Patents by Inventor Kannan Ponnuswamy

Kannan Ponnuswamy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10616072
    Abstract: Systems, methods, and devices are disclosed for generating an interface configured to display status information for network elements on a network. In embodiments, one or more logical models of the network are obtained from at least one of a plurality of controllers on a network. Network statistics are determined based on network traffic. Based on the one or more logical models and the network statistics, a topology of the network and respective status information of one or more network elements during an epoch is identified, the epoch defining a time interval. A user interface is generated that displays the respective status information in a timeline comprising one or more of the epochs.
    Type: Grant
    Filed: July 27, 2018
    Date of Patent: April 7, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Chien-Ju Lo, Bill YuFan Chen, Kannan Ponnuswamy, Kollivakkam Raghavan, Navneet Yadav, Manvesh Vyas
  • Patent number: 10587621
    Abstract: Systems, methods, and computer-readable media for migrating to and maintaining a white-list network security model. Network traffic identified from permit-all access logs can be analyzed to determine whether it should be white-listed, and if so, a specific permit-access, without logging, policy is generated for the identified network traffic. The addition of specific permit-access policies is repeated on permit-all access logs, at which point, permit-all access policy is converted into deny-all access. In some examples, a system or method can obtain hit counts, from both hardware (eg: TCAM) and software tables, for the specific permit-access policy to determine existence of identified network traffic over a period of time. After analyzing hit counts, the specific permit-access policy can either continue to exist or be removed to maintain a white-list network security model.
    Type: Grant
    Filed: October 26, 2017
    Date of Patent: March 10, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Kannan Ponnuswamy, Navneet Yadav, Arvind Chari
  • Publication number: 20200021482
    Abstract: A monitoring device for troubleshooting events in a datacenter network identifies a first network event for a time period, and provides an initial display page, one or more additional display pages, selectable display objects, and a representation of the first network event. The device generates a dynamic troubleshooting path for the first network event to track a user navigation between display pages, a manipulation of the one or more selectable display objects, and a last-current display page, and also provides an indication of a second network event associated with higher resolution priority relative to the first network event. Retrieving the dynamic troubleshooting path causes the interface to present the last-current display page, apply the manipulation of the one or more selectable display objects, and load the user navigation between the initial dashboard display page and the one or more additional display pages in a cache.
    Type: Application
    Filed: July 11, 2018
    Publication date: January 16, 2020
    Inventors: Chien-Ju Lo, Bill YuFan Chen, Kannan Ponnuswamy, Kollivakkam Raghavan, Navneet Yadav
  • Publication number: 20190379572
    Abstract: Systems, methods, and computer-readable media for providing cross-domain assurance for networks in different network domains. In some embodiments, a method can include collecting first fabric data for a first network in a first network domain and second fabric data for a second network in a second network domain. The second fabric data for the second network can be normalized based on the first network domain to create normalized second fabric data. The first fabric data can then be correlated with the normalized second fabric data to create correlated fabric data. Subsequently, assurance can be provided across the first network in the first network domain and the second network in the second network domain using the correlated fabric data.
    Type: Application
    Filed: June 7, 2018
    Publication date: December 12, 2019
    Inventors: Navneet Yadav, Kannan Ponnuswamy, Arvind Chari, Chengguo Zhu, Tarique Shakil
  • Patent number: 10333833
    Abstract: Systems, methods, and computer-readable media for providing network assurance. In some embodiments, a method can include receiving input used to identify an endpoint. At least one logical object associated with the endpoint of logical objects in a network environment is identified based on the input. A health of the at least one logical object associated with the endpoint is determined. Additionally, a health of the network environment with respect to the endpoint operating to provide services through the network environment is determined based on the determined health of the at least one logical object associated with the endpoint.
    Type: Grant
    Filed: September 25, 2017
    Date of Patent: June 25, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Kannan Ponnuswamy, Navneet Yadav, Arvind Chari, Paul Andrew Raytick
  • Publication number: 20190173736
    Abstract: Systems, methods, and computer-readable media for providing network assurance across a network. In some embodiments, network traffic data of a cluster of nodes in a network environment can be gathered based on first network traffic flowing through the nodes using a first group of sensors implemented in the network environment. Network events occurring in the network environment can be identified, e.g. using sensors deployed in an infrastructure of the network environment. Subsequently, the network events can be correlated with the network traffic data to generate correlated network data for the network environment. The correlated network data for the network environment can be used to provide assurance between at least one server in the cluster of nodes and the network infrastructure of the network environment as part of providing assurance across the network environment.
    Type: Application
    Filed: December 5, 2017
    Publication date: June 6, 2019
    Inventors: Kannan Ponnuswamy, Alok Lalit Wadhwa, Furong Ma Gisiger, Robert Bukofser
  • Publication number: 20190097918
    Abstract: Systems, methods, and computer-readable media for providing network assurance. In some embodiments, a method can include receiving input used to identify an endpoint. At least one logical object associated with the endpoint of logical objects in a network environment is identified based on the input. A health of the at least one logical object associated with the endpoint is determined. Additionally, a health of the network environment with respect to the endpoint operating to provide services through the network environment is determined based on the determined health of the at least one logical object associated with the endpoint.
    Type: Application
    Filed: September 25, 2017
    Publication date: March 28, 2019
    Inventors: Kannan Ponnuswamy, Navneet Yadav, Arvind Chari, Paul Andrew Raytick
  • Publication number: 20180367397
    Abstract: Systems, methods, and computer-readable media are disclosed for validating endpoint information for nodes in a network. A network assurance appliance is configured to identify an endpoint in a bridge domain is associated with at least one subnet, retrieve at least one IP address associated with the endpoint, determine whether the at least one IP address is within the at least one subnet, and determine there is an inconsistency when the at least one IP address is not within the at least one subnet.
    Type: Application
    Filed: July 28, 2017
    Publication date: December 20, 2018
    Inventors: Sanchay Harneja, Manali Holankar, Kannan Ponnuswamy
  • Publication number: 20180367390
    Abstract: Disclosed are systems, methods, and computer-readable media for assuring tenant forwarding in a network environment. Network assurance can be determined in layer 1, layer 2 and layer 3 of the networked environment including, internal-internal (e.g., inter-fabric) forwarding and internal-external (e.g., outside the fabric) forwarding in the networked environment.
    Type: Application
    Filed: July 28, 2017
    Publication date: December 20, 2018
    Inventors: Kannan Ponnuswamy, Advait Dixit, Arvind Chari, Paul Andrew Raytick, Sanchay Harneja
  • Publication number: 20180367541
    Abstract: Systems, methods, and computer-readable media for migrating to and maintaining a white-list network security model. Network traffic identified from permit-all access logs can be analyzed to determine whether it should be white-listed, and if so, a specific permit-access, without logging, policy is generated for the identified network traffic. The addition of specific permit-access policies is repeated on permit-all access logs, at which point, permit-all access policy is converted into deny-all access. In some examples, a system or method can obtain hit counts, from both hardware (eg: TCAM) and software tables, for the specific permit-access policy to determine existence of identified network traffic over a period of time. After analyzing hit counts, the specific permit-access policy can either continue to exist or be removed to maintain a white-list network security model.
    Type: Application
    Filed: October 26, 2017
    Publication date: December 20, 2018
    Inventors: Kannan Ponnuswamy, Navneet Yadav, Arvind Chari
  • Publication number: 20170353355
    Abstract: An example method for discovering and grouping application endpoints in a network environment is provided and includes discovering endpoints communicating in a network environment, calculating affinity between the discovered endpoints, and grouping the endpoints into separate endpoint groups (EPGs) according to the calculated affinity, each EPG comprising a logical grouping of similar endpoints for applying common forwarding and policy logic according to logical application boundaries. In specific embodiments, the affinity includes a weighted average of network affinity, compute affinity and user specified affinity.
    Type: Application
    Filed: August 25, 2017
    Publication date: December 7, 2017
    Inventors: Sachin Waman Danait, Kannan Ponnuswamy, Paul John Lesiak
  • Patent number: 9781004
    Abstract: An example method for discovering and grouping application endpoints in a network environment is provided and includes discovering endpoints communicating in a network environment, calculating affinity between the discovered endpoints, and grouping the endpoints into separate endpoint groups (EPGs) according to the calculated affinity, each EPG comprising a logical grouping of similar endpoints for applying common forwarding and policy logic according to logical application boundaries. In specific embodiments, the affinity includes a weighted average of network affinity, compute affinity and user specified affinity.
    Type: Grant
    Filed: October 16, 2014
    Date of Patent: October 3, 2017
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Sachin Waman Danait, Kannan Ponnuswamy, Paul John Lesiak
  • Publication number: 20160112270
    Abstract: An example method for discovering and grouping application endpoints in a network environment is provided and includes discovering endpoints communicating in a network environment, calculating affinity between the discovered endpoints, and grouping the endpoints into separate endpoint groups (EPGs) according to the calculated affinity, each EPG comprising a logical grouping of similar endpoints for applying common forwarding and policy logic according to logical application boundaries. In specific embodiments, the affinity includes a weighted average of network affinity, compute affinity and user specified affinity.
    Type: Application
    Filed: October 16, 2014
    Publication date: April 21, 2016
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Sachin Waman Danait, Kannan Ponnuswamy, Paul John Lesiak