Patents by Inventor Mitesh Dalal

Mitesh Dalal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7903546
    Abstract: A method for detecting unavailable network connections comprises, at a first data processing node that is hosting a transport protocol connection that uses a plurality of sequence values to identify messages sent to a peer node, wherein the first node is communicatively coupled to a second data processing node serving as a redundant backup, periodically sending a checkpoint sequence value to the second node; detecting that either the transport protocol connection or a process using the transport protocol connection is unavailable, without use of a timeout; and in response thereto, sending a notification to the peer node, wherein the notification includes the checkpoint sequence value. One embodiment provides for rapidly detecting and responding to failure of a TCP process without using long timeouts as conventionally provided in long-lived applications that run on top of TCP.
    Type: Grant
    Filed: January 14, 2005
    Date of Patent: March 8, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Mitesh Dalal, Anantha Ramaiah, Ruchi Kapoor, Chandrashekhar Appanna
  • Patent number: 7738495
    Abstract: A network element implementing a method for determining an optimal maximum transmission unit (MTU) value on a path between two nodes in a network is described. A sending node interested in learning the optimal MTU path value allows fragmentation of datagrams sent on the path, selects an initial MTU, and sends one or more data packets to a receiving node. Upon receiving the data the receiver determines if fragmentation occurred. If no fragmentation occurred then the MTU path selected is the optimal MTU for the given path between the nodes. If fragmentation did occur then the sender is notified that the selected MTU was not the optimal MTU for the path. Either the receiver proposes a new MTU for the path, or the sender selects a new, smaller MTU. The process repeats until the receiver detects no fragmentation.
    Type: Grant
    Filed: January 23, 2006
    Date of Patent: June 15, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Mitesh Dalal, Randall R. Stewart, Amol R. Khare, Vineet Dixit, Srinivas Subramanian
  • Patent number: 7706281
    Abstract: A multi-homed network node comprises an interface that is addressable using a primary network address and a secondary network address. Network packets identifying the primary network address traverse a first network path and packets identifying the second network address traverse a second network path that is routed physically separately from the first network path. A transport layer network protocol association is established in the network between a first node and the multi-homed node. One or more data messages are sent to the second node and identify the primary network address. Network feedback information indicates one or more performance characteristics of the first network path. In response, the data messages are automatically modified to identify the secondary network address.
    Type: Grant
    Filed: January 6, 2006
    Date of Patent: April 27, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Mitesh Dalal, Randall R. Stewart
  • Patent number: 7650635
    Abstract: A method of preventing an attack on a network, the method comprising the computer-implemented steps of receiving an ICMP packet that includes a copy of a header associated with a connection in a connection-oriented transport protocol; obtaining a packet sequence value from the header; determining if the packet sequence value is valid; and updating a parameter value associated with the transport protocol connection only if the packet sequence value is determined to be valid. Use of the disclosed method enables authenticating ICMP packets so that responsive measures of a network element, such as adjusting an MTU value, are performed only when the ICMP packet is determined to be authentic.
    Type: Grant
    Filed: April 7, 2004
    Date of Patent: January 19, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Amol Khare, Mitesh Dalal, Anantha Ramaiah, Sharad Ahlawat
  • Patent number: 7606159
    Abstract: Techniques are provided for updating best path based on real-time congestion feedback. A method comprises monitoring packets received from an internetworked system, wherein the packets are received on one of a plurality of external interfaces of a networking device; detecting that a received packet includes real-time information that signals a present or pending congestion condition on a path from the external interfaces of the networking device to the internetworked system; notifying a control logic of the real-time information; receiving from the control logic control information defining a change in one or more paths from the external interfaces to the internetworked system; and changing the one or more paths from the external interfaces to the internetworked system. Examining ingress traffic on external interfaces of an internetworked system can cause changes to routes, routing policies and PBRs in routers of the first internetworked system in response to real-time congestion.
    Type: Grant
    Filed: August 30, 2005
    Date of Patent: October 20, 2009
    Assignee: Cisco Technology, Inc.
    Inventors: Mitesh Dalal, Pritam Shah, Amol Khare, Vamsidhar Valluri
  • Patent number: 7472416
    Abstract: Approaches for preventing TCP RST attacks intended to cause denial of service in packet-switched networks are disclosed. In one approach, upon receiving a TCP RST packet, an endpoint node determines whether the TCP segment contains valid authentication information. The TCP RST segment is accepted and the TCP connection is closed only when the authentication information is valid. Authentication information may comprise a reset type values, and either initial sequence numbers of both endpoints, or a copy of a TCP header and options values previously sent by the endpoint node that is performing the authentication. Thus, attacks are thwarted because an attacker cannot know or reasonably guess the required authentication information.
    Type: Grant
    Filed: May 6, 2004
    Date of Patent: December 30, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Anantha Ramaiah, Shrirang Bage, Amol Khare, Mitesh Dalal
  • Patent number: 7458097
    Abstract: Approaches for preventing TCP RST attacks and TCP SYN attacks in packet-switched networks are disclosed. In one approach, upon receiving a TCP RST packet, a first endpoint node challenges the second endpoint node in the then-current connection using an acknowledgement message. If the connection is genuinely closed, the second endpoint node responds with a RST packet carrying an expected next sequence value. The first endpoint node takes no action if no RST packet is received. Thus, attacks are thwarted because an attacker does not receive the acknowledgment message and therefore cannot provide the exact expected next sequence value.
    Type: Grant
    Filed: September 28, 2006
    Date of Patent: November 25, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Mitesh Dalal, Amol Khare, Randall Stewart
  • Patent number: 7412600
    Abstract: Approaches are disclosed for switching transport protocol connection keys. A method of automatically changing a message authentication key at each of two endpoints of a connection in a telecommunications network comprises testing a sequence value received in each of a plurality of data segments on the connection; and selecting a next message authentication key, from among a plurality of stored message authentication keys, for use in authenticating subsequently received data segments, when the sequence value matches a specified characteristic.
    Type: Grant
    Filed: October 28, 2005
    Date of Patent: August 12, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: John C. Wong, Anantha Ramaiah, Amol Khare, Mitesh Dalal, Shrirang Bage, Lin Han
  • Publication number: 20070171828
    Abstract: A network element implementing a method for determining an optimal maximum transmission unit (MTU) value on a path between two nodes in a network is described. A sending node interested in learning the optimal MTU path value allows fragmentation of datagrams sent on the path, selects an initial MTU, and sends one or more data packets to a receiving node. Upon receiving the data the receiver determines if fragmentation occurred. If no fragmentation occurred then the MTU path selected is the optimal MTU for the given path between the nodes. If fragmentation did occur then the sender is notified that the selected MTU was not the optimal MTU for the path. Either the receiver proposes a new MTU for the path, or the sender selects a new, smaller MTU. The process repeats until the receiver detects no fragmentation.
    Type: Application
    Filed: January 23, 2006
    Publication date: July 26, 2007
    Inventors: Mitesh Dalal, Randall Stewart, Amol Khare, Vineet Dixit, Srinivas Subramanian
  • Publication number: 20070159977
    Abstract: A multi-homed network node comprises an interface that is addressable using a primary network address and a secondary network address. Network packets identifying the primary network address traverse a first network path and packets identifying the second network address traverse a second network path that is routed physically separately from the first network path. A transport layer network protocol association is established in the network between a first node and the multi-homed node. One or more data messages are sent to the second node and identify the primary network address. Network feedback information indicates one or more performance characteristics of the first network path. In response, the data messages are automatically modified to identify the secondary network address.
    Type: Application
    Filed: January 6, 2006
    Publication date: July 12, 2007
    Inventors: Mitesh Dalal, Randall Stewart
  • Publication number: 20070101129
    Abstract: Approaches are disclosed for switching transport protocol connection keys. A method of automatically changing a message authentication key at each of two endpoints of a connection in a telecommunications network comprises testing a sequence value received in each of a plurality of data segments on the connection; and selecting a next message authentication key, from among a plurality of stored message authentication keys, for use in authenticating subsequently received data segments, when the sequence value matches a specified characteristic.
    Type: Application
    Filed: October 28, 2005
    Publication date: May 3, 2007
    Inventors: John Wong, Anantha Ramaiah, Amol Khare, Mitesh Dalal, Shrirang Bage, Lin Han
  • Patent number: 7203961
    Abstract: Approaches for preventing TCP RST attacks and TCP SYN attacks in packet-switched networks are disclosed. In one approach, upon receiving a TCP RST packet, a first endpoint node challenges the second endpoint node in the then-current connection using an acknowledgement message. If the connection is genuinely closed, the second endpoint node responds with a RST packet carrying an expected next sequence value. The first endpoint node takes no action if no RST packet is received. Thus, attacks are thwarted because an attacker does not receive the acknowledgment message and therefore cannot provide the exact expected next sequence value.
    Type: Grant
    Filed: January 9, 2004
    Date of Patent: April 10, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: Mitesh Dalal, Amol Khare, Randall Stewart
  • Publication number: 20070047446
    Abstract: Techniques are provided for updating best path based on real-time congestion feedback. A method comprises monitoring packets received from an internetworked system, wherein the packets are received on one of a plurality of external interfaces of a networking device; detecting that a received packet includes real-time information that signals a present or pending congestion condition on a path from the external interfaces of the networking device to the internetworked system; notifying a control logic of the real-time information; receiving from the control logic control information defining a change in one or more paths from the external interfaces to the internetworked system; and changing the one or more paths from the external interfaces to the internetworked system. Examining ingress traffic on external interfaces of an internetworked system can cause changes to routes, routing policies and PBRs in routers of the first internetworked system in response to real-time congestion.
    Type: Application
    Filed: August 30, 2005
    Publication date: March 1, 2007
    Inventors: Mitesh Dalal, Pritam Shah, Amol Khare, Vamsidhar Valluri
  • Publication number: 20070044150
    Abstract: Approaches for preventing TCP RST attacks and TCP SYN attacks in packet-switched networks are disclosed. In one approach, upon receiving a TCP RST packet, a first endpoint node challenges the second endpoint node in the then-current connection using an acknowledgement message. If the connection is genuinely closed, the second endpoint node responds with a RST packet carrying an expected next sequence value. The first endpoint node takes no action if no RST packet is received. Thus, attacks are thwarted because an attacker does not receive the acknowledgment message and therefore cannot provide the exact expected next sequence value.
    Type: Application
    Filed: September 28, 2006
    Publication date: February 22, 2007
    Inventors: Mitesh Dalal, Amol Khare, Randall Stewart
  • Publication number: 20060184647
    Abstract: A method of modifying network identifiers at data servers is disclosed. A virtual private network (VPN) gateway server generates a Hypertext Transfer Protocol (HTTP) request. The HTTP request not only requests data from a data server that is within a VPN, but also instructs the data server to modify (“mangle”) URLs that are contained within the requested data so that the URLs refer to the VPN gateway server. The VPN gateway server sends the HTTP request toward the data server. As a result, the data server modifies the URLs so that the VPN gateway server does not need to. When such a modified URLs is selected in a web browser, the web browser generates an HTTP request that is directed to the VPN gateway server's URL, which, unlike the unmodified URLs, can be resolved by domain name servers that are outside of the VPN.
    Type: Application
    Filed: February 16, 2005
    Publication date: August 17, 2006
    Inventors: Vineet Dixit, Mitesh Dalal, Amol Khare, Mahadev Somasundaram
  • Publication number: 20060159011
    Abstract: A method for detecting unavailable network connections comprises, at a first data processing node that is hosting a transport protocol connection that uses a plurality of sequence values to identify messages sent to a peer node, wherein the first node is communicatively coupled to a second data processing node serving as a redundant backup, periodically sending a checkpoint sequence value to the second node; detecting that either the transport protocol connection or a process using the transport protocol connection is unavailable, without use of a timeout; and in response thereto, sending a notification to the peer node, wherein the notification includes the checkpoint sequence value. One embodiment provides for rapidly detecting and responding to failure of a TCP process without using long timeouts as conventionally provided in long-lived applications that run on top of TCP.
    Type: Application
    Filed: January 14, 2005
    Publication date: July 20, 2006
    Inventors: Mitesh Dalal, Anantha Ramaiah, Ruchi Kapoor, Chandrashekhar Appanna
  • Publication number: 20050229244
    Abstract: A method of preventing an attack on a network, the method comprising the computer-implemented steps of receiving an ICMP packet that includes a copy of a header associated with a connection in a connection-oriented transport protocol; obtaining a packet sequence value from the header; determining if the packet sequence value is valid; and updating a parameter value associated with the transport protocol connection only if the packet sequence value is determined to be valid. Use of the disclosed method enables authenticating ICMP packets so that responsive measures of a network element, such as adjusting an MTU value, are performed only when the ICMP packet is determined to be authentic.
    Type: Application
    Filed: April 7, 2004
    Publication date: October 13, 2005
    Inventors: Amol Khare, Mitesh Dalal, Anantha Ramaiah, Sharad Ahlawat
  • Publication number: 20050216954
    Abstract: Approaches for preventing TCP RST attacks intended to cause denial of service in packet-switched networks are disclosed. In one approach, upon receiving a TCP RST packet, an endpoint node determines whether the TCP segment contains valid authentication information. The TCP RST segment is accepted and the TCP connection is closed only when the authentication information is valid. Authentication information may comprise a reset type values, and either initial sequence numbers of both endpoints, or a copy of a TCP header and options values previously sent by the endpoint node that is performing the authentication. Thus, attacks are thwarted because an attacker cannot know or reasonably guess the required authentication information.
    Type: Application
    Filed: May 6, 2004
    Publication date: September 29, 2005
    Inventors: Anantha Ramaiah, Shrirang Bage, Amol Khare, Mitesh Dalal