Patents by Inventor Ajeet Pal Singh Gill
Ajeet Pal Singh Gill has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12293224Abstract: A method for allocating resources of a virtual controller is disclosed. The method comprises: allocating resources of a virtual controller to a first tenant, wherein the first tenant is allocated a first tenant quantity of guaranteed resources of the virtual controller and a second tenant is allocated a second tenant quantity of guaranteed resources of the virtual controller; determining that resources requested by the first tenant are greater than the first tenant quantity of guaranteed resources; determining that the virtual controller has unutilized resources sufficient to at least partially provide additional resources beyond the first tenant quantity of guaranteed resources to the first tenant; and temporarily provisioning the additional resources to the first tenant, wherein the additional resources are greater than the first tenant quantity of guaranteed resources.Type: GrantFiled: July 30, 2021Date of Patent: May 6, 2025Assignee: Cisco Technology, Inc.Inventors: Xiaohu Wang, Ajeet Pal Singh Gill, Srilatha Tangirala, Nithin Bangalore Raju, Prabahar Radhakrishnan, Vivek Agarwal, Balaji Sundararajan
-
Patent number: 12289640Abstract: In one embodiment, a method includes receiving one or more 5G software-defined wide area network (SD-WAN) policies, identifying one or more identity-based policies from the one or more 5G SD-WAN policies, communicating the identified one or more identity-based policies to one or more WAN routers, communicating one or more 5G bindings to the one or more WAN routers, and applying the identified one or more identity-based policies to one or more flows between the one or more WAN routers.Type: GrantFiled: August 8, 2022Date of Patent: April 29, 2025Assignee: CISCO TECHNOLOGY, INC.Inventors: Gangadharan Byju Pularikkal, Einar Nilsen-Nygaard, Vivek Agarwal, Ajeet Pal Singh Gill, Ravi Sankar Mantha, Saravanan Radhakrishnan
-
Publication number: 20250126091Abstract: A process can include determining a plurality of Network Address Translation (NAT) routes associated with respective edge routers included in a same virtual private network (VPN) for communicating with a software-defined wide area network (SDWAN). A process can include identifying a first subset of the plurality of NAT routes as mapped to a first public NAT address included in a NAT pool associated with the VPN. A process can include tagging each NAT route of the first subset with a tag value indicative of a preferred router for receiving return traffic of the respective NAT route. A process can include routing traffic on a respective NAT route of the plurality of NAT routes based on applying, at an SDWAN controller, a corresponding control policy matching the tag value of the respective NAT route.Type: ApplicationFiled: October 8, 2024Publication date: April 17, 2025Inventors: Balaji Sundararajan, Ajeet Pal Singh Gill, Sampath Sthothra Bhasham, Satish Kumar Mahadevan, Madhusudan V. Gindi, Tahir Ali
-
Publication number: 20250039089Abstract: Techniques for automatically providing per tenant weighted DCMP over shared transport interfaces and automated flow has load balancing are described. The techniques may include onboarding, by an SD-WAN controller, the tenant with a resource profile to a first multi-tenant edge device, where the resource profile defines a traffic allowance per transport interface for the tenant on the first multi-tenant edge device. The SD-WAN controller receives, from the first multi-tenant edge device, information including a first weight per transport interface of the first multi-tenant edge device for the tenant. The SD-WAN controller transmits the information to a second multi-tenant device. The SD-WAN controller receives, from the second multi-tenant edge device, information including a second weight per transport interface of the second multi-tenant edge device, and transmits the information to the first multi-tenant edge device.Type: ApplicationFiled: July 17, 2024Publication date: January 30, 2025Inventors: Ganesh Devendrachar, Ajeet Pal Singh Gill, Balaji Sundararajan, Srilatha Tangirala, Satish Varadarajula, Satyajit Das
-
Publication number: 20250038957Abstract: Disclosed are systems, apparatuses, methods, computer readable medium, and circuits for managing encryption keys in a multi-tenant network edge device. According to at least one example, a method includes: receiving tenant resource information at the multi-tenant network edge device; generating at least one parent encryption key; generating a plurality of child encryption keys; creating a routing connection to a network controller for each tenant in the plurality of tenants; transmitting the at least one parent encryption key and the plurality of child encryption keys to the network controller for distribution to the plurality of tenants; receiving a plurality of advertisements of transport locators from the network controller, wherein each advertisement includes a parent encryption key or a child encryption key; selecting a set of encryption keys from the plurality of advertisements; and forming a secure tunnel.Type: ApplicationFiled: July 27, 2023Publication date: January 30, 2025Inventors: Ajeet Pal Singh Gill, Srilatha Tangirala
-
Publication number: 20250030638Abstract: According to certain embodiments, a method by a network device includes receiving a handshake message for a traffic flow from a Software-Defined Wide-Area Network (SDWAN) and determining, from a traffic policy, whether the traffic flow should be symmetrical. In response to determining from the traffic policy that the traffic flow should be symmetrical, the method further includes performing a flow lookup on the traffic flow to determine if the network device originated the traffic flow. In response to determining that the network device did not originate the traffic flow, the method further includes determining a second network device that originated the traffic flow and sending the handshake message for the traffic flow to the second network device in order to maintain symmetry for the traffic flow.Type: ApplicationFiled: October 7, 2024Publication date: January 23, 2025Inventors: Balaji Sundararajan, Srilatha Tangirala, Ajeet Pal Singh Gill, Vivek Agarwal, Nithin Bangalore Raju
-
Patent number: 12199942Abstract: A process can include determining a plurality of Network Address Translation (NAT) routes associated with respective edge routers included in a same virtual private network (VPN) for communicating with a software-defined wide area network (SDWAN). A process can include identifying a first subset of the plurality of NAT routes as mapped to a first public NAT address included in a NAT pool associated with the VPN. A process can include tagging each NAT route of the first subset with a tag value indicative of a preferred router for receiving return traffic of the respective NAT route. A process can include routing traffic on a respective NAT route of the plurality of NAT routes based on applying, at an SDWAN controller, a corresponding control policy matching the tag value of the respective NAT route.Type: GrantFiled: October 11, 2023Date of Patent: January 14, 2025Assignee: Cisco Technology, Inc.Inventors: Balaji Sundararajan, Ajeet Pal Singh Gill, Sampath Sthothra Bhasham, Satish Kumar Mahadevan, Madhusudan V. Gindi, Tahir Ali
-
Patent number: 12132660Abstract: According to certain embodiments, a method by a network device includes receiving a handshake message for a traffic flow from a Software-Defined Wide-Area Network (SDWAN) and determining, from a traffic policy, whether the traffic flow should be symmetrical. In response to determining from the traffic policy that the traffic flow should be symmetrical, the method further includes performing a flow lookup on the traffic flow to determine if the network device originated the traffic flow. In response to determining that the network device did not originate the traffic flow, the method further includes determining a second network device that originated the traffic flow and sending the handshake message for the traffic flow to the second network device in order to maintain symmetry for the traffic flow.Type: GrantFiled: April 12, 2022Date of Patent: October 29, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Balaji Sundararajan, Srilatha Tangirala, Ajeet Pal Singh Gill, Vivek Agarwal, Nithin Bangalore Raju
-
Patent number: 12068959Abstract: Techniques for automatically providing per tenant weighted DCMP over shared transport interfaces and automated flow has load balancing are described. The techniques may include onboarding the tenant to the local multi-tenant edge device associated with a tenant, where the resource profile defines a traffic allowance per transport interface for the tenant. Local weight per transport interface is applied. Information including local weight per transport interface is transmitted to a remote device via an SD-WAN controller. Information including a remote weight per transport interface of the remote device is received via the SD-WAN controller. Traffic is routed from the tenant based on local weight per transport interface of the local device and remote weight per transport interface of the remote device.Type: GrantFiled: July 24, 2023Date of Patent: August 20, 2024Assignee: Cisco Technology, Inc.Inventors: Ganesh Devendrachar, Ajeet Pal Singh Gill, Balaji Sundararajan, Srilatha Tangirala, Satish Varadarajula, Satyajit Das
-
Publication number: 20240223397Abstract: Techniques for virtualizing tenant transport interfaces configured to implement pertenant network routing attribute differentiation in each tenant overlay of a multisite wide area network (WAN) and share the virtual transport interfaces between multi-tenant edge (MTE) devices providing transport services to tenant devices based on a defined tenant tier model. A Software-Defined Networking (SDN) controller may receive a physical transport interface and/or a device type associated with a tenant device. The SDN controller may determine a virtual transport interface for the tenant device based on a tier associated with the tenant. MTE device(s) may utilize the physical transport interface to establish sessions with other MTE device(s) in the WAN. The virtual transport interface may be utilized by MTE devices to implement and/or enforce network routing attributes when forwarding network traffic associated with the tenant via the sessions established between the MTE devices through the WAN.Type: ApplicationFiled: March 18, 2024Publication date: July 4, 2024Inventors: Balaji Sundararajan, Ajeet Pal Singh Gill, Srilatha Tangirala, Nithin Bangalore Raju, Ravi Kiran Chintallapudi, Pradeepan Kannawadi, Ganesh Devendrachar
-
Patent number: 12026561Abstract: The present technology addresses a need in the art for an automated and scalable mechanism to authorize a containerized process. An aspect of the present technology deals with authorizing an unprivileged process by a privileged process without embedding credentials or network access at the time of validation. The present technology provides the possibility for the privileged process to continuously (dynamically) validate the authenticity of the unprivileged process by performing a plurality of operations to ensure the unprivileged process has maintained its authenticity while having access to sensitive information.Type: GrantFiled: August 27, 2020Date of Patent: July 2, 2024Assignee: Cisco Technology, Inc.Inventors: Xiaochun Lu, Yiwen Zhang, Alphonse Hansel Anthony Selvanayagam, Ajeet Pal Singh Gill, Ravinandan Govinda Rao Arakali
-
Publication number: 20240146565Abstract: Techniques for virtualizing tenant transport interfaces configured to implement per-tenant network routing attribute differentiation in each tenant overlay of a multisite wide area network (WAN) and share the virtual transport interfaces between multi-tenant edge (MTE) devices providing transport services to tenant devices based on a defined tenant tier model. A Software-Defined Networking (SDN) controller may receive a physical transport interface and/or a device type associated with a tenant device. The SDN controller may determine a virtual transport interface for the tenant device based on a tier associated with the tenant. MTE device(s) may utilize the physical transport interface to establish sessions with other MTE device(s) in the WAN. The virtual transport interface may be utilized by MTE devices to implement and/or enforce network routing attributes when forwarding network traffic associated with the tenant via the sessions established between the MTE devices through the WAN.Type: ApplicationFiled: November 2, 2022Publication date: May 2, 2024Inventors: Ajeet Pal Singh Gill, Balaji Sundararajan, Srilatha Tangirala, Nithin Bangalore Raju, Ravi Kiran Chintallapudi, Pradeepan Kannawadi, Ganesh Devendrachar
-
Patent number: 11962429Abstract: Techniques for virtualizing tenant transport interfaces configured to implement per-tenant network routing attribute differentiation in each tenant overlay of a multisite wide area network (WAN) and share the virtual transport interfaces between multi-tenant edge (MTE) devices providing transport services to tenant devices based on a defined tenant tier model. A Software-Defined Networking (SDN) controller may receive a physical transport interface and/or a device type associated with a tenant device. The SDN controller may determine a virtual transport interface for the tenant device based on a tier associated with the tenant. MTE device(s) may utilize the physical transport interface to establish sessions with other MTE device(s) in the WAN. The virtual transport interface may be utilized by MTE devices to implement and/or enforce network routing attributes when forwarding network traffic associated with the tenant via the sessions established between the MTE devices through the WAN.Type: GrantFiled: November 2, 2022Date of Patent: April 16, 2024Assignee: Cisco Technology, Inc.Inventors: Balaji Sundararajan, Srilatha Tangirala, Ajeet Pal Singh Gill, Nithin Bangalore Raju, Ravi Kiran Chintallapudi, Pradeepan Kannawadi, Ganesh Devendrachar
-
Publication number: 20240015225Abstract: In one embodiment, a method includes onboarding, by an edge router, a first tenant from a network management system and determining, by the edge router, a mapping of a tenant identifier associated with the first tenant to a controller identifier associated with a controller. The method also includes reserving, by the edge router, a port number in a kernel for the first tenant and inserting, by the edge router, the tenant identifier into a first control packet. The method further includes communicating, by the edge router, the first control packet to the controller via an encrypted control connection during a first peering session. The first peering session shares the encrypted control connection with a second peering session.Type: ApplicationFiled: September 25, 2023Publication date: January 11, 2024Inventors: Srilatha Tangirala, Rahul Hardikar, Sheikh Qumruzzaman, Ravi Kiran Chintallapudi, Samir Thoria, Ajeet Pal Singh Gill, Vivek Agarwal
-
Publication number: 20230327994Abstract: According to certain embodiments, a method by a network device includes receiving a handshake message for a traffic flow from a Software-Defined Wide-Area Network (SDWAN) and determining, from a traffic policy, whether the traffic flow should be symmetrical. In response to determining from the traffic policy that the traffic flow should be symmetrical, the method further includes performing a flow lookup on the traffic flow to determine if the network device originated the traffic flow. In response to determining that the network device did not originate the traffic flow, the method further includes determining a second network device that originated the traffic flow and sending the handshake message for the traffic flow to the second network device in order to maintain symmetry for the traffic flow.Type: ApplicationFiled: April 12, 2022Publication date: October 12, 2023Inventors: Balaji Sundararajan, Srilatha Tangirala, Ajeet Pal Singh Gill, Vivek Agarwal, Nithin Bangalore Raju
-
Patent number: 11778038Abstract: In one embodiment, a method includes onboarding, by an edge router, a first tenant from a network management system and determining, by the edge router, a mapping of a tenant identifier associated with the first tenant to a controller identifier associated with a controller. The method also includes reserving, by the edge router, a port number in a kernel for the first tenant and inserting, by the edge router, the tenant identifier into a first control packet. The method further includes communicating, by the edge router, the first control packet to the controller via an encrypted control connection during a first peering session. The first peering session shares the encrypted control connection with a second peering session.Type: GrantFiled: March 31, 2022Date of Patent: October 3, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Srilatha Tangirala, Rahul Hardikar, Sheikh Qumruzzaman, Ravi Kiran Chintallapudi, Samir Thoria, Ajeet Pal Singh Gill, Vivek Agarwal
-
Publication number: 20230262525Abstract: In one embodiment, a method includes receiving one or more 5G software-defined wide area network (SD-WAN) policies, identifying one or more identity-based policies from the one or more 5G SD-WAN policies, communicating the identified one or more identity-based policies to one or more WAN routers, communicating one or more 5G bindings to the one or more WAN routers, and applying the identified one or more identity-based policies to one or more flows between the one or more WAN routers.Type: ApplicationFiled: August 8, 2022Publication date: August 17, 2023Inventors: Gangadharan Byju Pularikkal, Einar Nilsen-Nygaard, Vivek Agarwal, Ajeet Pal Singh Gill, Ravi Sankar Mantha, Saravanan Radhakrishnan
-
Publication number: 20230188502Abstract: In one embodiment, a method includes identifying, by a router, a first tenant. The first tenant is associated with a first tenant virtual private network (VPN). The method also includes determining, by the router, a mapping of the first tenant VPN to a first device VPN and generating, by the router, a first label representing the first device VPN. The method further includes adding, by the router, the first label to a first network packet and communicating, by the router, the first network packet with the first label to a controller.Type: ApplicationFiled: March 31, 2022Publication date: June 15, 2023Inventors: Samir Thoria, Ajeet Pal Singh Gill, Srilatha Tangirala, Balaji Sundararajan, Nithin Bangalore Raju, Vivek Agarwal
-
Publication number: 20230188607Abstract: In one embodiment, a method includes onboarding, by an edge router, a first tenant from a network management system and determining, by the edge router, a mapping of a tenant identifier associated with the first tenant to a controller identifier associated with a controller. The method also includes reserving, by the edge router, a port number in a kernel for the first tenant and inserting, by the edge router, the tenant identifier into a first control packet. The method further includes communicating, by the edge router, the first control packet to the controller via an encrypted control connection during a first peering session. The first peering session shares the encrypted control connection with a second peering session.Type: ApplicationFiled: March 31, 2022Publication date: June 15, 2023Inventors: Srilatha Tangirala, Rahul Hardikar, Sheikh Qumruzzaman, Ravi Kiran Chintallapudi, Samir Thoria, Ajeet Pal Singh Gill, Vivek Agarwal
-
Publication number: 20220326995Abstract: A method for allocating resources of a virtual controller is disclosed. The method comprises: allocating resources of a virtual controller to a first tenant, wherein the first tenant is allocated a first tenant quantity of guaranteed resources of the virtual controller and a second tenant is allocated a second tenant quantity of guaranteed resources of the virtual controller; determining that resources requested by the first tenant are greater than the first tenant quantity of guaranteed resources; determining that the virtual controller has unutilized resources sufficient to at least partially provide additional resources beyond the first tenant quantity of guaranteed resources to the first tenant; and temporarily provisioning the additional resources to the first tenant, wherein the additional resources are greater than the first tenant quantity of guaranteed resources.Type: ApplicationFiled: July 30, 2021Publication date: October 13, 2022Inventors: Xiaohu Wang, Ajeet Pal Singh Gill, Srilatha Tangirala, Nithin Bangalore Raju, Prabahar Radhakrishnan, Vivek Agarwal, Balaji Sundararajan