Patents by Inventor Ganesan Chandrashekhar

Ganesan Chandrashekhar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10237123
    Abstract: Some embodiments provide a method for employing the management and control system of a network to dynamically recover from a split-brain condition in the edge nodes of the network. The method of some embodiments takes a corrective action to automatically recover from a split-brain failure occurred at a pair of high availability (HA) edge nodes of the network. The HA edge nodes include an active machine and a standby machine. The active edge node actively passes through the network traffic (e.g., north-south traffic for a logical network), while the standby edge node is synchronized and ready to transition to the active state, should a failure occur. Both HA nodes share the same configuration settings and only one is active until a path, link, or system failure occurs. The active edge node also provides stateful services (e.g., stateful firewall, load balancing, etc.) to the data compute nodes of the network.
    Type: Grant
    Filed: December 21, 2016
    Date of Patent: March 19, 2019
    Assignee: NICIRA, INC.
    Inventors: Ankur Dubey, Ganesan Chandrashekhar, Sreeram Ravinoothala
  • Patent number: 10225184
    Abstract: A LRE (logical routing element) that have LIFs that are active in all host machines spanned by the LRE as well as LIFs that are active in only a subset of those spanned host machines is provided. A host machine having an active LIF for a particular L2 segment would perform the L3 routing operations for network traffic related to that L2 segment. A host machine having an inactive LIF for the particular L2 segment would not perform L3 routing operations for the network traffic of the L2 segment.
    Type: Grant
    Filed: August 31, 2015
    Date of Patent: March 5, 2019
    Assignee: NICIRA, INC.
    Inventors: Vivek Agarwal, Ganesan Chandrashekhar, Rahul Korivi Subramaniyam, Howard Wang, Ram Dular Singh
  • Publication number: 20190065265
    Abstract: Computer system and method for characterizing throughput performance of a datacenter utilize bandwidth information of physical network interfaces in the datacenter and results of benchmark testing on throughput on a single processor core to compute a plurality of throughput constraints that define a throughput capacity region for the datacenter to improve throughput performance of the datacenter.
    Type: Application
    Filed: August 25, 2018
    Publication date: February 28, 2019
    Inventors: Dexiang WANG, Bin QIAN, Jinqiang YANG, Naga S. S. Kishore KANKIPATI, Sanal PILLAI, Sujatha SUNDARARAMAN, Ganesan CHANDRASHEKHAR, Rishi MEHTA
  • Publication number: 20190068493
    Abstract: A data compute node executes (i) a set of tenant applications connected to a third party overlay network, (ii) a set of network manager applications, and (iii) a managed forwarding element that includes a pair of overlay and underlay network virtual adapters. A packet that is received from a network manager application and addressed to an underlay network destination is sent to the underlay network destination address through a physical NIC of the host without network address translation or encapsulation. A packet that is received from a tenant application and addressed to an underlay network destination is subject to SNAT and is sent to the underlay network destination address. A packet that is received from a tenant application and is addressed an overlay destination address is encapsulated with the header of the overlay network and is sent to the overlay network destination address through the underlay virtual adapter.
    Type: Application
    Filed: August 24, 2017
    Publication date: February 28, 2019
    Inventors: Shashank Ram, Sairam Venugopal, Yin Lin, Anand Kumar, Nithin Bangalore Raju, Mukesh Hira, Ganesan Chandrashekhar, Vivek Agarwal
  • Publication number: 20190068689
    Abstract: A physical host machine of a public cloud system includes a set of processing units for executing instructions stored in non-transitory machine readable media. The physical host machine also includes a physical network interface cars (PNIC) and a non-transitory machine readable medium that stores a data compute node (DCN). The DCN includes first and second applications, first and second logical interfaces, a network stack, and a managed forwarding element (MFE). The first application is connected to the pNIC through the network stack, the first logical interface, and the MFE. The second application is connected to the PNIC through the network stack, the second logical interface, and the MFE.
    Type: Application
    Filed: August 24, 2017
    Publication date: February 28, 2019
    Inventors: Shashank Ram, Sairam Venugopal, Yin Lin, Anand Kumar, Nithin Bangalore Raju, Mukesh Hira, Ganesan Chandrashekhar, Vivek Agarwal
  • Patent number: 10218523
    Abstract: For a managed network implementing at least one logical router having centralized and distributed components, some embodiments provide a method for configuring a managed forwarding element (MFE) executing on a first host machine to implement a distributed multicast logical router and multiple logical switches logically connected to the logical router in conjunction with a set of additional MFEs executing on additional host machines to process multicast data messages. The method receives a multicast group report from a data compute node (DCN) that executes on the first host, sends a summarized multicast group report indicating multicast groups joined by DCNs executing on the first host to a set of central controllers, receives data based on an aggregated multicast group report from the set of central controllers, and uses the data based on the aggregated multicast group report to configure the MFE to implement the distributed multicast logical router.
    Type: Grant
    Filed: July 17, 2017
    Date of Patent: February 26, 2019
    Assignee: NICIRA, INC.
    Inventors: Sami Boutros, Alexander Tessmer, Subin Cyriac Mathew, Ganesan Chandrashekhar, Vivek Agarwal
  • Publication number: 20190036868
    Abstract: Techniques are disclosed herein for providing an agent for implementing layer 2 (L2) communication on a layer 3 (L3) underlay network. In one embodiment, an agent in virtualization software determines a newly available network address of a VM, configures a network interface of the L3 network to be associated with the network address such that network traffic for the network address is directed to the network interface, adds a route to a virtual router in the virtualization software indicating the VM is local, and adds a router to an address resolution table to associate the network address with a MAC address. This permits a packet sent from one VM to another VM to be processed by the virtual router based on routes therein and forwarded to the other VM either internally or using the L3 underlay network.
    Type: Application
    Filed: April 17, 2018
    Publication date: January 31, 2019
    Inventors: Ganesan Chandrashekhar, ChiHsiang Su, Minjal Agarwal, Xiaohu Wang, Dileep Devireddy, Hitesh Patel
  • Publication number: 20190028442
    Abstract: Certain embodiments described herein are generally directed to enabling a group of host machines within a network to securely communicate an unknown unicast packet. In some embodiments, a key policy is defined exclusively for the secure communication of unknown unicast packets. The key policy is transmitted by a central controller to the group of host machines for negotiating session keys among each other when communicating unknown unicast packets.
    Type: Application
    Filed: August 11, 2017
    Publication date: January 24, 2019
    Inventors: Sanal PILLAI, Calvin QIAN, Gang XU, Bin ZAN, Ganesan CHANDRASHEKHAR
  • Publication number: 20190028372
    Abstract: A method of diagnosing a software-defined network is provided. The method determines an observed plurality of network control events from a set of network control event messages. Each network control event message includes a unique identifier and is used for configuring a network configuration entity on a network component. The method, from a description of an expected configuration of the network, determines an expected plurality of network control events. The method backtraces the observed control events from the current configuration of the network to determine whether the expected network control events have occurred. The method identifies a network component as the source of fault when the network component receives an input set of network control events that matches a set of expected network events but does not produce a set of output network control events that match a set of network control events.
    Type: Application
    Filed: July 18, 2017
    Publication date: January 24, 2019
    Inventors: Su Wang, Pankaj Thakkar, Ganesan Chandrashekhar
  • Publication number: 20190028328
    Abstract: Exemplary methods, apparatuses, and systems maintain network membership information for a host when it is disconnected from a controller. When the host detects a loss of connectivity with the network controller, the host identifies and selects one or more hosts that are members of a control logical network. The control logical network includes hosts configured to run data compute nodes that are members of the overlay network, regardless of whether or not each of the hosts is currently running a data compute node that is a member of the overlay network. The host then sends any broadcast, unknown destination, or multicast (BUM) data packet(s) to the selected one or more hosts.
    Type: Application
    Filed: July 19, 2017
    Publication date: January 24, 2019
    Inventors: Alexander TESSMER, Ganesan CHANDRASHEKHAR, Vivek AGARWAL, Subin Cyriac MATHEW, Ankur Kumar SHARMA
  • Publication number: 20190020684
    Abstract: Certain embodiments described herein are generally directed to a first host machine exchanging a Security Parameter Index (SPI) value with a second host machine by storing the SPI in an options field of an encapsulation header of an encapsulated packet.
    Type: Application
    Filed: July 13, 2017
    Publication date: January 17, 2019
    Inventors: Calvin QIAN, Ganesan CHANDRASHEKHAR, Sanal PILLAI, Kishore KANKIPATI, Sujatha SUNDARARAMAN
  • Publication number: 20190020492
    Abstract: For a managed network implementing at least one logical router having centralized and distributed components, some embodiments provide a method for configuring a managed forwarding element (MFE) executing on a first host machine to implement a distributed multicast logical router and multiple logical switches logically connected to the logical router in conjunction with a set of additional MFEs executing on additional host machines to process multicast data messages. The method receives a multicast group report from a data compute node (DCN) that executes on the first host, sends a summarized multicast group report indicating multicast groups joined by DCNs executing on the first host to a set of central controllers, receives data based on an aggregated multicast group report from the set of central controllers, and uses the data based on the aggregated multicast group report to configure the MFE to implement the distributed multicast logical router.
    Type: Application
    Filed: July 17, 2017
    Publication date: January 17, 2019
    Inventors: Sami Boutros, Alexander Tessmer, Subin Cyriac Mathew, Ganesan Chandrashekhar, Vivek Agarwal
  • Publication number: 20190020600
    Abstract: Some embodiments provide a method for handling failure at one of several peer centralized components of a logical router. At a first one of the peer centralized components of the logical router, the method detects that a second one of the peer centralized components has failed. In response to the detection, the method automatically identifies a network layer address of the failed second peer. The method assumes responsibility for data traffic to the failed peer by broadcasting a message on a logical switch that connects all of the peer centralized components and a distributed component of the logical router. The message instructs recipients to associate the identified network layer address with a data link layer address of the first peer centralized component.
    Type: Application
    Filed: September 18, 2018
    Publication date: January 17, 2019
    Inventors: Ronghua Zhang, Ganesan Chandrashekhar, Sreeram Ravinoothala, Kai-Wei Fan
  • Publication number: 20190014039
    Abstract: A method of creating containers in a physical host that includes a managed forwarding element (MFE) configured to forward packets to and from a set of data compute nodes (DCNs) hosted by the physical host. The method creates a container DCN in the host. The container DCN includes a virtual network interface card (VNIC) configured to exchange packets with the MFE. The method creates a plurality of containers in the container DCN. The method, for each container in the container DCN, creates a corresponding port on the MFE. The method sends packets addressed to each of the plurality of containers from the corresponding MFE port to the VNIC of the container DCN.
    Type: Application
    Filed: August 25, 2018
    Publication date: January 10, 2019
    Inventors: Jianjun Shen, Ganesan Chandrashekhar, Donghai Han, Jingchun Jason Jiang, Wenyi Jiang, Ayyappan Veeraiyan
  • Publication number: 20180331948
    Abstract: For a managed network including multiple host machines implementing multiple logical networks, some embodiments provide a method that reduces the memory and traffic load required to implement the multiple logical networks. The method generates configuration data for each of multiple host machines including (i) data to configure a host machine to implement a set of logical forwarding elements that belong to a set of routing domains and (ii) identifiers for each routing domain in the set of routing domains. The method then receives data regarding tunnels endpoints operating on each of the host machines and an association with the routing identifiers sent to the host machines. The method then generates a routing domain tunnel endpoint list for each routing domain based on the data received from each of the host machines including a list of the tunnel endpoints associated with the routing domain which the host machines can use to facilitate packet processing.
    Type: Application
    Filed: May 15, 2017
    Publication date: November 15, 2018
    Inventors: Caixia Jiang, Jianjun Shen, Pankaj Thakkar, Anupam Chanda, Ronghua Zhang, Ganesan Chandrashekhar, Vicky Liu, Da Wan, Frank Pan, Hua Wang, Donghai Han
  • Patent number: 10129180
    Abstract: Some embodiments provide a method for handling failure at one of several peer centralized components of a logical router. At a first one of the peer centralized components of the logical router, the method detects that a second one of the peer centralized components has failed. In response to the detection, the method automatically identifies a network layer address of the failed second peer. The method assumes responsibility for data traffic to the failed peer by broadcasting a message on a logical switch that connects all of the peer centralized components and a distributed component of the logical router. The message instructs recipients to associate the identified network layer address with a data link layer address of the first peer centralized component.
    Type: Grant
    Filed: July 30, 2015
    Date of Patent: November 13, 2018
    Assignee: NICIRA, INC.
    Inventors: Ronghua Zhang, Ganesan Chandrashekhar
  • Patent number: 10120729
    Abstract: Exemplary methods, apparatuses, and systems include virtualization software of a host computer receiving a first packet addressed to a first virtual link layer address. Each of a first plurality of virtual machines on the first host computer is configured to share the first virtual link layer address. The virtualization software of the first host computer maps a flow of packets, including the first packet, to a first virtual machine within the first plurality of virtual machines and forwards the first packet to the first virtual machine. The virtualization software of the first host computer receives a second packet from the first virtual machine in response to the first packet. The second packet includes the first virtual link layer address as a source address for the first virtual machine.
    Type: Grant
    Filed: February 14, 2014
    Date of Patent: November 6, 2018
    Assignee: VMWARE, INC.
    Inventors: Sreeram Ravinoothala, Ganesan Chandrashekhar
  • Publication number: 20180316500
    Abstract: Exemplary methods, apparatuses, and systems include a central controller receiving a request to generate a new encryption key for a security group to replace a current encryption key for the security group. The security group includes a plurality of hosts that each encrypt and decrypt communications using the current encryption key. In response to receiving the request, the central controller determines that a threshold period following generation of the current encryption key has not expired. In response to determining that the threshold period has not expired, the central controller delays execution of the request until the expiration of the threshold period. In response to the expiration of the threshold period, the central controller executes the request by generating the new encryption key, storing a time of creation of the new encryption key, and transmitting the new encryption key to the plurality of hosts.
    Type: Application
    Filed: April 28, 2017
    Publication date: November 1, 2018
    Inventors: Gang XU, Bin QIAN, Ganesan CHANDRASHEKHAR, Bin ZAN
  • Patent number: 10091125
    Abstract: Multiple TCP/IP stack processors on a host. The multiple TCP/IP stack processors are provided independently of TCP/IP stack processors implemented by virtual machines on the host. The TCP/IP stack processors provide multiple different default gateway addresses for use with multiple processes. The default gateway addresses allow a service to communicate across an L3 network. Processes outside of virtual machines that utilize the TCP/IP stack processor on a first host can benefit from using their own gateway, and communicate with their peer process on a second host, regardless of whether the second host is located within the same subnet or a different subnet. The multiple TCP/IP stack processors can use separately allocated resources. Separate TCP/IP stack processors can be provided for each of multiple tenants on the host. Separate loopback interfaces of multiple TCP/IP stack processors can be used to create separate containment for separate sets of processes on a host.
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: October 2, 2018
    Assignee: NICIRA, INC.
    Inventors: Nithin B. Raju, Ganesan Chandrashekhar, Gopakumar Pillai
  • Publication number: 20180276013
    Abstract: Some embodiments provide a method of operating several logical networks over a network virtualization infrastructure. The method defines a managed physical switching element (MPSE) that includes several ports for forwarding packets to and from a plurality of virtual machines. Each port is associated with a unique media access control (MAC) address. The metho defines several managed physical routing elements (MPREs) for the several different logical networks. Each MPRE is for receiving data packets from a same port of the MPSE. Each MPRE is defined for a different logical network and for routing data packets between different segments of the logical network. The method provides the defined MPSE and the defined plurality of MPREs to a plurality of host machines as configuration data.
    Type: Application
    Filed: May 21, 2018
    Publication date: September 27, 2018
    Inventors: Ganesan Chandrashekhar, Rahul Korivi Subramaniyam, Ram Dular Singh, Vivek Agarwal, Howard Wang