Patents by Inventor Sujai Hajela
Sujai Hajela has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
APPLICATION SESSION-SPECIFIC NETWORK TOPOLOGY GENERATION FOR TROUBLESHOOTING THE APPLICATION SESSION
Publication number: 20240137264Abstract: A network management system (NMS) is described that provides a granular troubleshooting workflow at an application session level using an application session-specific topology from a client device to a cloud-based application server. During an application session of a cloud-based application, a client device running the application exchanges data through one or more access point (AP) devices, one or more switches at a wired network edge, and one or more network nodes, e.g., switches, routers, and/or gateway devices, to reach a cloud-based application server. For a particular application session, the NMS generates a topology based on network data received from a subset of network devices, e.g., client devices, AP devices, switches, routers, and/or gateways, that were involved in the particular application session over a duration of the particular application session. In this way, the NMS enables backward-looking troubleshooting of the particular application session.Type: ApplicationFiled: December 29, 2023Publication date: April 25, 2024Inventors: Jisheng Wang, Xiaoying Wu, Yedunandan Siddalingappa-Vitalapur, Abhiram Madhugiri Shamsundar, Robert J. Friday, Sudheer Matta, Sunalini Sankhavaram, Kush Shah, Randall Frei, Sujai Hajela, Jacob Thomas -
Application session-specific network topology generation for troubleshooting the application session
Patent number: 11968075Abstract: A network management system (NMS) is described that provides a granular troubleshooting workflow at an application session level using an application session-specific topology from a client device to a cloud-based application server. During an application session of a cloud-based application, a client device running the application exchanges data through one or more access point (AP) devices, one or more switches at a wired network edge, and one or more network nodes, e.g., switches, routers, and/or gateway devices, to reach a cloud-based application server. For a particular application session, the NMS generates a topology based on network data received from a subset of network devices, e.g., client devices, AP devices, switches, routers, and/or gateways, that were involved in the particular application session over a duration of the particular application session. In this way, the NMS enables backward-looking troubleshooting of the particular application session.Type: GrantFiled: September 27, 2022Date of Patent: April 23, 2024Assignee: Juniper Networks, Inc.Inventors: Jisheng Wang, Xiaoying Wu, Yedunandan Siddalingappa-Vitalapur, Abhiram Madhugiri Shamsundar, Robert J. Friday, Sudheer Matta, Sunalini Sankhavaram, Kush Shah, Randall Frei, Sujai Hajela, Jacob Thomas -
APPLICATION SESSION-SPECIFIC NETWORK TOPOLOGY GENERATION FOR TROUBLESHOOTING THE APPLICATION SESSION
Publication number: 20230231762Abstract: A network management system (NMS) is described that provides a granular troubleshooting workflow at an application session level using an application session-specific topology from a client device to a cloud-based application server. During an application session of a cloud-based application, a client device running the application exchanges data through one or more access point (AP) devices, one or more switches at a wired network edge, and one or more network nodes, e.g., switches, routers, and/or gateway devices, to reach a cloud-based application server. For a particular application session, the NMS generates a topology based on network data received from a subset of network devices, e.g., client devices, AP devices, switches, routers, and/or gateways, that were involved in the particular application session over a duration of the particular application session. In this way, the NMS enables backward-looking troubleshooting of the particular application session.Type: ApplicationFiled: September 27, 2022Publication date: July 20, 2023Inventors: Jisheng Wang, Xiaoying Wu, Yedunandan Siddalingappa-Vitalapur, Abhiram Madhugiri Shamsundar, Robert J. Friday, Sudheer Matta, Sunalini Sankhavaram, Kush Shah, Randall Frei, Sujai Hajela, Jacob Thomas -
Publication number: 20210297858Abstract: Methods and apparatus for controlling access to and/or forwarding of communicated information, e.g. traffic, in a wireless communication system are described. The key, e.g., PSK, used to secure data that is transmitted to an access point for communication to a destination device is taken into consideration when deciding whether or not to provide the destination device access to the communicated content. The decision of whether or not to provide the destination device access to a communication may involve deciding whether or not to forward the received data to another device, e.g., another access point, for delivery to the destination device and/or may involve deciding whether or not to transmit the data to the destination device. If the destination device is not associated with, e.g., does not have access to and/or authorization to use, the key used to secure the received data, the data is not communicated to the destination device.Type: ApplicationFiled: May 27, 2021Publication date: September 23, 2021Inventors: Randall Frei, Sujai Hajela, Guy Goldstone, Nicolas Dade, Linker Cheng
-
Patent number: 11051169Abstract: Methods and apparatus for controlling access to and/or forwarding of communicated information, e.g. traffic, in a wireless communication system are described. The key, e.g., PSK, used to secure data that is transmitted to an access point for communication to a destination device is taken into consideration when deciding whether or not to provide the destination device access to the communicated content. The decision of whether or not to provide the destination device access to a communication may involve deciding whether or not to forward the received data to another device, e.g., another access point, for delivery to the destination device and/or may involve deciding whether or not to transmit the data to the destination device. If the destination device is not associated with, e.g., does not have access to and/or authorization to use, the key used to secure the received data, the data is not communicated to the destination device.Type: GrantFiled: August 16, 2017Date of Patent: June 29, 2021Assignee: Juniper Networks, Inc.Inventors: Randall Frei, Sujai Hajela, Guy Goldstone, Nicolas Dade, Linker Cheng
-
Publication number: 20190058996Abstract: Methods and apparatus for controlling access to and/or forwarding of communicated information, e.g. traffic, in a wireless communication system are described. The key, e.g., PSK, used to secure data that is transmitted to an access point for communication to a destination device is taken into consideration when deciding whether or not to provide the destination device access to the communicated content. The decision of whether or not to provide the destination device access to a communication may involve deciding whether or not to forward the received data to another device, e.g., another access point, for delivery to the destination device and/or may involve deciding whether or not to transmit the data to the destination device. If the destination device is not associated with, e.g., does not have access to and/or authorization to use, the key used to secure the received data, the data is not communicated to the destination device.Type: ApplicationFiled: August 16, 2017Publication date: February 21, 2019Inventors: Randall Frei, Sujai Hajela, Guy Goldstone, Nicolas Dade, Linker Cheng
-
Patent number: 9408036Abstract: Wireless transmissions from beacon devices are received at a plurality of receiver devices. The wireless transmissions comprise packets that carry information used for location-based services for mobile wireless devices. Content of one or more fields of the beacon packets received by one or more of the plurality of receiver devices is obtained. Measurement data associated with the transmissions received at the plurality of receiver devices is generated. Locations of the respective beacon devices are computed from the measurement data obtained by the plurality of receiver devices. Information identifying detected beacon devices and their locations are stored to maintain a location history of beacon devices over time locations. Changes from information contained in the location history are detected based on the locations computed for respective beacon devices from the measurement data and content of one or more fields of detected beacon packets.Type: GrantFiled: May 15, 2014Date of Patent: August 2, 2016Assignee: Cisco Technology, Inc.Inventors: Brian D. Hart, Raghuram Rangarajan, Sujai Hajela, Gregory H. Yamanishi, Gracia Wang, Allen J. Huotari
-
Patent number: 9258713Abstract: Techniques are presented for detecting rogue wireless beacon devices. Wireless transmissions from beacon devices are received at a plurality of receiver devices. The wireless transmissions of the beacon devices comprise packets that carry information used for location-based services for mobile wireless devices. Content of one or more fields of the packets transmitted by the beacon devices and received by one or more of the receiver devices is obtained. The content of one or more fields of the packets is analyzed to detect an unauthorized beacon device. The analyzing operation may involve comparing the content of the one or more fields of the packets against a list that contains one or more identifiers for authorized beacon devices. In another form, analyzing may involve analyzing the content of the one or more fields of the packets with pattern information related to advertising content or advertising source.Type: GrantFiled: May 15, 2014Date of Patent: February 9, 2016Assignee: Cisco Technology, Inc.Inventors: Raghuram Rangarajan, Brian D. Hart, Sujai Hajela, Santosh Pandey, David Kloper, Greg Corsetto, Allen J. Huotari
-
Publication number: 20150334676Abstract: Wireless transmissions from beacon devices are received at a plurality of receiver devices. The wireless transmissions comprise packets that carry information used for location-based services for mobile wireless devices. Content of one or more fields of the beacon packets received by one or more of the plurality of receiver devices is obtained. Measurement data associated with the transmissions received at the plurality of receiver devices is generated. Locations of the respective beacon devices are computed from the measurement data obtained by the plurality of receiver devices. Information identifying detected beacon devices and their locations are stored to maintain a location history of beacon devices over time locations. Changes from information contained in the location history are detected based on the locations computed for respective beacon devices from the measurement data and content of one or more fields of detected beacon packets.Type: ApplicationFiled: May 15, 2014Publication date: November 19, 2015Applicant: Cisco Technology, Inc.Inventors: Brian D. Hart, Raghuram Rangarajan, Sujai Hajela, Gregory H. Yamanishi, Gracia Wang, Allen J. Huotari
-
Publication number: 20150334569Abstract: Techniques are presented for detecting rogue wireless beacon devices. Wireless transmissions from beacon devices are received at a plurality of receiver devices. The wireless transmissions of the beacon devices comprise packets that carry information used for location-based services for mobile wireless devices. Content of one or more fields of the packets transmitted by the beacon devices and received by one or more of the receiver devices is obtained. The content of one or more fields of the packets is analyzed to detect an unauthorized beacon device. The analyzing operation may involve comparing the content of the one or more fields of the packets against a list that contains one or more identifiers for authorized beacon devices. In another form, analyzing may involve analyzing the content of the one or more fields of the packets with pattern information related to advertising content or advertising source.Type: ApplicationFiled: May 15, 2014Publication date: November 19, 2015Applicant: Cisco Technology, Inc.Inventors: Raghuram Rangarajan, Brian D. Hart, Sujai Hajela, Santosh Pandey, David Kloper, Greg Corsetto, Allen J. Huotari
-
Publication number: 20140201000Abstract: In an example embodiment disclosed herein is an apparatus comprising an interface and mobile billboard logic that is coupled with the interface and operable to communicate with an associated device via the interface. The mobile billboard logic obtains location data for the associated device. The mobile billboard logic determines whether a predetermined trigger condition has been met. The mobile billboard logic selectively sends data representative of an advertisement to the associated device to be displayed on a web page being requested by the associated device based on the location of the associated device and whether the predetermined condition has been met.Type: ApplicationFiled: January 14, 2013Publication date: July 17, 2014Applicant: Cisco Technology, Inc.Inventors: Ravi AKIREDDY, Esteban Raul TORRES, Robert J. FRIDAY, Sujai HAJELA, Uday Kumar PYDA
-
Patent number: 7903624Abstract: A wireless data communication system includes an access port configured to wirelessly communicate with a plurality of mobile units within multiple basic service sets (BSS), and a wireless switch having multiple predefined wireless local area networks (WLANs). The wireless switch is configured to automatically map the WLANs to the basic service sets and transmit to the access port a configuration template depending upon the type of access port. In one embodiment, there are n basic service sets, each having a corresponding basic service set identifier (BSSID), and m WLANs, each having a corresponding WLAN index, wherein the m WLAN indices are uniformly mapped to the n BSSIDs such that each BSSID has substantially the same number of WLAN indices mapped thereto. In a particular embodiment, there are n=4 BSSIDs per access port and m=16 pre-mapped WLANs.Type: GrantFiled: February 27, 2007Date of Patent: March 8, 2011Assignee: Symbol Technologies, Inc.Inventors: Ajay Malik, Sujai Hajela
-
Patent number: 7529203Abstract: Techniques are provided for load balancing among a plurality of wireless switches configured to support a plurality of clients including a first client. An initial home wireless switch can be configured to initially support the first client. The initial home wireless switch can select one of the wireless switches as a new home wireless switch for the first client. These techniques can be implemented, for example, in a wireless local area network.Type: GrantFiled: May 26, 2005Date of Patent: May 5, 2009Assignee: Symbol Technologies, Inc.Inventors: Zeljko Bajic, Sujai Hajela
-
Publication number: 20080080435Abstract: A system for monitoring the state of an RF network generally includes a plurality of wireless devices coupled to the network and having one or more associated antennae, the wireless devices configured to process data received from a plurality of RF elements within range of the antenna. An RF switch is coupled to the network and configured to receive and transmit the data over the network, the RF switch having a memory configured to store a plurality of performance indicators, wherein each of the performance indicators is associated with an operational characteristic of one or more of the plurality of wireless devices. A display is coupled to the network for displaying a visual representation of the plurality of performance indicators.Type: ApplicationFiled: September 29, 2006Publication date: April 3, 2008Inventors: Ajay Malik, Sujai Hajela
-
Publication number: 20070201417Abstract: A wireless data communication system includes an access port configured to wirelessly communicate with a plurality of mobile units within multiple basic service sets (BSS), and a wireless switch having multiple predefined wireless local area networks (WLANs). The wireless switch is configured to automatically map the WLANs to the basic service sets and transmit to the access port a configuration template depending upon the type of access port. In one embodiment, there are n basic service sets, each having a corresponding basic service set identifier (BSSID), and m WLANs, each having a corresponding WLAN index, wherein the m WLAN indices are uniformly mapped to the n BSSIDs such that each BSSID has substantially the same number of WLAN indices mapped thereto. In a particular embodiment, there are n=4 BSSIDs per access port and m=16 pre-mapped WLANs.Type: ApplicationFiled: February 27, 2007Publication date: August 30, 2007Applicant: SYMBOL TECHNOLOGIES, INC.Inventors: Ajay Malik, Sujai Hajela
-
Publication number: 20060268765Abstract: Techniques are provided for load balancing among a plurality of wireless switches configured to support a plurality of clients including a first client. An initial home wireless switch can be configured to initially support the first client. The initial home wireless switch can select one of the wireless switches as a new home wireless switch for the first client. These techniques can be implemented, for example, in a wireless local area network.Type: ApplicationFiled: May 26, 2005Publication date: November 30, 2006Inventors: Zeljko Bajic, Sujai Hajela