Patents by Inventor Sreenivas Voruganti
Sreenivas Voruganti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9882921Abstract: A computer-implemented method for detecting cache-poisoning attacks in networks using SDPs may include maintaining a cache of service information that identifies services provided by client devices connected to a network using an SDP. The method may also include detecting a cache-poisoning attack by (1) receiving, from a client device connected to the network, an SDP message related to a service allegedly provided via the network, (2) identifying, within the SDP message, an attribute of the service allegedly provided via the network, and then (3) determining that the client device is attempting to corrupt the cache of service information by determining that the identified attribute of the service suggests that the service is illegitimate. Finally, the method may include performing a security action to mitigate the cache-poisoning attack in response to detecting the cache-poisoning attack. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: January 30, 2016Date of Patent: January 30, 2018Assignee: Juniper Networks, Inc.Inventors: Anil Kaushik, Vineet Verma, Stephen Grau, Sreenivas Voruganti, Abhishek Kumar
-
Patent number: 9467855Abstract: A computer-implemented method for detecting rogue client devices connected to wireless hotspots may include maintaining at least one illegitimate authentication identifier that appears to rogue client devices to facilitate authentication with an external network via a wireless hotspot. The method may also include providing the illegitimate authentication identifier to one or more client devices connected to the wireless hotspot. The method may further include receiving an authentication request to authenticate the client device with at least one external network via the wireless hotspot. The method may additionally include determining that the authentication request includes the illegitimate authentication identifier. Finally, the method may include determining that the client device is a rogue device based at least in part on the illegitimate authentication identifier being included in the authentication request. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: June 15, 2015Date of Patent: October 11, 2016Assignee: Juniper Networks, IncInventors: Anil Kaushik, Stephen Grau, Sainath Reddy Cheruvu, Sreenivas Voruganti
-
Patent number: 9282115Abstract: A computer-implemented method for detecting cache-poisoning attacks in networks using SDPs may include maintaining a cache of service information that identifies services provided by client devices connected to a network using an SDP. The method may also include detecting a cache-poisoning attack by (1) receiving, from a client device connected to the network, an SDP message related to a service allegedly provided via the network, (2) identifying, within the SDP message, an attribute of the service allegedly provided via the network, and then (3) determining that the client device is attempting to corrupt the cache of service information by determining that the identified attribute of the service suggests that the service is illegitimate. Finally, the method may include performing a security action to mitigate the cache-poisoning attack in response to detecting the cache-poisoning attack. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: January 3, 2014Date of Patent: March 8, 2016Assignee: Juniper Networks, Inc.Inventors: Anil Kaushik, Vineet Verma, Stephen Grau, Sreenivas Voruganti, Abhishek Kumar
-
Patent number: 9088894Abstract: A computer-implemented method for detecting rogue client devices connected to wireless hotspots may include maintaining at least one illegitimate authentication identifier that appears to rogue client devices to facilitate authentication with an external network via a wireless hotspot. The method may also include providing the illegitimate authentication identifier to one or more client devices connected to the wireless hotspot. The method may further include receiving an authentication request to authenticate the client device with at least one external network via the wireless hotspot. The method may additionally include determining that the authentication request includes the illegitimate authentication identifier. Finally, the method may include determining that the client device is a rogue device based at least in part on the illegitimate authentication identifier being included in the authentication request. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: September 25, 2013Date of Patent: July 21, 2015Assignee: Juniper Networks, Inc.Inventors: Anil Kaushik, Stephen Grau, Sainath Reddy Cheruvu, Sreenivas Voruganti
-
Patent number: 9054996Abstract: A network device receives initial policer limits for a plurality of over-subscribing ingress ports, where the initial policer limits are based on existing bandwidth limits for an over-subscribed egress port associated with the over-subscribing ingress ports. The network device receives a high threshold watermark and a low threshold watermark for bandwidth usage of the over-subscribed egress port, and identifies a queue, associated with the over-subscribed egress port, with values outside the high threshold watermark or the low threshold watermark. The network device reduces the initial policer limits for the plurality of over-subscribing ingress ports when the queue has values above the high threshold watermark, and increases the initial policer limits for the plurality of over-subscribing ingress ports when the queue has values below the low threshold watermark.Type: GrantFiled: December 24, 2009Date of Patent: June 9, 2015Assignee: Juniper Networks, Inc.Inventors: Sreenivas Voruganti, Sainath Cheruvu, Ganesh Rajagopalan, Rahul Jain
-
Patent number: 8879393Abstract: A network device implements automatic configuration of Quality of Service (QoS) parameters in response to operator specification of a relatively few and easily understandable “high level” parameters such as, for example, latency requirements or an acceptable rate of packet drops. In one implementation, a network device may receive user preference information that relates to a Quality of Service (QoS) for network traffic passing through the network device and may measure traffic patterns through the network device. The device further generates a configuration template based on the measured traffic patterns and on the user preference information transmit the data in an order of transmission that is prioritized according to a bandwidth allocation policy defined by the configuration template.Type: GrantFiled: May 31, 2012Date of Patent: November 4, 2014Assignee: Juniper Networks, Inc.Inventors: Sreenivas Voruganti, Ashish Pal, Balaji Murali, Shankar Ramanathan, Rahul Jain
-
Patent number: 8848724Abstract: Methods and systems consistent with the present invention provide dynamic buffer allocation to a plurality of queues of differing priority levels. Each queue is allocated fixed minimum number of buffers that will not be de-allocated during buffer reassignment. The rest of the buffers are intelligently and dynamically assigned to each queue depending on their current need. The system then monitors and learns the incoming traffic pattern and resulting drops in each queue due to traffic bursts. Based on this information, the system readjusts allocation of buffers to each traffic class. If a higher priority queue does not need the buffers, it gradually relinquishes them. These buffers are then assigned to other queues based on the input traffic pattern and resultant drops. These buffers are aggressively reclaimed and reassigned to higher priority queues when needed.Type: GrantFiled: April 16, 2012Date of Patent: September 30, 2014Assignee: Juniper Networks, Inc.Inventors: Sreenivas Voruganti, Atul Mahamuni
-
Patent number: 8848529Abstract: A method includes receiving network information for calculating weighted round-robin (WRR) weights, calculating WRR weights associated with queues based on the network information, and determining whether a highest common factor (HCF) exists in relation to the calculated WRR weights. The method further includes reducing the calculated WRR weights in accordance with the HCF, when it is determined that the HCF exists, and performing a WRR scheduling of packets, stored in the queues, based on the reduced WRR weights.Type: GrantFiled: December 31, 2012Date of Patent: September 30, 2014Assignee: Juniper Networks, Inc.Inventors: Sreenivas Voruganti, Ankur Singla, Pal Ashish, Balaji Murali, Vedamurthy A Joshi
-
Patent number: 8462815Abstract: A network device operating in a cut-through mode receives a current packet of an unknown length and determines if there is a known length value of a previous packet in a processing cycle associated with the current packet. When there is no known length value of the previous packet, the network device applies, to the current packet, an estimated length value for the current packet. When there is a known length value of the previous packet, the network device applies, to the current packet, the known length value of the previous packet. The network device processes the current packet based on one of the estimated length value or the known length value of the previous packet.Type: GrantFiled: September 2, 2010Date of Patent: June 11, 2013Assignee: Juniper Networks, Inc.Inventors: Sreenivas Voruganti, Balaji Murali, Ashish Pal, Rahul Jain, Sainath Cheruvu
-
Patent number: 8351332Abstract: A method includes receiving network information for calculating weighted round-robin (WRR) weights, calculating WRR weights associated with queues based on the network information, and determining whether a highest common factor (HCF) exists in relation to the calculated WRR weights. The method further includes reducing the calculated WRR weights in accordance with the HCF, when it is determined that the HCF exists, and performing a WRR scheduling of packets, stored in the queues, based on the reduced WRR weights.Type: GrantFiled: February 10, 2012Date of Patent: January 8, 2013Assignee: Juniper Networks, Inc.Inventors: Sreenivas Voruganti, Ankur Singla, Pal Ashish, Balaji Murali, Vedamurthy A. Joshi
-
Publication number: 20120275464Abstract: Methods and systems consistent with the present invention provide dynamic buffer allocation to a plurality of queues of differing priority levels. Each queue is allocated fixed minimum number of buffers that will not be de-allocated during buffer reassignment. The rest of the buffers are intelligently and dynamically assigned to each queue depending on their current need. The system then monitors and learns the incoming traffic pattern and resulting drops in each queue due to traffic bursts. Based on this information, the system readjusts allocation of buffers to each traffic class. If a higher priority queue does not need the buffers, it gradually relinquishes them. These buffers are then assigned to other queues based on the input traffic pattern and resultant drops. These buffers are aggressively reclaimed and reassigned to higher priority queues when needed.Type: ApplicationFiled: April 16, 2012Publication date: November 1, 2012Applicant: JUNIPER NETWORKS, INC.Inventors: Sreenivas Voruganti, Atul Mahamuni
-
Publication number: 20120243412Abstract: A network device implements automatic configuration of Quality of Service (QoS) parameters in response to operator specification of a relatively few and easily understandable “high level” parameters such as, for example, latency requirements or an acceptable rate of packet drops. In one implementation, a network device may receive user preference information that relates to a Quality of Service (QoS) for network traffic passing through the network device and may measure traffic patterns through the network device. The device further generates a configuration template based on the measured traffic patterns and on the user preference information transmit the data in an order of transmission that is prioritized according to a bandwidth allocation policy defined by the configuration template.Type: ApplicationFiled: May 31, 2012Publication date: September 27, 2012Applicant: Juniper Networks, Inc.Inventors: Sreenivas Voruganti, Ashish Pal, Balaji Murali, Shankar Ramanathan, Rahul Jain
-
Patent number: 8213453Abstract: A network device implements automatic configuration of Quality of Service (QoS) parameters in response to operator specification of a relatively few and easily understandable “high level” parameters such as, for example, latency requirements or an acceptable rate of packet drops. In one implementation, a network device may receive user preference information that relates to a Quality of Service (QoS) for network traffic passing through the network device and may measure traffic patterns through the network device. The device further generates a configuration template based on the measured traffic patterns and on the user preference information transmit the data in an order of transmission that is prioritized according to a bandwidth allocation policy defined by the configuration template.Type: GrantFiled: August 7, 2009Date of Patent: July 3, 2012Assignee: Juniper Networks, Inc.Inventors: Sreenivas Voruganti, Ashish Pal, Balaji Murali, Shankar Ramanathan, Rahul Jain
-
Publication number: 20120140773Abstract: A method includes receiving network information for calculating weighted round-robin (WRR) weights, calculating WRR weights associated with queues based on the network information, and determining whether a highest common factor (HCF) exists in relation to the calculated WRR weights. The method further includes reducing the calculated WRR weights in accordance with the HCF, when it is determined that the HCF exists, and performing a WRR scheduling of packets, stored in the queues, based on the reduced WRR weights.Type: ApplicationFiled: February 10, 2012Publication date: June 7, 2012Applicant: JUNIPER NETWORKS, INC.Inventors: Sreenivas VORUGANTI, Ankur SINGLA, Pal ASHISH, Balaji MURALI, Vedamurthy A. JOSHI
-
Patent number: 8160085Abstract: Methods and systems consistent with the present invention provide dynamic buffer allocation to a plurality of queues of differing priority levels. Each queue is allocated fixed minimum number of buffers that will not be de-allocated during buffer reassignment. The rest of the buffers are intelligently and dynamically assigned to each queue depending on their current need. The system then monitors and learns the incoming traffic pattern and resulting drops in each queue due to traffic bursts. Based on this information, the system readjusts allocation of buffers to each traffic class. If a higher priority queue does not need the buffers, it gradually relinquishes them. These buffers are then assigned to other queues based on the input traffic pattern and resultant drops. These buffers are aggressively reclaimed and reassigned to higher priority queues when needed.Type: GrantFiled: December 21, 2007Date of Patent: April 17, 2012Assignee: Juniper Networks, Inc.Inventors: Sreenivas Voruganti, Atul Mahamuni
-
Patent number: 8144584Abstract: A method includes receiving network information for calculating weighted round-robin (WRR) weights, calculating WRR weights associated with queues based on the network information, and determining whether a highest common factor (HCF) exists in relation to the calculated WRR weights. The method further includes reducing the calculated WRR weights in accordance with the HCF, when it is determined that the HCF exists, and performing a WRR scheduling of packets, stored in the queues, based on the reduced WRR weights.Type: GrantFiled: July 20, 2009Date of Patent: March 27, 2012Assignee: Juniper Networks, Inc.Inventors: Sreenivas Voruganti, Ankur Singla, Pal Ashish, Balaji Murali, Vedamurthy A. Joshi
-
Publication number: 20120057601Abstract: A network device operating in a cut-through mode receives a current packet of an unknown length and determines if there is a known length value of a previous packet in a processing cycle associated with the current packet. When there is no known length value of the previous packet, the network device applies, to the current packet, an estimated length value for the current packet. When there is a known length value of the previous packet, the network device applies, to the current packet, the known length value of the previous packet. The network device processes the current packet based on one of the estimated length value or the known length value of the previous packet.Type: ApplicationFiled: September 2, 2010Publication date: March 8, 2012Applicant: JUNIPER NETWORKS, INC.Inventors: Sreenivas Voruganti, Balaji Murali, Ashish Pal, Rahul Jain, Sainath Cheruvu
-
Publication number: 20090161684Abstract: Methods and systems consistent with the present invention provide dynamic buffer allocation to a plurality of queues of differing priority levels. Each queue is allocated fixed minimum number of buffers that will not be de-allocated during buffer reassignment. The rest of the buffers are intelligently and dynamically assigned to each queue depending on their current need. The system then monitors and learns the incoming traffic pattern and resulting drops in each queue due to traffic bursts. Based on this information, the system readjusts allocation of buffers to each traffic class. If a higher priority queue does not need the buffers, it gradually relinquishes them. These buffers are then assigned to other queues based on the input traffic pattern and resultant drops. These buffers are aggressively reclaimed and reassigned to higher priority queues when needed.Type: ApplicationFiled: December 21, 2007Publication date: June 25, 2009Inventors: Sreenivas Voruganti, Atul Mahamuni