Patents by Inventor Jothi Prakash Prabakaran
Jothi Prakash Prabakaran has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11924240Abstract: Aspects of the subject technology relate to a system configured to receive a set of network snapshot segments from an output stream of a stream processing service, compile the set of network snapshot segments from the set of messages into a first network snapshot and a second network snapshot, and compare the first network snapshot and the second network snapshot to identify a difference between the first network snapshot and the second network snapshot.Type: GrantFiled: November 25, 2020Date of Patent: March 5, 2024Assignee: Cisco Technology, Inc.Inventors: Shashi Gandham, Navindra Yadav, Janardhanan Radhakrishnan, Hoang-Nam Nguyen, Umesh Paul Mahindra, Sunil Gupta, Praneeth Vallem, Supreeth Rao, Darshan Shrinath Purandare, Xuan Zou, Joseph Daniel Beshay, Jothi Prakash Prabakaran
-
Patent number: 11128700Abstract: Aspects of the disclosed technology provide methods for automatically tuning load-balancer configurations in a network environment. In some implementations, a process of the disclosed technology includes steps for collecting flow records of traffic flow segments at a middle box in a network environment, the traffic flow segments corresponding to one or more traffic flows passing through the middle box, analyzing the flow records to identify one or more traffic patterns in the network environment, and automatically updating a load balancer configuration based on the one or more traffic patterns, wherein updating the load balancer configuration improves at least one traffic flow parameter for at least one of the traffic flows passing through the middle box. Systems and machine-readable media are also provided.Type: GrantFiled: June 29, 2018Date of Patent: September 21, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Supreeth Rao, Navindra Yadav, Umamaheswaran Arumugam, Michael Watts, Shashi Gandham, Darshan Shrinath Purandare, Duy Nguyen, Hai Vu, Kai Zhu, Aiyesha Ma, Tapan Shrikrishna Patwardhan, Jothi Prakash Prabakaran
-
Publication number: 20210218638Abstract: Systems, methods, and computer-readable media for flow stitching network traffic flow segments at a middlebox in a network environment. In some embodiments, flow records of traffic flow segments at a middlebox in a network environment are collected. The flow records can include transaction identifiers assigned to the traffic flow segments. Sources and destinations of the traffic flow segments with respect to the middlebox can be identified using the flow records. Further, the traffic flow segments can be stitched together to form a plurality of stitched traffic flows at the middlebox based on the transaction identifiers and the sources and destinations of the traffic flow segments in the network environment with respect to the middlebox. A configuration of the middlebox operating in the network environment can be identified based on the stitched traffic flows at the middlebox in the network environment.Type: ApplicationFiled: March 26, 2021Publication date: July 15, 2021Inventors: Supreeth Rao, Navindra Yadav, Umamaheswaran Arumugam, Michael Watts, Shashi Gandham, Prasannakumar Jobigenahally Malleshaiah, Duy Nguyen, Hai Vu, Aiyesha Ma, Tapan Shrikrishna Patwardhan, Kai Zhu, Jothi Prakash Prabakaran
-
Publication number: 20210176268Abstract: Aspects of the subject technology relate to a system configured to receive a set of network snapshot segments from an output stream of a stream processing service, compile the set of network snapshot segments from the set of messages into a first network snapshot and a second network snapshot, and compare the first network snapshot and the second network snapshot to identify a difference between the first network snapshot and the second network snapshot.Type: ApplicationFiled: November 25, 2020Publication date: June 10, 2021Inventors: Shashi Gandham, Navindra Yadav, Janardhanan Radhakrishnan, Hoang-Nam Nguyen, Umesh Paul Mahindra, Sunil Gupta, Praneeth Vallem, Supreeth Rao, Darshan Shrinath Purandare, Xuan Zou, Joseph Daniel Beshay, Jothi Prakash Prabakaran
-
Patent number: 10999149Abstract: Systems, methods, and computer-readable media for flow stitching network traffic flow segments at a middlebox in a network environment. In some embodiments, flow records of traffic flow segments at a middlebox in a network environment are collected. The flow records can include transaction identifiers assigned to the traffic flow segments. Sources and destinations of the traffic flow segments with respect to the middlebox can be identified using the flow records. Further, the traffic flow segments can be stitched together to form a plurality of stitched traffic flows at the middlebox based on the transaction identifiers and the sources and destinations of the traffic flow segments in the network environment with respect to the middlebox. A configuration of the middlebox operating in the network environment can be identified based on the stitched traffic flows at the middlebox in the network environment.Type: GrantFiled: May 21, 2018Date of Patent: May 4, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Supreeth Rao, Navindra Yadav, Umamaheswaran Arumugam, Michael Watts, Shashi Gandham, Prasannakumar Jobigenahally Malleshaiah, Duy Nguyen, Hai Vu, Aiyesha Ma, Tapan Shrikrishna Patwardhan, Kai Zhu, Jothi Prakash Prabakaran
-
Patent number: 10917438Abstract: Aspects of the disclosed technology relate to ways to authenticate customer/subscriber access to a policy update stream. A process of the technology can include steps for instantiating a network monitoring device in response to a request, the request comprising one or more configuration parameters for the network monitoring device, and receiving a first certificate from the network monitoring device, wherein the first certificate is based on the one or more configuration parameters. In some aspects, the steps can further include sending the first certificate to a processing pipeline for authentication, wherein the processing pipeline is configured to authenticate the first certificate based on a second certificate received by the processing pipeline from the network monitoring device. Systems and machine readable media are also provided.Type: GrantFiled: July 11, 2018Date of Patent: February 9, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Shashi Gandham, Navindra Yadav, Janardhanan Radhakrishnan, Hoang-Nam Nguyen, Umesh Paul Mahindra, Sunil Gupta, Praneeth Vallem, Supreeth Rao, Darshan Shrinath Purandare, Xuan Zou, Girish Anant Kalele, Jothi Prakash Prabakaran
-
Patent number: 10873593Abstract: Disclosed is a system configured to receive a set of network snapshot segments from an output stream of a stream processing service, compile the set of network snapshot segments from the set of messages into a first network snapshot and a second network snapshot, and compare the first network snapshot and the second network snapshot to identify a difference between the first network snapshot and the second network snapshot.Type: GrantFiled: May 29, 2018Date of Patent: December 22, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Shashi Gandham, Navindra Yadav, Janardhanan Radhakrishnan, Hoang-Nam Nguyen, Umesh Paul Mahindra, Sunil Gupta, Praneeth Vallem, Supreeth Rao, Darshan Shrinath Purandare, Xuan Zou, Joseph Daniel Beshay, Jothi Prakash Prabakaran
-
Patent number: 10826803Abstract: Aspects of the subject technology relate to a system configured to receive, from a stream processing service, a first network snapshot segment. The first network snapshot segment is associated with metadata that is used to determine that at least one additional network snapshot segment associated with the output stream has not been previously received. The system is configured to request, from the stream processing service, the at least one additional network snapshot segment and generate a first network snapshot by compiling the first network snapshot segment and the at least one additional network snapshot segment.Type: GrantFiled: May 17, 2018Date of Patent: November 3, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Shashi Gandham, Navindra Yadav, Janardhanan Radhakrishnan, Hoang-Nam Nguyen, Umesh Paul Mahindra, Sunil Gupta, Praneeth Vallem, Supreeth Rao, Darshan Shrinath Purandare, Xuan Zou, Akshay Srirangam, Jothi Prakash Prabakaran
-
Patent number: 10798015Abstract: Systems, methods, and computer-readable media for flow stitching network traffic flow segments across middleboxes. A method can include collecting flow records of traffic flow segments at a first middlebox and a second middlebox in a network environment including one or more transaction identifiers assigned to the traffic flow segments. Sources and destinations of the traffic flow segments can be identified with respect to the first middlebox and the second middlebox. Corresponding subsets of the traffic flow segments can be stitched together to from a first stitched traffic flow at the first middlebox and a second stitched traffic flow at the second middlebox. The first and second stitched traffic flows can be stitched together to form a cross-middlebox stitched traffic flow across the first middlebox and the second middlebox. The cross-middlebox stitched traffic flow can be incorporated as part of network traffic data for the network environment.Type: GrantFiled: June 18, 2018Date of Patent: October 6, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Supreeth Rao, Navindra Yadav, Umamaheswaran Arumugam, Michael Watts, Shashi Gandham, Duy Nguyen, Hai Vu, Prasannakumar Jobigenahally Malleshaiah, Aiyesha Ma, Kai Zhu, Darshan Shrinath Purandare, Jothi Prakash Prabakaran
-
Patent number: 10574575Abstract: Systems, methods, and computer-readable media for flow stitching network traffic flow segments at a middlebox in a network environment. In some embodiments, a method can include collecting flow records of traffic flow segments at a middlebox in a network environment including one or more transaction identifiers assigned to the traffic flow segments. The traffic flow segments can correspond to one or more traffic flows passing through the middlebox and flow directions of the traffic flow segments with respect to the middlebox can be identified using the flow records. The traffic flow segments can be stitched together based on the one or more transaction identifiers and the flow directions of the traffic flow segments to form a stitched traffic flow of the one or more traffic flows passing through the middlebox. The stitched traffic flow can be incorporated as part of network traffic data for the network environment.Type: GrantFiled: April 30, 2018Date of Patent: February 25, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Supreeth Rao, Navindra Yadav, Umamaheswaran Arumugam, Micheal Watts, Shashi Gandham, Prasannakumar Jobigenahally Malleshaiah, Duy Nguyen, Hai Vu, Tapan Shrikrishna Patwardhan, Aiyesha Ma, Xuan Zou, Jothi Prakash Prabakaran
-
Publication number: 20190238633Abstract: Aspects of the disclosed technology provide methods for automatically tuning load-balancer configurations in a network environment. In some implementations, a process of the disclosed technology includes steps for collecting flow records of traffic flow segments at a middle box in a network environment, the traffic flow segments corresponding to one or more traffic flows passing through the middle box, analyzing the flow records to identify one or more traffic patterns in the network environment, and automatically updating a load balancer configuration based on the one or more traffic patterns, wherein updating the load balancer configuration improves at least one traffic flow parameter for at least one of the traffic flows passing through the middle box. Systems and machine-readable media are also provided.Type: ApplicationFiled: June 29, 2018Publication date: August 1, 2019Inventors: Supreeth Rao, Navindra Yadav, Umamaheswaran Arumugam, Michael Watts, Shashi Gandham, Darshan Shrinath Purandare, Duy Nguyen, Hai Vu, Kai Zhu, Aiyesha Ma, Tapan Shrikrishna Patwardhan, Jothi Prakash Prabakaran
-
Publication number: 20190230112Abstract: Aspects of the subject technology relate to a system configured to receive a set of network snapshot segments from an output stream of a stream processing service, compile the set of network snapshot segments from the set of messages into a first network snapshot and a second network snapshot, and compare the first network snapshot and the second network snapshot to identify a difference between the first network snapshot and the second network snapshot.Type: ApplicationFiled: May 29, 2018Publication date: July 25, 2019Inventors: Shashi Gandham, Navindra Yadav, Janardhanan Radhakrishnan, Hoang-Nam Nguyen, Umesh Paul Mahindra, Sunil Gupta, Praneeth Vallem, Supreeth Rao, Darshan Shrinath Purandare, Xuan Zou, Joseph Daniel Beshay, Jothi Prakash Prabakaran
-
Publication number: 20190230035Abstract: Systems, methods, and computer-readable media for flow stitching network traffic flow segments at a middlebox in a network environment. In some embodiments, a method can include collecting flow records of traffic flow segments at a middlebox in a network environment including one or more transaction identifiers assigned to the traffic flow segments. The traffic flow segments can correspond to one or more traffic flows passing through the middlebox and flow directions of the traffic flow segments with respect to the middlebox can be identified using the flow records. The traffic flow segments can be stitched together based on the one or more transaction identifiers and the flow directions of the traffic flow segments to form a stitched traffic flow of the one or more traffic flows passing through the middlebox. The stitched traffic flow can be incorporated as part of network traffic data for the network environment.Type: ApplicationFiled: April 30, 2018Publication date: July 25, 2019Inventors: Supreeth Rao, Navindra Yadav, Umamaheswaran Arumugam, Micheal Watts, Shashi Gandham, Prasannakumar Jobigenahally Malleshaiah, Duy Nguyen, Hai Vu, Tapan Shrikrishna Patwardhan, Aiyesha Ma, Xuan Zou, Jothi Prakash Prabakaran
-
Publication number: 20190230011Abstract: Aspects of the subject technology relate to a system configured to receive, from a stream processing service, a first network snapshot segment. The first network snapshot segment is associated with metadata that is used to determine that at least one additional network snapshot segment associated with the output stream has not been previously received. The system is configured to request, from the stream processing service, the at least one additional network snapshot segment and generate a first network snapshot by compiling the first network snapshot segment and the at least one additional network snapshot segment.Type: ApplicationFiled: May 17, 2018Publication date: July 25, 2019Inventors: Shashi Gandham, Navindra Yadav, Janardhanan Radhakrishnan, Hoang-Nam Nguyen, Umesh Paul Mahindra, Sunil Gupta, Praneeth Vallem, Supreeth Rao, Darshan Shrinath Purandare, Xuan Zou, Akshay Srirangam, Jothi Prakash Prabakaran
-
Publication number: 20190230041Abstract: Systems, methods, and computer-readable media for flow stitching network traffic flow segments across middleboxes. A method can include collecting flow records of traffic flow segments at a first middlebox and a second middlebox in a network environment including one or more transaction identifiers assigned to the traffic flow segments. Sources and destinations of the traffic flow segments can be identified with respect to the first middlebox and the second middlebox. Corresponding subsets of the traffic flow segments can be stitched together to from a first stitched traffic flow at the first middlebox and a second stitched traffic flow at the second middlebox. The first and second stitched traffic flows can be stitched together to form a cross-middlebox stitched traffic flow across the first middlebox and the second middlebox. The cross-middlebox stitched traffic flow can be incorporated as part of network traffic data for the network environment.Type: ApplicationFiled: June 18, 2018Publication date: July 25, 2019Inventors: Supreeth Rao, Navindra Yadav, Umamaheswaran Arumugam, Michael Watts, Shashi Gandham, Duy Nguyen, Hai Vu, Prasannakumar Jobigenahally Malleshaiah, Aiyesha Ma, Kai Zhu, Darshan Shrinath Purandare, Jothi Prakash Prabakaran
-
Publication number: 20190229995Abstract: Systems, methods, and computer-readable media for flow stitching network traffic flow segments at a middlebox in a network environment. In some embodiments, flow records of traffic flow segments at a middlebox in a network environment are collected. The flow records can include transaction identifiers assigned to the traffic flow segments. Sources and destinations of the traffic flow segments with respect to the middlebox can be identified using the flow records. Further, the traffic flow segments can be stitched together to form a plurality of stitched traffic flows at the middlebox based on the transaction identifiers and the sources and destinations of the traffic flow segments in the network environment with respect to the middlebox. A configuration of the middlebox operating in the network environment can be identified based on the stitched traffic flows at the middlebox in the network environment.Type: ApplicationFiled: May 21, 2018Publication date: July 25, 2019Inventors: Supreeth Rao, Navindra Yadav, Umamaheswaran Arumugam, Michael Watts, Shashi Gandham, Prasannakumar Jobigenahally Malleshaiah, Duy Nguyen, Hai Vu, Aiyesha Ma, Tapan Shrikrishna Patwardhan, Kai Zhu, Jothi Prakash Prabakaran
-
Publication number: 20190230127Abstract: Aspects of the disclosed technology relate to ways to authenticate customer/subscriber access to a policy update stream. A process of the technology can include steps for instantiating a network monitoring device in response to a request, the request comprising one or more configuration parameters for the network monitoring device, and receiving a first certificate from the network monitoring device, wherein the first certificate is based on the one or more configuration parameters. In some aspects, the steps can further include sending the first certificate to a processing pipeline for authentication, wherein the processing pipeline is configured to authenticate the first certificate based on a second certificate received by the processing pipeline from the network monitoring device. Systems and machine readable media are also provided.Type: ApplicationFiled: July 11, 2018Publication date: July 25, 2019Inventors: Shashi Gandham, Navindra Yadav, Janardhanan Radhakrishnan, Hoang-Nam Nguyen, Umesh Paul Mahindra, Sunil Gupta, Praneeth Vallem, Supreeth Rao, Darshan Shrinath Purandare, Xuan Zou, Girish Anant Kalele, Jothi Prakash Prabakaran