Patents by Inventor Advait Dixit

Advait Dixit has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200007583
    Abstract: Systems, methods, and computer-readable media for assurance of rules in a network. An example method can include creating a compliance requirement including a first endpoint group (EPG) selector, a second EPG selector, a traffic selector, and a communication operator, the first and second EPG selectors representing sets of EPGs and the communication operator defining a communication condition for traffic associated with the first and second EPG selectors and the traffic selector. The method can include creating, for each distinct pair of EPGs, a first respective data structure representing the distinct pair of EPGs, the communication operator, and the traffic selector; creating a second respective data structure representing a logical model of the network; determining whether the first respective data structure is contained in the second respective data structure to yield a containment check; and determining whether policies on the network comply with the compliance requirement based on the containment check.
    Type: Application
    Filed: December 12, 2018
    Publication date: January 2, 2020
    Inventors: Advait Dixit, Navneet Yadav, Navjyoti Sharma, Ramana Rao Kompella, Kartik Mohanram
  • Publication number: 20200007582
    Abstract: Systems, methods, and computer-readable media for configuring and verifying compliance requirements in a network.
    Type: Application
    Filed: December 12, 2018
    Publication date: January 2, 2020
    Inventors: Advait Dixit, Navneet Yadav, Navjyoti Sharma, Ramana Rao Kompella, Kartik Mohanram
  • Publication number: 20200007584
    Abstract: In some examples, a system creates a requirement including EPG selectors representing EPG pairs, a traffic selector, and a communication operator; determines that EPGs in distinct pairs are associated with different network contexts and, for each pair, which network context(s) contains associated policies; creates first data representing the pair, operator, and traffic selector; when only one network context contains the associated policies, creates second data representing a network model portion associated with the only network context and determines whether the first data is contained in the second data to yield a first check; when both network contexts contain the associated policies, also creates third data representing a network model portion associated with a second network context, and determines whether the first data is contained in the second and/or third data to yield a second check; and determines whether policies for the pairs comply with the requirement based on the checks.
    Type: Application
    Filed: December 12, 2018
    Publication date: January 2, 2020
    Inventors: Advait Dixit, Navneet Yadav, Navjyoti Sharma, Ramana Rao Kompella, Kartik Mohanram
  • Publication number: 20190222485
    Abstract: Systems, methods, and computer-readable media for emulating a state of a network environment for purposes of re-executing a network assurance appliance in the emulated state of the network environment. In some embodiments, a method can include receiving snapshot data for a network environment corresponding to a specific time in the network environment and including network events occurring in the network environment generated by a network assurance appliance. A state of the network environment at the specific time can be emulated using the snapshot data to create an emulated state of the network environment. Subsequently, the network assurance appliance can be re-executed in the emulated state of the network environment corresponding to the specific time and the network assurance appliance can be debugged outside of the network environment based on re-execution of the network assurance appliance in the emulated state of the network environment.
    Type: Application
    Filed: January 17, 2018
    Publication date: July 18, 2019
    Inventors: Divjyot Sethi, Chandra Nagarajan, Advait Dixit, John Thomas Monk, Gabriel Cheukbun Ng, Ramana Rao Kompella, Sundar Iyer
  • Publication number: 20180367417
    Abstract: Systems, methods, and computer-readable media for receiving one or more models of network intents, comprising a plurality of contracts between providers and consumers, each contract containing entries with priority values. Each contract is flattened into a listing of rules and a new priority value is calculated. The listing of rules encodes the implementation of the contract between the providers and the consumers. Each entry is iterated over and added to a listing of entries if it is not already present. For each rule, the one or more entries associated with the contract from which the rule was flattened are identified, and for each given entry a flat rule comprising the combination of the rule and the entry is generated, wherein a flattened priority is calculated based at least in part on the priority value of the given one of given entry and the priority value of the rule.
    Type: Application
    Filed: August 31, 2017
    Publication date: December 20, 2018
    Inventors: Advait Dixit, Ramana Rao Kompella, Kartik Mohanram, Sundar Iyer, Shadab Nazar, Chandra Nagarajan
  • Publication number: 20180367390
    Abstract: Disclosed are systems, methods, and computer-readable media for assuring tenant forwarding in a network environment. Network assurance can be determined in layer 1, layer 2 and layer 3 of the networked environment including, internal-internal (e.g., inter-fabric) forwarding and internal-external (e.g., outside the fabric) forwarding in the networked environment.
    Type: Application
    Filed: July 28, 2017
    Publication date: December 20, 2018
    Inventors: Kannan Ponnuswamy, Advait Dixit, Arvind Chari, Paul Andrew Raytick, Sanchay Harneja
  • Publication number: 20180367652
    Abstract: Systems, methods, and computer-readable media for receiving an indication of an equivalence failure, the equivalence failure corresponding to one or more models of network intents. The indication of the equivalence failure is analyzed and one or more constituent intents that caused the equivalence failure are identified, wherein the one or more constituent intents are associated with a model of the one or more models of network intents. The granularity of the equivalence failure and the identified one or more constituent intents is determined, and an event for external consumption is generated, the event based at least in part on the equivalence failure, the granularity of the equivalence failure, and the identified one or more constituent intents.
    Type: Application
    Filed: July 28, 2017
    Publication date: December 20, 2018
    Inventors: Advait Dixit, Ramana Rao Kompella
  • Publication number: 20180351806
    Abstract: Systems, methods, and computer-readable media for intent specification checks. In one example, a system obtains, from one or more controllers in a software-defined network, a logical model of the software-defined network, the logical model including configurations of one or more objects in a hierarchical management information tree that defines manageable objects and object properties for the software-defined network. Based on the hierarchical management information tree, the system performs a policy analysis of configurations in the logical model and determines, based on the policy analysis, whether the configurations in the logical model contain one or more errors.
    Type: Application
    Filed: July 28, 2017
    Publication date: December 6, 2018
    Inventors: Kartik Mohanram, Chandra Nagarajan, Advait Dixit, Ramana Rao Kompella
  • Publication number: 20180351820
    Abstract: Systems, methods, and computer-readable media for generating switch-level logical models of a network. In some examples, a system can obtain a logical model of a network, such as software-defined network (SDN). The logical model can represent a configuration of objects and object properties defined based on a schema associated with the network. Based on the logical model, the system can generate a rendered logical model of the network and, based on the rendered logical model, generate, for one or more network devices in the network, a respective device-specific representation of the logical model. The respective device-specific representation can project the logical model to a respective network device, such as a switch in the fabric of the network.
    Type: Application
    Filed: October 17, 2017
    Publication date: December 6, 2018
    Inventors: Chandra Nagarajan, Advait Dixit
  • Publication number: 20180351821
    Abstract: Systems, methods, and computer-readable media for generating a network-wide logical model of a network. In some examples, a system obtains, from a plurality of controllers in a network, respective logical model segments associated with the network, each of the respective logical model segments including configurations at a respective one of the plurality of controllers for the network, the respective logical model segments being based on a schema defining manageable objects and object properties for the network. The system determines whether the plurality of controllers are in quorum and, when the plurality of controllers are in quorum, combines the respective logical model segments associated with the network to yield a network-wide logical model of the network, the network-wide logical model including configurations across the plurality of controllers for the network.
    Type: Application
    Filed: October 17, 2017
    Publication date: December 6, 2018
    Inventors: Chandra Nagarajan, Advait Dixit
  • Publication number: 20180309632
    Abstract: In some examples, a system obtains a network logical model and, for each node in a network, a node-level logical, concrete, and hardware model. The system identifies a service function chain, and determines a respective set of service function chain rules. For each node, the system determines whether the respective set of service function chain rules is correctly captured in the node-level logical model and/or concrete model to yield a node containment check result. Based on a comparison of policy actions in the concrete model, hardware model, and at least one of the node-level logical model or network logical model, the system determines whether the respective set of service function chain rules is correctly rendered on each node to yield a node rendering check result. Based on the node containment check result and node rendering check result, the system determines whether the service function chain is correctly configured.
    Type: Application
    Filed: August 31, 2017
    Publication date: October 25, 2018
    Inventors: Ramana Rao Kompella, Kartik Mohanram, Advait Dixit, Sundar Iyer