Patents by Inventor Sreenivas Voruganti

Sreenivas Voruganti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9882921
    Abstract: A computer-implemented method for detecting cache-poisoning attacks in networks using SDPs may include maintaining a cache of service information that identifies services provided by client devices connected to a network using an SDP. The method may also include detecting a cache-poisoning attack by (1) receiving, from a client device connected to the network, an SDP message related to a service allegedly provided via the network, (2) identifying, within the SDP message, an attribute of the service allegedly provided via the network, and then (3) determining that the client device is attempting to corrupt the cache of service information by determining that the identified attribute of the service suggests that the service is illegitimate. Finally, the method may include performing a security action to mitigate the cache-poisoning attack in response to detecting the cache-poisoning attack. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: January 30, 2016
    Date of Patent: January 30, 2018
    Assignee: Juniper Networks, Inc.
    Inventors: Anil Kaushik, Vineet Verma, Stephen Grau, Sreenivas Voruganti, Abhishek Kumar
  • Patent number: 9467855
    Abstract: A computer-implemented method for detecting rogue client devices connected to wireless hotspots may include maintaining at least one illegitimate authentication identifier that appears to rogue client devices to facilitate authentication with an external network via a wireless hotspot. The method may also include providing the illegitimate authentication identifier to one or more client devices connected to the wireless hotspot. The method may further include receiving an authentication request to authenticate the client device with at least one external network via the wireless hotspot. The method may additionally include determining that the authentication request includes the illegitimate authentication identifier. Finally, the method may include determining that the client device is a rogue device based at least in part on the illegitimate authentication identifier being included in the authentication request. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 15, 2015
    Date of Patent: October 11, 2016
    Assignee: Juniper Networks, Inc
    Inventors: Anil Kaushik, Stephen Grau, Sainath Reddy Cheruvu, Sreenivas Voruganti
  • Patent number: 9282115
    Abstract: A computer-implemented method for detecting cache-poisoning attacks in networks using SDPs may include maintaining a cache of service information that identifies services provided by client devices connected to a network using an SDP. The method may also include detecting a cache-poisoning attack by (1) receiving, from a client device connected to the network, an SDP message related to a service allegedly provided via the network, (2) identifying, within the SDP message, an attribute of the service allegedly provided via the network, and then (3) determining that the client device is attempting to corrupt the cache of service information by determining that the identified attribute of the service suggests that the service is illegitimate. Finally, the method may include performing a security action to mitigate the cache-poisoning attack in response to detecting the cache-poisoning attack. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: January 3, 2014
    Date of Patent: March 8, 2016
    Assignee: Juniper Networks, Inc.
    Inventors: Anil Kaushik, Vineet Verma, Stephen Grau, Sreenivas Voruganti, Abhishek Kumar
  • Patent number: 9088894
    Abstract: A computer-implemented method for detecting rogue client devices connected to wireless hotspots may include maintaining at least one illegitimate authentication identifier that appears to rogue client devices to facilitate authentication with an external network via a wireless hotspot. The method may also include providing the illegitimate authentication identifier to one or more client devices connected to the wireless hotspot. The method may further include receiving an authentication request to authenticate the client device with at least one external network via the wireless hotspot. The method may additionally include determining that the authentication request includes the illegitimate authentication identifier. Finally, the method may include determining that the client device is a rogue device based at least in part on the illegitimate authentication identifier being included in the authentication request. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 25, 2013
    Date of Patent: July 21, 2015
    Assignee: Juniper Networks, Inc.
    Inventors: Anil Kaushik, Stephen Grau, Sainath Reddy Cheruvu, Sreenivas Voruganti
  • Patent number: 9054996
    Abstract: A network device receives initial policer limits for a plurality of over-subscribing ingress ports, where the initial policer limits are based on existing bandwidth limits for an over-subscribed egress port associated with the over-subscribing ingress ports. The network device receives a high threshold watermark and a low threshold watermark for bandwidth usage of the over-subscribed egress port, and identifies a queue, associated with the over-subscribed egress port, with values outside the high threshold watermark or the low threshold watermark. The network device reduces the initial policer limits for the plurality of over-subscribing ingress ports when the queue has values above the high threshold watermark, and increases the initial policer limits for the plurality of over-subscribing ingress ports when the queue has values below the low threshold watermark.
    Type: Grant
    Filed: December 24, 2009
    Date of Patent: June 9, 2015
    Assignee: Juniper Networks, Inc.
    Inventors: Sreenivas Voruganti, Sainath Cheruvu, Ganesh Rajagopalan, Rahul Jain
  • Patent number: 8879393
    Abstract: A network device implements automatic configuration of Quality of Service (QoS) parameters in response to operator specification of a relatively few and easily understandable “high level” parameters such as, for example, latency requirements or an acceptable rate of packet drops. In one implementation, a network device may receive user preference information that relates to a Quality of Service (QoS) for network traffic passing through the network device and may measure traffic patterns through the network device. The device further generates a configuration template based on the measured traffic patterns and on the user preference information transmit the data in an order of transmission that is prioritized according to a bandwidth allocation policy defined by the configuration template.
    Type: Grant
    Filed: May 31, 2012
    Date of Patent: November 4, 2014
    Assignee: Juniper Networks, Inc.
    Inventors: Sreenivas Voruganti, Ashish Pal, Balaji Murali, Shankar Ramanathan, Rahul Jain
  • Patent number: 8848724
    Abstract: Methods and systems consistent with the present invention provide dynamic buffer allocation to a plurality of queues of differing priority levels. Each queue is allocated fixed minimum number of buffers that will not be de-allocated during buffer reassignment. The rest of the buffers are intelligently and dynamically assigned to each queue depending on their current need. The system then monitors and learns the incoming traffic pattern and resulting drops in each queue due to traffic bursts. Based on this information, the system readjusts allocation of buffers to each traffic class. If a higher priority queue does not need the buffers, it gradually relinquishes them. These buffers are then assigned to other queues based on the input traffic pattern and resultant drops. These buffers are aggressively reclaimed and reassigned to higher priority queues when needed.
    Type: Grant
    Filed: April 16, 2012
    Date of Patent: September 30, 2014
    Assignee: Juniper Networks, Inc.
    Inventors: Sreenivas Voruganti, Atul Mahamuni
  • Patent number: 8848529
    Abstract: A method includes receiving network information for calculating weighted round-robin (WRR) weights, calculating WRR weights associated with queues based on the network information, and determining whether a highest common factor (HCF) exists in relation to the calculated WRR weights. The method further includes reducing the calculated WRR weights in accordance with the HCF, when it is determined that the HCF exists, and performing a WRR scheduling of packets, stored in the queues, based on the reduced WRR weights.
    Type: Grant
    Filed: December 31, 2012
    Date of Patent: September 30, 2014
    Assignee: Juniper Networks, Inc.
    Inventors: Sreenivas Voruganti, Ankur Singla, Pal Ashish, Balaji Murali, Vedamurthy A Joshi
  • Patent number: 8462815
    Abstract: A network device operating in a cut-through mode receives a current packet of an unknown length and determines if there is a known length value of a previous packet in a processing cycle associated with the current packet. When there is no known length value of the previous packet, the network device applies, to the current packet, an estimated length value for the current packet. When there is a known length value of the previous packet, the network device applies, to the current packet, the known length value of the previous packet. The network device processes the current packet based on one of the estimated length value or the known length value of the previous packet.
    Type: Grant
    Filed: September 2, 2010
    Date of Patent: June 11, 2013
    Assignee: Juniper Networks, Inc.
    Inventors: Sreenivas Voruganti, Balaji Murali, Ashish Pal, Rahul Jain, Sainath Cheruvu
  • Patent number: 8351332
    Abstract: A method includes receiving network information for calculating weighted round-robin (WRR) weights, calculating WRR weights associated with queues based on the network information, and determining whether a highest common factor (HCF) exists in relation to the calculated WRR weights. The method further includes reducing the calculated WRR weights in accordance with the HCF, when it is determined that the HCF exists, and performing a WRR scheduling of packets, stored in the queues, based on the reduced WRR weights.
    Type: Grant
    Filed: February 10, 2012
    Date of Patent: January 8, 2013
    Assignee: Juniper Networks, Inc.
    Inventors: Sreenivas Voruganti, Ankur Singla, Pal Ashish, Balaji Murali, Vedamurthy A. Joshi
  • Publication number: 20120275464
    Abstract: Methods and systems consistent with the present invention provide dynamic buffer allocation to a plurality of queues of differing priority levels. Each queue is allocated fixed minimum number of buffers that will not be de-allocated during buffer reassignment. The rest of the buffers are intelligently and dynamically assigned to each queue depending on their current need. The system then monitors and learns the incoming traffic pattern and resulting drops in each queue due to traffic bursts. Based on this information, the system readjusts allocation of buffers to each traffic class. If a higher priority queue does not need the buffers, it gradually relinquishes them. These buffers are then assigned to other queues based on the input traffic pattern and resultant drops. These buffers are aggressively reclaimed and reassigned to higher priority queues when needed.
    Type: Application
    Filed: April 16, 2012
    Publication date: November 1, 2012
    Applicant: JUNIPER NETWORKS, INC.
    Inventors: Sreenivas Voruganti, Atul Mahamuni
  • Publication number: 20120243412
    Abstract: A network device implements automatic configuration of Quality of Service (QoS) parameters in response to operator specification of a relatively few and easily understandable “high level” parameters such as, for example, latency requirements or an acceptable rate of packet drops. In one implementation, a network device may receive user preference information that relates to a Quality of Service (QoS) for network traffic passing through the network device and may measure traffic patterns through the network device. The device further generates a configuration template based on the measured traffic patterns and on the user preference information transmit the data in an order of transmission that is prioritized according to a bandwidth allocation policy defined by the configuration template.
    Type: Application
    Filed: May 31, 2012
    Publication date: September 27, 2012
    Applicant: Juniper Networks, Inc.
    Inventors: Sreenivas Voruganti, Ashish Pal, Balaji Murali, Shankar Ramanathan, Rahul Jain
  • Patent number: 8213453
    Abstract: A network device implements automatic configuration of Quality of Service (QoS) parameters in response to operator specification of a relatively few and easily understandable “high level” parameters such as, for example, latency requirements or an acceptable rate of packet drops. In one implementation, a network device may receive user preference information that relates to a Quality of Service (QoS) for network traffic passing through the network device and may measure traffic patterns through the network device. The device further generates a configuration template based on the measured traffic patterns and on the user preference information transmit the data in an order of transmission that is prioritized according to a bandwidth allocation policy defined by the configuration template.
    Type: Grant
    Filed: August 7, 2009
    Date of Patent: July 3, 2012
    Assignee: Juniper Networks, Inc.
    Inventors: Sreenivas Voruganti, Ashish Pal, Balaji Murali, Shankar Ramanathan, Rahul Jain
  • Publication number: 20120140773
    Abstract: A method includes receiving network information for calculating weighted round-robin (WRR) weights, calculating WRR weights associated with queues based on the network information, and determining whether a highest common factor (HCF) exists in relation to the calculated WRR weights. The method further includes reducing the calculated WRR weights in accordance with the HCF, when it is determined that the HCF exists, and performing a WRR scheduling of packets, stored in the queues, based on the reduced WRR weights.
    Type: Application
    Filed: February 10, 2012
    Publication date: June 7, 2012
    Applicant: JUNIPER NETWORKS, INC.
    Inventors: Sreenivas VORUGANTI, Ankur SINGLA, Pal ASHISH, Balaji MURALI, Vedamurthy A. JOSHI
  • Patent number: 8160085
    Abstract: Methods and systems consistent with the present invention provide dynamic buffer allocation to a plurality of queues of differing priority levels. Each queue is allocated fixed minimum number of buffers that will not be de-allocated during buffer reassignment. The rest of the buffers are intelligently and dynamically assigned to each queue depending on their current need. The system then monitors and learns the incoming traffic pattern and resulting drops in each queue due to traffic bursts. Based on this information, the system readjusts allocation of buffers to each traffic class. If a higher priority queue does not need the buffers, it gradually relinquishes them. These buffers are then assigned to other queues based on the input traffic pattern and resultant drops. These buffers are aggressively reclaimed and reassigned to higher priority queues when needed.
    Type: Grant
    Filed: December 21, 2007
    Date of Patent: April 17, 2012
    Assignee: Juniper Networks, Inc.
    Inventors: Sreenivas Voruganti, Atul Mahamuni
  • Patent number: 8144584
    Abstract: A method includes receiving network information for calculating weighted round-robin (WRR) weights, calculating WRR weights associated with queues based on the network information, and determining whether a highest common factor (HCF) exists in relation to the calculated WRR weights. The method further includes reducing the calculated WRR weights in accordance with the HCF, when it is determined that the HCF exists, and performing a WRR scheduling of packets, stored in the queues, based on the reduced WRR weights.
    Type: Grant
    Filed: July 20, 2009
    Date of Patent: March 27, 2012
    Assignee: Juniper Networks, Inc.
    Inventors: Sreenivas Voruganti, Ankur Singla, Pal Ashish, Balaji Murali, Vedamurthy A. Joshi
  • Publication number: 20120057601
    Abstract: A network device operating in a cut-through mode receives a current packet of an unknown length and determines if there is a known length value of a previous packet in a processing cycle associated with the current packet. When there is no known length value of the previous packet, the network device applies, to the current packet, an estimated length value for the current packet. When there is a known length value of the previous packet, the network device applies, to the current packet, the known length value of the previous packet. The network device processes the current packet based on one of the estimated length value or the known length value of the previous packet.
    Type: Application
    Filed: September 2, 2010
    Publication date: March 8, 2012
    Applicant: JUNIPER NETWORKS, INC.
    Inventors: Sreenivas Voruganti, Balaji Murali, Ashish Pal, Rahul Jain, Sainath Cheruvu
  • Publication number: 20090161684
    Abstract: Methods and systems consistent with the present invention provide dynamic buffer allocation to a plurality of queues of differing priority levels. Each queue is allocated fixed minimum number of buffers that will not be de-allocated during buffer reassignment. The rest of the buffers are intelligently and dynamically assigned to each queue depending on their current need. The system then monitors and learns the incoming traffic pattern and resulting drops in each queue due to traffic bursts. Based on this information, the system readjusts allocation of buffers to each traffic class. If a higher priority queue does not need the buffers, it gradually relinquishes them. These buffers are then assigned to other queues based on the input traffic pattern and resultant drops. These buffers are aggressively reclaimed and reassigned to higher priority queues when needed.
    Type: Application
    Filed: December 21, 2007
    Publication date: June 25, 2009
    Inventors: Sreenivas Voruganti, Atul Mahamuni