Patents by Inventor Laxminarayana Tumuluru
Laxminarayana Tumuluru has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11463343Abstract: Systems and methods of software-defined wide area network (SDWAN) device routing are provided using a cloud-based overlay routing service that utilizes, a cloud-BGP service (CBS), and a path computation module (PCM), and overlay agents (OAs) implemented on the tenant side. The Oas, CBS, and PCM may interact with each other, e.g., publish/update local states, route prefixes, etc. to create/maintain routing in the SDWAN.Type: GrantFiled: October 7, 2020Date of Patent: October 4, 2022Assignee: Hewlett Packard Enterprise Development LPInventors: Arijit Sarcar, Laxminarayana Tumuluru, Dilip Gupta, Stephen Su, Harish Magganmane, Shijie Ma, Sivaram Dommeti
-
Publication number: 20220109620Abstract: Systems and methods of software-defined wide area network (SDWAN) device routing are provided using a cloud-based overlay routing service that utilizes, a cloud-BGP service (CBS), and a path computation module (PCM), and overlay agents (OAs) implemented on the tenant side. The Oas, CBS, and PCM may interact with each other, e.g., publish/update local states, route prefixes, etc. to create/maintain routing in the SDWAN.Type: ApplicationFiled: October 7, 2020Publication date: April 7, 2022Inventors: ARIJIT SARCAR, LAXMINARAYANA TUMULURU, DILIP GUPTA, STEPHEN SU, HARISH MAGGANMANE, SHIJIE MA, SIVARAM DOMMETI
-
Patent number: 11012507Abstract: Techniques leveraging CPU flow affinity to increase throughput of a layer 2 (L2) extension network are disclosed. In one embodiment, an L2 concentrator appliance, which bridges a local area network (LAN) and a wide area network (WAN) in a stretched network, is configured such that multiple Internet Protocol Security (IPsec) tunnels are pinned to respective CPUs or cores, which each process traffic flows for one of the IPsec tunnels. Such parallelism can increase the throughput of the stretched network. Further, an L2 concentrator appliance that receives FOU packets is configured to distribute the received FOU packets across receive queues based a deeper inspection of inner headers of such packets.Type: GrantFiled: August 29, 2017Date of Patent: May 18, 2021Assignee: VMware, Inc.Inventors: Laxminarayana Tumuluru, Todd Sabin, Weiqing Wu, Serge Maskalik, Sachin Thakkar
-
Patent number: 10681131Abstract: An approach is disclosed for detecting source network address translation in internet protocol (IP) tunneling flows and using learned source IP addresses and source ports from such detection to create new tunnels. In one embodiment, a NAT detection application determines whether source IP addresses and source ports associated with new traffic flows destined to a local Foo-over-UDP (FOU) tunnel endpoint match the source IP address and source port of a previously configured FOU tunnel. Lack of such a match is indicative of source network address translation, and in such a case the NAT detection application creates a new FOU tunnel toward the detected source IP address and source port. In addition, the NAT detection application authenticates the remote endpoint of the newly created FOU tunnel and configures the FOU tunnel for use if the remote endpoint is successfully authenticated.Type: GrantFiled: May 3, 2017Date of Patent: June 9, 2020Assignee: VMware, Inc.Inventor: Laxminarayana Tumuluru
-
Patent number: 10666729Abstract: An approach is disclosed for steering network traffic away from congestion hot-spots to achieve better throughput and latency. In one embodiment, multiple Foo-over-UDP (FOU) tunnels, each having a distinct source port, are created between two endpoints. As a result of the distinct source ports, routers that compute hashes of packet fields in order to distribute traffic flows across network paths will compute distinct hash values for the FOU tunnels that may be associated with different paths. Probes are scheduled to measure network metrics, such as latency and liveliness, of each of the FOU tunnels. In turn, the network metrics are used to select particular FOU tunnel(s) to send traffic over so as to avoid congestion and high-latency hotspots in the network.Type: GrantFiled: July 19, 2017Date of Patent: May 26, 2020Assignee: VMware, Inc.Inventors: Laxminarayana Tumuluru, Todd Sabin, Weiqing Wu, Uday Masurekar, Serge Maskalik, Sachin Thakkar, Debashis Basak
-
Patent number: 10225103Abstract: An approach is disclosed for selecting tunnels through which network traffic can be sent to steer the traffic away from congestion hot-spots. In one embodiment, multiple Foo-over-UDP (FOU) tunnels, each having a distinct source port, are created between two endpoints. Probes are scheduled to measure network metrics, such as latency and liveliness, of each of the FOU tunnels. In turn, the network metrics are used to select particular FOU tunnel(s) to send traffic over in a manner that is fair across source and destination IP addresses of the FOU tunnel(s). In particular, scores are assigned to the source and destination IP addresses based on sums of scores assigned to tunnels having those source and destination IP addresses based on the tunnels' performance metrics. A load balancer then splits a number of buckets across the source and destination IP addresses, and ultimately across the tunnels, based on the assigned scores.Type: GrantFiled: August 29, 2017Date of Patent: March 5, 2019Assignee: VMware, Inc.Inventor: Laxminarayana Tumuluru
-
Publication number: 20180069924Abstract: Techniques leveraging CPU flow affinity to increase throughput of a layer 2 (L2) extension network are disclosed. In one embodiment, an L2 concentrator appliance, which bridges a local area network (LAN) and a wide area network (WAN) in a stretched network, is configured such that multiple Internet Protocol Security (IPsec) tunnels are pinned to respective CPUs or cores, which each process traffic flows for one of the IPsec tunnels. Such parallelism can increase the throughput of the stretched network. Further, an L2 concentrator appliance that receives FOU packets is configured to distribute the received FOU packets across receive queues based a deeper inspection of inner headers of such packets.Type: ApplicationFiled: August 29, 2017Publication date: March 8, 2018Inventors: Laxminarayana TUMULURU, Todd SABIN, Weiqing WU, Serge MASKALIK, Sachin THAKKAR
-
Publication number: 20180062875Abstract: An approach is disclosed for selecting tunnels through which network traffic can be sent to steer the traffic away from congestion hot-spots. In one embodiment, multiple Foo-over-UDP (FOU) tunnels, each having a distinct source port, are created between two endpoints. Probes are scheduled to measure network metrics, such as latency and liveliness, of each of the FOU tunnels. In turn, the network metrics are used to select particular FOU tunnel(s) to send traffic over in a manner that is fair across source and destination IP addresses of the FOU tunnel(s). In particular, scores are assigned to the source and destination IP addresses based on sums of scores assigned to tunnels having those source and destination IP addresses based on the tunnels' performance metrics. A load balancer then splits a number of buckets across the source and destination IP addresses, and ultimately across the tunnels, based on the assigned scores.Type: ApplicationFiled: August 29, 2017Publication date: March 1, 2018Inventor: Laxminarayana TUMULURU
-
Publication number: 20180063077Abstract: An approach is disclosed for detecting source network address translation in internet protocol (IP) tunneling flows and using learned source IP addresses and source ports from such detection to create new tunnels. In one embodiment, a NAT detection application determines whether source IP addresses and source ports associated with new traffic flows destined to a local Foo-over-UDP (FOU) tunnel endpoint match the source IP address and source port of a previously configured FOU tunnel. Lack of such a match is indicative of source network address translation, and in such a case the NAT detection application creates a new FOU tunnel toward the detected source IP address and source port. In addition, the NAT detection application authenticates the remote endpoint of the newly created FOU tunnel and configures the FOU tunnel for use if the remote endpoint is successfully authenticated.Type: ApplicationFiled: May 3, 2017Publication date: March 1, 2018Inventor: Laxminarayana TUMULURU
-
Publication number: 20180063743Abstract: An approach is disclosed for steering network traffic away from congestion hot-spots to achieve better throughput and latency. In one embodiment, multiple Foo-over-UDP (FOU) tunnels, each having a distinct source port, are created between two endpoints. As a result of the distinct source ports, routers that compute hashes of packet fields in order to distribute traffic flows across network paths will compute distinct hash values for the FOU tunnels that may be associated with different paths. Probes are scheduled to measure network metrics, such as latency and liveliness, of each of the FOU tunnels. In turn, the network metrics are used to select particular FOU tunnel(s) to send traffic over so as to avoid congestion and high-latency hotspots in the network.Type: ApplicationFiled: July 19, 2017Publication date: March 1, 2018Inventors: Laxminarayana TUMULURU, Todd SABIN, Weiqing WU, Uday MASUREKAR, Serge MASKALIK, Sachin THAKKAR, Debashis BASAK
-
Publication number: 20120278492Abstract: A network device connects between a client and a server. The network device is configured to store information regarding a capability of the server; receive a first message, from the client, intended for the server; obtain the stored information regarding the capability of the server; generate a second message that includes the information regarding the capability of the server; send the second message to the client; receive a third message from the client; and establish, based on the third message, a connection between the client and the server.Type: ApplicationFiled: July 11, 2012Publication date: November 1, 2012Applicant: JUNIPER NETWORKS, INC.Inventors: Dongyi JIANG, Laxminarayana Tumuluru, Jianwen Pl
-
Patent number: 8224976Abstract: A network device connects between a client and a server. The network device is configured to store information regarding a capability of the server; receive a first message, from the client, intended for the server; obtain the stored information regarding the capability of the server; generate a second message that includes the information regarding the capability of the server; send the second message to the client; receive a third message from the client; and establish, based on the third message, a connection between the client and the server.Type: GrantFiled: December 24, 2008Date of Patent: July 17, 2012Assignee: Juniper Networks, Inc.Inventors: Dongyi Jiang, Laxminarayana Tumuluru, Jianwen Pi
-
Publication number: 20100161741Abstract: A network device connects between a client and a server. The network device is configured to store information regarding a capability of the server; receive a first message, from the client, intended for the server; obtain the stored information regarding the capability of the server; generate a second message that includes the information regarding the capability of the server; send the second message to the client; receive a third message from the client; and establish, based on the third message, a connection between the client and the server.Type: ApplicationFiled: December 24, 2008Publication date: June 24, 2010Applicant: JUNIPER NETWORKS, INC.Inventors: Dongyi Jiang, Laxminarayana Tumuluru, Jianwen Pi
-
Publication number: 20040133590Abstract: A tree data structure with range-specifying keys and associated methods. In one embodiment, the data structure is a tree that is stored in a machine readable medium. Each key has two values that define a range and has an associated data item that is associated with the range. Various embodiments of processes to search the tree, add ranges and keys to the tree, delete ranges and keys from the tree, and to generally maintain the tree data structure are disclosed.Type: ApplicationFiled: August 8, 2003Publication date: July 8, 2004Inventors: Alex E. Henderson, Laxminarayana Tumuluru, Monis Rahman, Richard D. Trauben