June 10, 2010Publication date: December 15, 2011Applicant: CISCO TECHNOLOGY, INC.Inventors: Cheng-Jia Lai, Jing Li, Din-I Tsai, Joji Thomas Mekkattuparamban, Ming Chen
-
Patent number: 8064362Abstract: In an example embodiment disclosed herein, Wide Area Network optimization modules coupled to peers are configured to maintain peer routing tables. The peer routing table (PRT) is used by the Wide Area Network optimization module to determine the peer for a given destination, such as an Internet Protocol “IP” destination. Each peer is responsible for advertising to other peers which networks the peer is able to reach. This information is advertised when a tunnel is first created and subsequently whenever necessary. Initially, a peer sends out a list of entries corresponding to its directly connected networks, with the exception of the network connected to the interface on which the peer is advertising (e.g. the network used for the tunnel). This enables other peers on the network to populate their PRT entries.Type: GrantFiled: August 21, 2008Date of Patent: November 22, 2011Assignee: Cisco Technology, Inc.Inventors: Joji Thomas Mekkattuparamban, Ming Chen, Akshya Kumar Singh, Jesper Skriver, Vivek Datar
-
Patent number: 7787379Abstract: Described herein is a flow control scheme suitably adaptable to Transmission Control Protocol (TCP) and Stream Control Transmission Protocol (SCTP). In an example embodiment, the guaranteed and maximum allowable bandwidths are employed to determine the size of the congestion window. For example, the flow congestion window size starts proportional to the guaranteed bandwidth and increases until reaching the maximum allowable bandwidth. In particular embodiments, a fixed value is used for determining how fast the congestion window increases. For example the congestion window may increase exponentially while the current size of the congestion window is at or below a fixed value, and increase linearly when the current size of the congestion window is above the fixed value. In an example embodiment, the fixed value does not change even if a collision is detected and the current amount of unacknowledged data allowed is reset to an initial value.Type: GrantFiled: June 3, 2008Date of Patent: August 31, 2010Assignee: Cisco Technology, Inc.Inventors: Joji Thomas Mekkattuparamban, Akshya Kumar Singh