Patents by Inventor Deepak Hegde
Deepak Hegde has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210328928Abstract: Techniques for enabling offline, intelligent load balancing of Stream Control Transmission Protocol (SCTP) traffic are provided. According to one embodiment, a load balancer can receive one or more SCTP packets that have been replicated from a network being monitored. The load balancer can further recover an SCTP message from the one or more SCTP packets and can map the SCTP message to an egress port based on one or more parameters decoded from the SCTP message and one or more rules. The load balancer can then transmit the SCTP message out of the egress port towards an analytic probe or tool for analysis.Type: ApplicationFiled: May 4, 2021Publication date: October 21, 2021Inventors: Jude Pragash VEDAM, Suresh Paruchuri, Deepak Hegde
-
Patent number: 10999200Abstract: Techniques for enabling offline, intelligent load balancing of Stream Control Transmission Protocol (SCTP) traffic are provided. According to one embodiment, a load balancer can receive one or more SCTP packets that have been replicated from a network being monitored. The load balancer can further recover an SCTP message from the one or more SCTP packets and can map the SCTP message to an egress port based on one or more parameters decoded from the SCTP message and one or more rules. The load balancer can then transmit the SCTP message out of the egress port towards an analytic probe or tool for analysis.Type: GrantFiled: October 27, 2016Date of Patent: May 4, 2021Assignee: Extreme Networks, Inc.Inventors: Jude Pragash Vedam, Suresh Paruchuri, Deepak Hegde
-
Patent number: 10887786Abstract: Techniques for performing near-uniform load balancing in a visibility network based on usage prediction are provided. According to one embodiment, a packet broker of the visibility network can receive a control packet replicated from a core network, where the control packet includes a user or device identifier and a request to create a user session for a user identified by the user/device identifier. The packet broker can further determine, based on the user/device identifier and one or more other parameters, a rank value for the user session, where the rank value indicates an amount of network traffic that the user is likely to generate in the core network during the user session. The packet broker can then select an egress port for the user session based on the rank value and forward subsequent control and data traffic for the user session through the selected egress port.Type: GrantFiled: October 19, 2017Date of Patent: January 5, 2021Assignee: Extreme Networks, Inc.Inventors: Jude Pragash Vedam, Deepak Hegde, Ashwin Naresh, Shubharanjan Dasgupta
-
Patent number: 10855562Abstract: Techniques for implementing traffic deduplication in a visibility network are provided. According to one embodiment, a packet broker of the visibility network can receive a control or data packet replicated from a core network. The packet broker can then apply a first stage deduplication process in which the packet broker attempts to deduplicate the control or data packet based on one or more interfaces of the core network from which the control or data packet originated, and apply a second stage deduplication process in which the packet broker attempts to deduplicate the control or data packet based on the content (e.g., payload) of the control or data packet.Type: GrantFiled: October 1, 2018Date of Patent: December 1, 2020Assignee: Extreme Networks, LLCInventors: Deepak Hegde, Shailender Sharma, Rakesh Varimalla
-
Publication number: 20190149437Abstract: Techniques for implementing traffic deduplication in a visibility network are provided. According to one embodiment, a packet broker of the visibility network can receive a control or data packet replicated from a core network. The packet broker can then apply a first stage deduplication process in which the packet broker attempts to deduplicate the control or data packet based on one or more interfaces of the core network from which the control ot data packet originated, and apply a second stage deduplication process in which the packet broker attempts to deduplicate the control or data packet based on the content (e.g., payload) of the control or data packet.Type: ApplicationFiled: October 1, 2018Publication date: May 16, 2019Applicant: Extreme Networks, Inc.Inventors: Deepak Hegde, Shailender Sharma, Rakesh Varimalla
-
Patent number: 10243813Abstract: Techniques for implementing a software-based packet broker in a visibility network are provided. According to one embodiment, the software-based packet broker can comprise a network device and a cluster of one or more processing nodes. The network device can receive a control or data packet replicated from a core network and forward the control or data packet to the cluster of one or more processing nodes. At least one processing node in the cluster can then execute, in software, one or more packet processing functions on the control or data packet, where the one or more packet processing functions are operable to determine an egress port of the network device through which the control or data packet should be forwarded to a probe/tool of the visibility network for analysis.Type: GrantFiled: July 8, 2016Date of Patent: March 26, 2019Assignee: Extreme Networks, Inc.Inventors: Deepak Hegde, Shailender Sharma, Rakesh Varimalla, Vedam Jude Pragash, Shubharanjan Dasgupta
-
Patent number: 10091075Abstract: Techniques for implementing traffic deduplication in a visibility network are provided. According to one embodiment, a packet broker of the visibility network can receive a control or data packet replicated from a core network. The packet broker can then apply a first stage deduplication process in which the packet broker attempts to deduplicate the control or data packet based on one or more interfaces of the core network from which the control or data packet originated, and apply a second stage deduplication process in which the packet broker attempts to deduplicate the control or data packet based on the content (e.g., payload) of the control or data packet.Type: GrantFiled: July 8, 2016Date of Patent: October 2, 2018Assignee: Extreme Networks, Inc.Inventors: Deepak Hegde, Shailender Sharma, Rakesh Varimalla
-
Publication number: 20170339022Abstract: Techniques for performing anomaly detection and prediction in a packet broker of a visibility network are provided. According to one embodiment, the packet broker can apply one or more machine learning models to network traffic that is replicated from a core network. The packet broker can further detect or predict, based on the application of the one or more machine learning models, the occurrence of a network traffic anomaly in the core network. The packet broker can then take one or more predefined actions in response to the detection/prediction of the anomaly.Type: ApplicationFiled: March 22, 2017Publication date: November 23, 2017Inventors: Deepak Hegde, Shailender Sharma, Jude Pragash Vedam, Ashwin Naresh
-
Publication number: 20170279723Abstract: Techniques for enabling offline, intelligent load balancing of Stream Control Transmission Protocol (SCTP) traffic are provided. According to one embodiment, a load balancer can receive one or more SCTP packets that have been replicated from a network being monitored. The load balancer can further recover an SCTP message from the one or more SCTP packets and can map the SCTP message to an egress port based on one or more parameters decoded from the SCTP message and one or more rules. The load balancer can then transmit the SCTP message out of the egress port towards an analytic probe or tool for analysis.Type: ApplicationFiled: October 27, 2016Publication date: September 28, 2017Inventors: Jude Pragash Vedam, Suresh Paruchuri, Deepak Hegde
-
Publication number: 20170237632Abstract: Techniques for implementing a software-based packet broker in a visibility network are provided. According to one embodiment, the software-based packet broker can comprise a network device and a cluster of one or more processing nodes. The network device can receive a control or data packet replicated from a core network and forward the control or data packet to the cluster of one or more processing nodes. At least one processing node in the cluster can then execute, in software, one or more packet processing functions on the control or data packet, where the one or more packet processing functions are operable to determine an egress port of the network device through which the control or data packet should be forwarded to a probe/tool of the visibility network for analysis.Type: ApplicationFiled: July 8, 2016Publication date: August 17, 2017Inventors: Deepak Hegde, Shailender Sharma, Rakesh Varimalla, Vedam Jude Pragash, Shubharanjan Dasgupta
-
Publication number: 20170237633Abstract: Techniques for implementing traffic deduplication in a visibility network are provided. According to one embodiment, a packet broker of the visibility network can receive a control or data packet replicated from a core network. The packet broker can then apply a first stage deduplication process in which the packet broker attempts to deduplicate the control or data packet based on one or more interfaces of the core network from which the control or data packet originated, and apply a second stage deduplication process in which the packet broker attempts to deduplicate the control or data packet based on the content (e.g., payload) of the control or data packet.Type: ApplicationFiled: July 8, 2016Publication date: August 17, 2017Inventors: Deepak Hegde, Shailender Sharma, Rakesh Varimalla
-
Patent number: 8788878Abstract: A system includes a source storage device, a target storage device, a host coupled to the source storage device and the target storage device, and a first migration device coupled to the source storage device and the target storage device. The first migration device includes a first virtual storage device. The first migration device is configured to migrate data from the source storage device to the target storage device, and the first virtual storage device is configured to receive write access requests for the data from the host during the data migration and send the access request to the source storage device and target storage device.Type: GrantFiled: November 13, 2012Date of Patent: July 22, 2014Assignee: Brocade Communications Systems, Inc.Inventors: Balakumar Kaushik, Deepak Hegde, Anil Kumar, Narasimha Murthy
-
Patent number: 8341459Abstract: A system includes a source storage device, a target storage device, a host coupled to the source storage device and the target storage device, and a first migration device coupled to the source storage device and the target storage device. The first migration device includes a first virtual storage device. The first migration device is configured to migrate data from the source storage device to the target storage device, and the first virtual storage device is configured to receive write access requests for the data from the host during the data migration and send the access request to the source storage device and target storage device.Type: GrantFiled: July 31, 2008Date of Patent: December 25, 2012Assignee: Brocade Communications Systems, Inc.Inventors: Balakumar Kaushik, Deepak Hegde, Anil Kumar, Narasimha Murthy
-
Publication number: 20090037679Abstract: A system includes a source storage device, a target storage device, a host coupled to the source storage device and the target storage device, and a first migration device coupled to the source storage device and the target storage device. The first migration device includes a first virtual storage device. The first migration device is configured to migrate data from the source storage device to the target storage device, and the first virtual storage device is configured to receive write access requests for the data from the host during the data migration and send the access request to the source storage device and target storage device.Type: ApplicationFiled: July 31, 2008Publication date: February 5, 2009Inventors: Balakumar Kaushik, Deepak Hegde, Anil Kumar, Narasimha Murthy
-
Patent number: 6911472Abstract: A pharmaceutical composition comprising as an active ingredient an HMG-CoA reductase inhibitor and an aminosugar.Type: GrantFiled: May 3, 2002Date of Patent: June 28, 2005Assignee: Sandoz AGInventors: Deepak Hegde, Sushrut Kulkarni
-
Publication number: 20040092527Abstract: A composition comprising itraconazole and an organic acid and the use of such composition in the production of pharmaceutical compositions comprising itryconazole as an active ingredient.Type: ApplicationFiled: December 19, 2002Publication date: May 13, 2004Inventors: Ramaswami Bharatrajan, Deepak Hegde, Neeta Nerlekar