Patents by Inventor Kalyan Ghosh
Kalyan Ghosh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11711299Abstract: This disclosure describes various methods, systems, and devices related to mirrored traffic forwarding in a hybrid network. An example method includes receiving, from a source forwarder in a source network, a mirrored data packet. A session of the mirrored data packet may be identified based on a header of the mirrored data packet. A destination forwarder in a destination network may be identified based on the session. The destination network may be different than the source network. The mirrored data packet may be forwarded to the destination forwarder.Type: GrantFiled: April 30, 2020Date of Patent: July 25, 2023Assignee: Cisco Technology, Inc.Inventors: Xueqiang Ma, Dave Persaud, Kalyan Ghosh
-
Publication number: 20230137008Abstract: Disclosed herein is an authenticating system (150) for auctioning and delivering perishable goods. The system comprises a client tier (152) and a Service Provider (153); each having an electronic device (100) which is operably connected to a secure central cloud resident server (151) through Communication Network for performing auction and delivery activities of perishable goods. The system attaches an encrypted label containing quality attributes, food classification and preparation process to each auctioned item. The system performs batch scheduling of delivery with optimization of time and resource and identifies the closest delivery person (103). The consumer (101) accepts the delivery by decoding and verifying the encrypted label. The system ensures safe and authentic delivery of auctioned item.Type: ApplicationFiled: October 29, 2022Publication date: May 4, 2023Inventors: Eman Kalyan Ghosh, Devendra Tripathi, Dev Dutta, Amitava Roy Chowdhoury
-
Patent number: 11411799Abstract: Systems, methods, and computer readable storage mediums are disclosed for scalable data collection and aggregation of statistics for logical objects of an application centric network. An analytics agent running on a logical object of an application centric network is elected as one of a Designated Stats device (DSD) or a Member Stats device (MSD). If the analytics agent is defined as a DSD, the analytics agent receives data reported from a downstream MSD communicated over the analytics plane and aggregates data from the MSD belonging to the same access control list rule. If the analytics agent is defined as an MSD, the analytics agent selects a DSD and reports the statistics to that DSD over the analytics plane.Type: GrantFiled: December 29, 2020Date of Patent: August 9, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Sherman Ma, Kalyan Ghosh
-
Patent number: 11343234Abstract: Presented herein are methodologies for implementing multi-domain cloud security and ways to partition end-points in data center/cloud network topologies into hierarchical domains to increase security and key negotiation efficiency. The methodology includes receiving, from a first endpoint, at a cloud security protocol stack, a packet encrypted in accordance with a cloud security key negotiated between the first endpoint and a second endpoint; extracting a cloud security globally unique domain-id from the packet; querying a cloud security domain repository using the cloud security globally unique domain-id as an index to identify a first cloud security domain, among a plurality of cloud security domains, to which the first endpoint and the second endpoint belong; and selecting the first cloud security domain to process the packet.Type: GrantFiled: December 10, 2019Date of Patent: May 24, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Xueqiang Ma, Dave Persaud, Kalyan Ghosh
-
Patent number: 11233721Abstract: Disclosed is a method that includes calculating, at a collector receiving a data flow and via a hashing algorithm, all possible hashes associated with at least one virtual attribute associated with the data flow to yield resultant hash values. Based on the resultant hash values, the method includes computing a multicast address group and multicasting the data flow to n leafs based on the multicast address group. At respective other collectors, the method includes filtering received sub-flows of the data flow based on the resultant hashes, wherein if a respective hash is owned by a collector, the respective collector accepts and saves the sub-flow in a local switch collector database. A scalable, distributed netflow is possible with the ability to respond to queries for fabric-level netflow statistics even on virtual constructs.Type: GrantFiled: March 4, 2020Date of Patent: January 25, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Sivakumar Ganapathy, Rajagopalan Janakiraman, Kalyan Ghosh, Sapan Shah
-
Patent number: 11159412Abstract: Disclosed is a method that includes calculating, at a collector receiving a data flow and via a hashing algorithm, all possible hashes associated with at least one virtual attribute associated with the data flow to yield resultant hash values. Based on the resultant hash values, the method includes computing a multicast address group and multicasting the data flow to n leafs based on the multicast address group. At respective other collectors, the method includes filtering received sub-flows of the data flow based on the resultant hashes, wherein if a respective hash is owned by a collector, the respective collector accepts and saves the sub-flow in a local switch collector database. A scalable, distributed netflow is possible with the ability to respond to queries for fabric-level netflow statistics even on virtual constructs.Type: GrantFiled: March 4, 2020Date of Patent: October 26, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Sivakumar Ganapathy, Rajagopalan Janakiraman, Kalyan Ghosh, Sapan Shah
-
Publication number: 20210218673Abstract: This disclosure describes various methods, systems, and devices related to mirrored traffic forwarding in a hybrid network. An example method includes receiving, from a source forwarder in a source network, a mirrored data packet. A session of the mirrored data packet may be identified based on a header of the mirrored data packet. A destination forwarder in a destination network may be identified based on the session. The destination network may be different than the source network. The mirrored data packet may be forwarded to the destination forwarder.Type: ApplicationFiled: April 30, 2020Publication date: July 15, 2021Inventors: Xueqiang Ma, Dave Persaud, Kalyan Ghosh
-
Publication number: 20210176224Abstract: Presented herein are methodologies for implementing multi-domain cloud security and ways to partition end-points in data center/cloud network topologies into hierarchical domains to increase security and key negotiation efficiency. The methodology includes receiving, from a first endpoint, at a cloud security protocol stack, a packet encrypted in accordance with a cloud security key negotiated between the first endpoint and a second endpoint; extracting a cloud security globally unique domain-id from the packet; querying a cloud security domain repository using the cloud security globally unique domain-id as an index to identify a first cloud security domain, among a plurality of cloud security domains, to which the first endpoint and the second endpoint belong; and selecting the first cloud security domain to process the packet.Type: ApplicationFiled: December 10, 2019Publication date: June 10, 2021Inventors: Xueqiang Ma, Dave Persaud, Kalyan Ghosh
-
Publication number: 20210119854Abstract: Systems, methods, and computer readable storage mediums are disclosed for scalable data collection and aggregation of statistics for logical objects of an application centric network. An analytics agent running on a logical object of an application centric network is elected as one of a Designated Stats device (DSD) or a Member Stats device (MSD). If the analytics agent is defined as a DSD, the analytics agent receives data reported from a downstream MSD communicated over the analytics plane and aggregates data from the MSD belonging to the same access control list rule. If the analytics agent is defined as an MSD, the analytics agent selects a DSD and reports the statistics to that DSD over the analytics plane.Type: ApplicationFiled: December 29, 2020Publication date: April 22, 2021Inventors: Sherman Ma, Kalyan Ghosh
-
Patent number: 10892940Abstract: Systems, methods, and computer readable storage mediums are disclosed for scalable data collection and aggregation of statistics for logical objects of an application centric network. An analytics agent running on a logical object of an application centric network is elected as one of a Designated Stats device (DSD) or a Member Stats device (MSD). If the analytics agent is defined as a DSD, the analytics agent receives data reported from a downstream MSD communicated over the analytics plane and aggregates data from the MSD belonging to the same access control list rule. If the analytics agent is defined as an MSD, the analytics agent selects a DSD and reports the statistics to that DSD over the analytics plane.Type: GrantFiled: July 21, 2017Date of Patent: January 12, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Sherman Ma, Kalyan Ghosh
-
Publication number: 20200204474Abstract: Disclosed is a method that includes calculating, at a collector receiving a data flow and via a hashing algorithm, all possible hashes associated with at least one virtual attribute associated with the data flow to yield resultant hash values. Based on the resultant hash values, the method includes computing a multicast address group and multicasting the data flow to n leafs based on the multicast address group. At respective other collectors, the method includes filtering received sub-flows of the data flow based on the resultant hashes, wherein if a respective hash is owned by a collector, the respective collector accepts and saves the sub-flow in a local switch collector database. A scalable, distributed netflow is possible with the ability to respond to queries for fabric-level netflow statistics even on virtual constructs.Type: ApplicationFiled: March 4, 2020Publication date: June 25, 2020Inventors: Sivakumar Ganapathy, Rajagopalan Janakiraman, Kalyan Ghosh, Sapan Shah
-
Publication number: 20200204473Abstract: Disclosed is a method that includes calculating, at a collector receiving a data flow and via a hashing algorithm, all possible hashes associated with at least one virtual attribute associated with the data flow to yield resultant hash values. Based on the resultant hash values, the method includes computing a multicast address group and multicasting the data flow to n leafs based on the multicast address group. At respective other collectors, the method includes filtering received sub-flows of the data flow based on the resultant hashes, wherein if a respective hash is owned by a collector, the respective collector accepts and saves the sub-flow in a local switch collector database. A scalable, distributed netflow is possible with the ability to respond to queries for fabric-level netflow statistics even on virtual constructs.Type: ApplicationFiled: March 4, 2020Publication date: June 25, 2020Inventors: Sivakumar Ganapathy, Rajagopalan Janakiraman, Kalyan Ghosh, Sapan Shah
-
Patent number: 10601693Abstract: Disclosed is a method that includes calculating, at a collector receiving a data flow and via a hashing algorithm, all possible hashes associated with at least one virtual attribute associated with the data flow to yield resultant hash values. Based on the resultant hash values, the method includes computing a multicast address group and multicasting the data flow to n leafs based on the multicast address group. At respective other collectors, the method includes filtering received sub-flows of the data flow based on the resultant hashes, wherein if a respective hash is owned by a collector, the respective collector accepts and saves the sub-flow in a local switch collector database. A scalable, distributed netflow is possible with the ability to respond to queries for fabric-level netflow statistics even on virtual constructs.Type: GrantFiled: July 24, 2017Date of Patent: March 24, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Sivakumar Ganapathy, Rajagopalan Janakiraman, Kalyan Ghosh, Sapan Shah
-
Patent number: 10574481Abstract: Heterogeneous capabilities in an overlay fabric may be provided. First, it may be determined that a first link and a second link support a feature. Then the first link and the second link may be traversed with traffic between a host in a first Endpoint Group (EPG) connected to a first leaf switch and a second host in a second EPG connected to a second leaf switch when a topology preference for the feature is indicated for the traffic.Type: GrantFiled: July 23, 2018Date of Patent: February 25, 2020Assignee: Cisco Technology, Inc.Inventors: Rajagopalan Janakiraman, Ronak Desai, Kalyan Ghosh, Balaji Muthuvarathan
-
Publication number: 20200028711Abstract: Heterogeneous capabilities in an overlay fabric may be provided. First, it may be determined that a first link and a second link support a feature. Then the first link and the second link may be traversed with traffic between a host in a first Endpoint Group (EPG) connected to a first leaf switch and a second host in a second EPG connected to a second leaf switch when a topology preference for the feature is indicated for the traffic.Type: ApplicationFiled: July 23, 2018Publication date: January 23, 2020Applicant: Cisco Technology, Inc.Inventors: Rajagopalan Janakiraman, Ronak Desai, Kalyan Ghosh, Balaji Muthuvarathan
-
Publication number: 20190028325Abstract: Systems, methods, and computer readable storage mediums are disclosed for scalable data collection and aggregation of statistics for logical objects of an application centric network. An analytics agent running on a logical object of an application centric network is elected as one of a Designated Stats device (DSD) or a Member Stats device (MSD). If the analytics agent is defined as a DSD, the analytics agent receives data reported from a downstream MSD communicated over the analytics plane and aggregates data from the MSD belonging to the same access control list rule. If the analytics agent is defined as an MSD, the analytics agent selects a DSD and reports the statistics to that DSD over the analytics plane.Type: ApplicationFiled: July 21, 2017Publication date: January 24, 2019Inventors: Sherman Ma, Kalyan Ghosh
-
Publication number: 20190028376Abstract: Disclosed is a method that includes calculating, at a collector receiving a data flow and via a hashing algorithm, all possible hashes associated with at least one virtual attribute associated with the data flow to yield resultant hash values. Based on the resultant hash values, the method includes computing a multicast address group and multicasting the data flow to n leafs based on the multicast address group. At respective other collectors, the method includes filtering received sub-flows of the data flow based on the resultant hashes, wherein if a respective hash is owned by a collector, the respective collector accepts and saves the sub-flow in a local switch collector database. A scalable, distributed netflow is possible with the ability to respond to queries for fabric-level netflow statistics even on virtual constructs.Type: ApplicationFiled: July 24, 2017Publication date: January 24, 2019Inventors: Sivakumar Ganapathy, Rajagopalan Janakiraman, Kalyan Ghosh, Sapan Shah
-
Patent number: 9473357Abstract: Techniques are provided for optimizing bandwidth in a network. Information describing a network bandwidth capacity of a port extender device is received at a switch. The port extender device is connected to the switch. The port extender device is configured to provide ports for the switch. The network bandwidth capacity of the port extender device is compared to a minimum network bandwidth guarantee threshold. If the switch determines that the network bandwidth capacity of the port extender device is below the minimum network guarantee threshold, the switch sends to the port extender device a message configured to cause the port extender to deactivate one or more links between the port extender device and one or more servers in communication with the port extender device.Type: GrantFiled: January 24, 2014Date of Patent: October 18, 2016Assignee: Cisco Technology, Inc.Inventors: Bhuvan Mital, Rajagopal Subramaniyan, Lalitha Krishnan, Narasimhan G Mandeyam, Yiqing Zhu, Kalyan Ghosh, Dean Houari
-
Patent number: 9246849Abstract: A technique is provided for facilitating fabric membership login for an N_Port of a storage area network. A communication from a network node is received. The communication may include a portion of criteria associated with the N_Port. Using at least a portion of the portion of criteria, a virtual fabric identifier corresponding to a virtual fabric which is associated with the N_Port may be automatically identified. Fabric configuration information, which includes the virtual fabric identifier, may be automatically provided to the network node. A fabric login request from the N_Port to login to the virtual fabric may then be received. According to a specific embodiment, the communication may be transmitted from a network node to an F_Port on a Fibre Channel switch.Type: GrantFiled: October 6, 2014Date of Patent: January 26, 2016Assignee: Cisco Technology, Inc.Inventors: Gaurav Rastogi, Ramsundar Janakiraman, Kalyan Ghosh, Badri Ramaswamy, Joy J. Chatterjee
-
Publication number: 20150215169Abstract: Techniques are provided for optimizing bandwidth in a network. Information describing a network bandwidth capacity of a port extender device is received at a switch. The port extender device is connected to the switch. The port extender device is configured to provide ports for the switch. The network bandwidth capacity of the port extender device is compared to a minimum network bandwidth guarantee threshold. If the switch determines that the network bandwidth capacity of the port extender device is below the minimum network guarantee threshold, the switch sends to the port extender device a message configured to cause the port extender to deactivate one or more links between the port extender device and one or more servers in communication with the port extender device.Type: ApplicationFiled: January 24, 2014Publication date: July 30, 2015Applicant: Cisco Technology, Inc.Inventors: Bhuvan Mital, Rajagopal Subramaniyan, Lalitha Krishnan, Narasimhan G. Mandeyam, Yiqing Zhu, Kalyan Ghosh, Dean Houari