Patents by Inventor Ambrish Niranjan Mehta

Ambrish Niranjan Mehta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10951531
    Abstract: Aspects of the present disclosure are directed to dynamically adjusting control plane policing throughput of low (or lower) priority control plane traffic to permit higher throughput. The drop rate for low or lower priority control plane traffic can be determined to be above a threshold value. The processor utilization can be determined to be operating under normal utilization (or at a utilization within a threshold utilization value). The control plane policing for control plane traffic for the low or lower class of service can be increased (or decreased) to permit lower class of service control traffic to be transmitted using higher class of service resources without adjusting the priority levels for the lower class of service control traffic.
    Type: Grant
    Filed: December 10, 2018
    Date of Patent: March 16, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Anand Kumar Singh, Venkatesh Srinivasan, Swaminathan Narayanan, Anulekha Chodey, Ambrish Niranjan Mehta, Natarajan Manthiramoorthy
  • Patent number: 10516598
    Abstract: Systems, methods, and non-transitory computer-readable storage media for detecting network loops. In some embodiments, a system can identify a network path having multiple hops associated with respective nodes which are configured in a forwarding mode. The system can traverse the network path to identify, for each node from the respective nodes, a respective next hop. Based on the respective next hop for each node, the system can determine whether two or more nodes from the respective nodes have a same respective next hop. When the two or more nodes have the same respective next hop, the system can determine that the network path has a network loop.
    Type: Grant
    Filed: August 9, 2016
    Date of Patent: December 24, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Ambrish Niranjan Mehta, Anand Kumar Singh, Anulekha Chodey
  • Patent number: 10516600
    Abstract: Systems, methods, and non-transitory computer-readable storage media for detecting network loops. In some embodiments, a system can identify a port that is in a blocking state. The blocking state can be for dropping one or more types of packets and preventing the port from forwarding the one or more types of packets. The system can determine a number of packets transmitted through the port by a hardware layer on the system and a number of control packets transmitted through the port by a software layer on the system. The system can determine whether the number of packets is greater than the number of control packets. When the number of packets is greater than the number of control packets, the system can determine that the blocking state has failed to prevent the port from forwarding the one or more types of packets.
    Type: Grant
    Filed: September 19, 2018
    Date of Patent: December 24, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Ambrish Niranjan Mehta, Anand Kumar Singh, Anulekha Chodey
  • Patent number: 10491508
    Abstract: Systems, methods, and computer-readable storage media for detecting network loops. A system can identify, for each virtual tunnel endpoint (VTEP) from multiple VTEPs in a network, respective media access control address data including the respective local interface media access control addresses of the respective VTEP and respective media access control addresses learned by the respective VTEP. The system can determine whether the VTEPs are running spanning tree protocol (STP), and whether a media access control address learned by a first VTEP matches a respective local interface media access control address of a second VTEP. The system can detect a loop when the media access control address learned by the first VTEP matches the respective local interface media access control address of the second VTEP. The system can also detect a loop when the VTEPs are running STP and the first and second VTEPs see the same STP root bridge.
    Type: Grant
    Filed: September 17, 2018
    Date of Patent: November 26, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Ambrish Niranjan Mehta, Anand Kumar Singh, Anulekha Chodey
  • Patent number: 10320838
    Abstract: Systems, methods, and computer-readable media for preventing man-in-the-middle attacks within network, without the need to maintain trusted/un-trusted port listings on each network device. The solutions disclosed herein leverage a host database which can be present on controllers, thereby providing a centralized database instead of a per-node DHCP binding database. Systems configured according to this disclosure (1) use a flood list only for ARP packets received from the controller 116; and (2) unicast ARP packets to the controller before communicating the packets to other VTEPs.
    Type: Grant
    Filed: July 20, 2016
    Date of Patent: June 11, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Venkatesh Srinivasan, Ambrish Niranjan Mehta, Anand Kumar Singh, Anulekha Chodey, Natarajan Manthiramoorthy, Swaminathan Narayanan
  • Publication number: 20190116125
    Abstract: Aspects of the present disclosure are directed to dynamically adjusting control plane policing throughput of low (or lower) priority control plane traffic to permit higher throughput. The drop rate for low or lower priority control plane traffic can be determined to be above a threshold value. The processor utilization can be determined to be operating under normal utilization (or at a utilization within a threshold utilization value). The control plane policing for control plane traffic for the low or lower class of service can be increased (or decreased) to permit lower class of service control traffic to be transmitted using higher class of service resources without adjusting the priority levels for the lower class of service control traffic.
    Type: Application
    Filed: December 10, 2018
    Publication date: April 18, 2019
    Inventors: Anand Kumar Singh, Venkatesh Srinivasan, Swaminathan Narayanan, Anulekha Chodey, Ambrish Niranjan Mehta, Natarajan Manthiramoorthy
  • Publication number: 20190036809
    Abstract: Systems, methods, and non-transitory computer-readable storage media for detecting network loops. In some embodiments, a system can identify a port that is in a blocking state. The blocking state can be for dropping one or more types of packets and preventing the port from forwarding the one or more types of packets. The system can determine a number of packets transmitted through the port by a hardware layer on the system and a number of control packets transmitted through the port by a software layer on the system. The system can determine whether the number of packets is greater than the number of control packets. When the number of packets is greater than the number of control packets, the system can determine that the blocking state has failed to prevent the port from forwarding the one or more types of packets.
    Type: Application
    Filed: September 19, 2018
    Publication date: January 31, 2019
    Inventors: Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Ambrish Niranjan Mehta, Anand Kumar Singh, Anulekha Chodey
  • Publication number: 20190020575
    Abstract: Systems, methods, and computer-readable storage media for detecting network loops. A system can identify, for each virtual tunnel endpoint (VTEP) from multiple VTEPs in a network, respective media access control address data including the respective local interface media access control addresses of the respective VTEP and respective media access control addresses learned by the respective VTEP. The system can determine whether the VTEPs are running spanning tree protocol (STP), and whether a media access control address learned by a first VTEP matches a respective local interface media access control address of a second VTEP. The system can detect a loop when the media access control address learned by the first VTEP matches the respective local interface media access control address of the second VTEP. The system can also detect a loop when the VTEPs are running STP and the first and second VTEPs see the same STP root bridge.
    Type: Application
    Filed: September 17, 2018
    Publication date: January 17, 2019
    Inventors: Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Ambrish Niranjan Mehta, Anand Kumar Singh, Anulekha Chodey
  • Patent number: 10153977
    Abstract: Aspects of the present disclosure are directed to dynamically adjusting control plane policing throughput of low (or lower) priority control plane traffic to permit higher throughput. The drop rate for low or lower priority control plane traffic can be determined to be above a threshold value. The processor utilization can be determined to be operating under normal utilization (or at a utilization within a threshold utilization value). The control plane policing for control plane traffic for the low or lower class of service can be increased (or decreased) to permit lower class of service control traffic to be transmitted using higher class of service resources without adjusting the priority levels for the lower class of service control traffic.
    Type: Grant
    Filed: May 12, 2016
    Date of Patent: December 11, 2018
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Anand Kumar Singh, Venkatesh Srinivasan, Swaminathan Narayanan, Anulekha Chodey, Ambrish Niranjan Mehta, Natarajan Manthiramoorthy
  • Patent number: 10110469
    Abstract: Systems, methods, and non-transitory computer-readable storage media for detecting network loops. In some embodiments, a system can identify a port that is in a blocking state. The blocking state can be for dropping one or more types of packets and preventing the port from forwarding the one or more types of packets. The system can determine a number of packets transmitted through the port by a hardware layer on the system and a number of control packets transmitted through the port by a software layer on the system. The system can determine whether the number of packets is greater than the number of control packets. When the number of packets is greater than the number of control packets, the system can determine that the blocking state has failed to prevent the port from forwarding the one or more types of packets.
    Type: Grant
    Filed: July 21, 2016
    Date of Patent: October 23, 2018
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Ambrish Niranjan Mehta, Anand Kumar Singh, Anulekha Chodey
  • Patent number: 10079752
    Abstract: Systems, methods, and computer-readable storage media for detecting network loops. A system can identify, for each virtual tunnel endpoint (VTEP) from multiple VTEPs in a network, respective media access control address data including the respective local interface media access control addresses of the respective VTEP and respective media access control addresses learned by the respective VTEP. The system can determine whether the VTEPs are running spanning tree protocol (STP), and whether a media access control address learned by a first VTEP matches a respective local interface media access control address of a second VTEP. The system can detect a loop when the media access control address learned by the first VTEP matches the respective local interface media access control address of the second VTEP. The system can also detect a loop when the VTEPs are running STP and the first and second VTEPs see the same STP root bridge.
    Type: Grant
    Filed: August 9, 2016
    Date of Patent: September 18, 2018
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Ambrish Niranjan Mehta, Anand Kumar Singh, Anulekha Chodey
  • Publication number: 20180026872
    Abstract: Systems, methods, and computer-readable storage media for detecting network loops. A system can identify, for each virtual tunnel endpoint (VTEP) from multiple VTEPs in a network, respective media access control address data including the respective local interface media access control addresses of the respective VTEP and respective media access control addresses learned by the respective VTEP. The system can determine whether the VTEPs are running spanning tree protocol (STP), and whether a media access control address learned by a first VTEP matches a respective local interface media access control address of a second VTEP. The system can detect a loop when the media access control address learned by the first VTEP matches the respective local interface media access control address of the second VTEP. The system can also detect a loop when the VTEPs are running STP and the first and second VTEPs see the same STP root bridge.
    Type: Application
    Filed: August 9, 2016
    Publication date: January 25, 2018
    Inventors: Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Ambrish Niranjan Mehta, Anand Kumar Singh, Anulekha Chodey
  • Publication number: 20180026871
    Abstract: Systems, methods, and non-transitory computer-readable storage media for detecting network loops. In some embodiments, a system can identify a port that is in a blocking state. The blocking state can be for dropping one or more types of packets and preventing the port from forwarding the one or more types of packets. The system can determine a number of packets transmitted through the port by a hardware layer on the system and a number of control packets transmitted through the port by a software layer on the system. The system can determine whether the number of packets is greater than the number of control packets. When the number of packets is greater than the number of control packets, the system can determine that the blocking state has failed to prevent the port from forwarding the one or more types of packets.
    Type: Application
    Filed: July 21, 2016
    Publication date: January 25, 2018
    Inventors: Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Ambrish Niranjan Mehta, Anand Kumar Singh, Anulekha Chodey
  • Publication number: 20180026810
    Abstract: Systems, methods, and non-transitory computer-readable storage media for detecting network loops. In some embodiments, a system can identify a network path having multiple hops associated with respective nodes which are configured in a forwarding mode. The system can traverse the network path to identify, for each node from the respective nodes, a respective next hop. Based on the respective next hop for each node, the system can determine whether two or more nodes from the respective nodes have a same respective next hop. When the two or more nodes have the same respective next hop, the system can determine that the network path has a network loop.
    Type: Application
    Filed: August 9, 2016
    Publication date: January 25, 2018
    Inventors: Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Ambrish Niranjan Mehta, Anand Kumar Singh, Anulekha Chodey
  • Publication number: 20180027012
    Abstract: Systems, methods, and computer-readable media for preventing man-in-the-middle attacks within network, without the need to maintain trusted/un-trusted port listings on each network device. The solutions disclosed herein leverage a host database which can be present on controllers, thereby providing a centralized database instead of a per-node DHCP binding database. Systems configured according to this disclosure (1) use a flood list only for ARP packets received from the controller 116; and (2) unicast ARP packets to the controller before communicating the packets to other VTEPs.
    Type: Application
    Filed: July 20, 2016
    Publication date: January 25, 2018
    Inventors: Venkatesh Srinivasan, Ambrish Niranjan Mehta, Anand Kumar Singh, Anulekha Chodey, Natarajan Manthiramoorthy, Swaminathan Narayanan
  • Patent number: 9870219
    Abstract: Mechanisms for switch upgrades using remote containers. An example system can export, to a server, a state of software processes associated with a first software container at the system. The system can generate a lightweight software container configured to forward traffic associated with the first software container to a second software container at the server, generated based on the state. The system can perform a switchover between the first software container and lightweight software container. The switchover can enable the lightweight software container to forward, to the second container, traffic associated with the first software container. The system can generate a fourth software container based on a snapshot of the second software container, and perform another switchover between the lightweight software container and fourth software container.
    Type: Grant
    Filed: July 6, 2016
    Date of Patent: January 16, 2018
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Anand Kumar Singh, Ambrish Niranjan Mehta, Anulekha Chodey
  • Publication number: 20180011699
    Abstract: Mechanisms for switch upgrades using remote containers. An example system can export, to a server, a state of software processes associated with a first software container at the system. The system can generate a lightweight software container configured to forward traffic associated with the first software container to a second software container at the server, generated based on the state. The system can perform a switchover between the first software container and lightweight software container. The switchover can enable the lightweight software container to forward, to the second container, traffic associated with the first software container. The system can generate a fourth software container based on a snapshot of the second software container, and perform another switchover between the lightweight software container and fourth software container.
    Type: Application
    Filed: July 6, 2016
    Publication date: January 11, 2018
    Inventors: Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Anand Kumar Singh, Ambrish Niranjan Mehta, Anulekha Chodey
  • Publication number: 20170331747
    Abstract: Aspects of the present disclosure are directed to dynamically adjusting control plane policing throughput of low (or lower) priority control plane traffic to permit higher throughput. The drop rate for low or lower priority control plane traffic can be determined to be above a threshold value. The processor utilization can be determined to be operating under normal utilization (or at a utilization within a threshold utilization value). The control plane policing for control plane traffic for the low or lower class of service can be increased (or decreased) to permit lower class of service control traffic to be transmitted using higher class of service resources without adjusting the priority levels for the lower class of service control traffic.
    Type: Application
    Filed: May 12, 2016
    Publication date: November 16, 2017
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Anand Kumar Singh, Venkatesh Srinivasan, Swaminathan Narayanan, Anulekha Chodey, Ambrish Niranjan Mehta, Natarajan Manthiramoorthy