Patents by Inventor Navneet Yadav
Navneet Yadav has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10911495Abstract: In some examples, a system creates a requirement including EPG selectors representing EPG pairs, a traffic selector, and a communication operator; determines that EPGs in distinct pairs are associated with different network contexts and, for each pair, which network context(s) contains associated policies; creates first data representing the pair, operator, and traffic selector; when only one network context contains the associated policies, creates second data representing a network model portion associated with the only network context and determines whether the first data is contained in the second data to yield a first check; when both network contexts contain the associated policies, also creates third data representing a network model portion associated with a second network context, and determines whether the first data is contained in the second and/or third data to yield a second check; and determines whether policies for the pairs comply with the requirement based on the checks.Type: GrantFiled: December 12, 2018Date of Patent: February 2, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Advait Dixit, Navneet Yadav, Navjyoti Sharma, Ramana Rao Kompella, Kartik Mohanram
-
Publication number: 20210028971Abstract: Systems, methods, and computer-readable media for providing cross-domain assurance for networks in different network domains. In some embodiments, a method can include collecting first fabric data for a first network in a first network domain and second fabric data for a second network in a second network domain. The second fabric data for the second network can be normalized based on the first network domain to create normalized second fabric data. The first fabric data can then be correlated with the normalized second fabric data to create correlated fabric data. Subsequently, assurance can be provided across the first network in the first network domain and the second network in the second network domain using the correlated fabric data.Type: ApplicationFiled: September 30, 2020Publication date: January 28, 2021Inventors: Navneet Yadav, Kannan Ponnuswamy, Arvind Chari, Chengguo Zhu, Tarique Shakil
-
Patent number: 10904070Abstract: A monitoring device for troubleshooting events in a datacenter network identifies a first network event for a time period, and provides an initial display page, one or more additional display pages, selectable display objects, and a representation of the first network event. The device generates a dynamic troubleshooting path for the first network event to track a user navigation between display pages, a manipulation of the one or more selectable display objects, and a last-current display page, and also provides an indication of a second network event associated with higher resolution priority relative to the first network event. Retrieving the dynamic troubleshooting path causes the interface to present the last-current display page, apply the manipulation of the one or more selectable display objects, and load the user navigation between the initial dashboard display page and the one or more additional display pages in a cache.Type: GrantFiled: July 11, 2018Date of Patent: January 26, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Chien-Ju Lo, Bill YuFan Chen, Kannan Ponnuswamy, Kollivakkam Raghavan, Navneet Yadav
-
Patent number: 10812315Abstract: Systems, methods, and computer-readable media for providing cross-domain assurance for networks in different network domains. In some embodiments, a method can include collecting first fabric data for a first network in a first network domain and second fabric data for a second network in a second network domain. The second fabric data for the second network can be normalized based on the first network domain to create normalized second fabric data. The first fabric data can then be correlated with the normalized second fabric data to create correlated fabric data. Subsequently, assurance can be provided across the first network in the first network domain and the second network in the second network domain using the correlated fabric data.Type: GrantFiled: June 7, 2018Date of Patent: October 20, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Navneet Yadav, Kannan Ponnuswamy, Arvind Chari, Chengguo Zhu, Tarique Shakil
-
Patent number: 10616072Abstract: Systems, methods, and devices are disclosed for generating an interface configured to display status information for network elements on a network. In embodiments, one or more logical models of the network are obtained from at least one of a plurality of controllers on a network. Network statistics are determined based on network traffic. Based on the one or more logical models and the network statistics, a topology of the network and respective status information of one or more network elements during an epoch is identified, the epoch defining a time interval. A user interface is generated that displays the respective status information in a timeline comprising one or more of the epochs.Type: GrantFiled: July 27, 2018Date of Patent: April 7, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Chien-Ju Lo, Bill YuFan Chen, Kannan Ponnuswamy, Kollivakkam Raghavan, Navneet Yadav, Manvesh Vyas
-
Patent number: 10587621Abstract: Systems, methods, and computer-readable media for migrating to and maintaining a white-list network security model. Network traffic identified from permit-all access logs can be analyzed to determine whether it should be white-listed, and if so, a specific permit-access, without logging, policy is generated for the identified network traffic. The addition of specific permit-access policies is repeated on permit-all access logs, at which point, permit-all access policy is converted into deny-all access. In some examples, a system or method can obtain hit counts, from both hardware (eg: TCAM) and software tables, for the specific permit-access policy to determine existence of identified network traffic over a period of time. After analyzing hit counts, the specific permit-access policy can either continue to exist or be removed to maintain a white-list network security model.Type: GrantFiled: October 26, 2017Date of Patent: March 10, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Kannan Ponnuswamy, Navneet Yadav, Arvind Chari
-
Patent number: 10560314Abstract: A method includes receiving from a networked spoke device information describing network flows to and from an application, analyzing the information to characterize the application in at least one dimension selected from the group consisting of bi-directional bandwidth usage, network response times, application response times, a number of idle and active application sessions and a maximum number of concurrent application sessions and transmitting the dimensions to at least one networked spoke device as traffic profile information.Type: GrantFiled: September 16, 2015Date of Patent: February 11, 2020Assignee: CloudGenix, Inc.Inventors: Kumar Ramachandran, Venkataraman Anand, Navneet Yadav, Arivu Ramasamy, Giorgio Valentini, Vijay Sagar
-
Patent number: 10554477Abstract: Systems, methods, and computer-readable media for aggregating and presenting network events in a network environment. In some embodiments, a system can maintain event correlation rules for aggregating \network events occurring in a network based on characteristics of previously occurring network events. Network events occurring in the specific network environment can be identified. The network events can be aggregated to form an aggregated network event using the event correlation rules maintained based on the characteristics of previously occurring network events. The aggregated network event can subsequently be presented to a user.Type: GrantFiled: September 13, 2017Date of Patent: February 4, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Shadab Nazar, Navneet Yadav, Azeem Suleman, Pavan Mamillapalli, John Thomas Monk, Chetan Narsude, Navjyoti Sharma, Gaurav Gupta
-
Publication number: 20200021482Abstract: A monitoring device for troubleshooting events in a datacenter network identifies a first network event for a time period, and provides an initial display page, one or more additional display pages, selectable display objects, and a representation of the first network event. The device generates a dynamic troubleshooting path for the first network event to track a user navigation between display pages, a manipulation of the one or more selectable display objects, and a last-current display page, and also provides an indication of a second network event associated with higher resolution priority relative to the first network event. Retrieving the dynamic troubleshooting path causes the interface to present the last-current display page, apply the manipulation of the one or more selectable display objects, and load the user navigation between the initial dashboard display page and the one or more additional display pages in a cache.Type: ApplicationFiled: July 11, 2018Publication date: January 16, 2020Inventors: Chien-Ju Lo, Bill YuFan Chen, Kannan Ponnuswamy, Kollivakkam Raghavan, Navneet Yadav
-
Patent number: 10528444Abstract: Disclosed are systems, methods, and computer-readable media for assuring tenant forwarding in a network environment. Network assurance can be determined in layer 1, layer 2 and layer 3 of the networked environment including, internal-internal (e.g., inter-fabric) forwarding and internal-external (e.g., outside the fabric) forwarding in the networked environment. The network assurance can be performed using logical configurations, software configurations and/or hardware configurations.Type: GrantFiled: July 28, 2017Date of Patent: January 7, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Sanchay Harneja, Navneet Yadav, Sanjay Sundaresan, Harsha Jagannati, Ramadoss Venkatesan
-
Publication number: 20200007582Abstract: Systems, methods, and computer-readable media for configuring and verifying compliance requirements in a network.Type: ApplicationFiled: December 12, 2018Publication date: January 2, 2020Inventors: Advait Dixit, Navneet Yadav, Navjyoti Sharma, Ramana Rao Kompella, Kartik Mohanram
-
Publication number: 20200007583Abstract: Systems, methods, and computer-readable media for assurance of rules in a network. An example method can include creating a compliance requirement including a first endpoint group (EPG) selector, a second EPG selector, a traffic selector, and a communication operator, the first and second EPG selectors representing sets of EPGs and the communication operator defining a communication condition for traffic associated with the first and second EPG selectors and the traffic selector. The method can include creating, for each distinct pair of EPGs, a first respective data structure representing the distinct pair of EPGs, the communication operator, and the traffic selector; creating a second respective data structure representing a logical model of the network; determining whether the first respective data structure is contained in the second respective data structure to yield a containment check; and determining whether policies on the network comply with the compliance requirement based on the containment check.Type: ApplicationFiled: December 12, 2018Publication date: January 2, 2020Inventors: Advait Dixit, Navneet Yadav, Navjyoti Sharma, Ramana Rao Kompella, Kartik Mohanram
-
Publication number: 20200007584Abstract: In some examples, a system creates a requirement including EPG selectors representing EPG pairs, a traffic selector, and a communication operator; determines that EPGs in distinct pairs are associated with different network contexts and, for each pair, which network context(s) contains associated policies; creates first data representing the pair, operator, and traffic selector; when only one network context contains the associated policies, creates second data representing a network model portion associated with the only network context and determines whether the first data is contained in the second data to yield a first check; when both network contexts contain the associated policies, also creates third data representing a network model portion associated with a second network context, and determines whether the first data is contained in the second and/or third data to yield a second check; and determines whether policies for the pairs comply with the requirement based on the checks.Type: ApplicationFiled: December 12, 2018Publication date: January 2, 2020Inventors: Advait Dixit, Navneet Yadav, Navjyoti Sharma, Ramana Rao Kompella, Kartik Mohanram
-
Publication number: 20190379572Abstract: Systems, methods, and computer-readable media for providing cross-domain assurance for networks in different network domains. In some embodiments, a method can include collecting first fabric data for a first network in a first network domain and second fabric data for a second network in a second network domain. The second fabric data for the second network can be normalized based on the first network domain to create normalized second fabric data. The first fabric data can then be correlated with the normalized second fabric data to create correlated fabric data. Subsequently, assurance can be provided across the first network in the first network domain and the second network in the second network domain using the correlated fabric data.Type: ApplicationFiled: June 7, 2018Publication date: December 12, 2019Inventors: Navneet Yadav, Kannan Ponnuswamy, Arvind Chari, Chengguo Zhu, Tarique Shakil
-
Patent number: 10505816Abstract: Systems, methods, and computer-readable media for performing semantic analysis to identify shadowing events. One or more models of network intents, based at least in part on a priority-ordered listing of rules representing network intents, is received. Each rule comprises a Boolean function of one or more packet characteristics and network fabric conditions, and a corresponding network action. For each given rule of the priority-ordered listing of rules, partial and complete shadowing events are detected based on semantic analysis. The semantic analysis comprises calculating an inverse set that comprises the inverse of the set comprising all rules with a higher or equal priority to the given rule, and then calculating a shadowing parameter that comprises the intersection between the inverse set and the given rule. If the shadowing parameter is equal to zero, a complete shadowing event is detected.Type: GrantFiled: August 31, 2017Date of Patent: December 10, 2019Assignee: CISCO TECHNOLOGY, INC.Inventors: Kartik Mohanram, Sundar Iyer, Ramana Rao Kompella, Navneet Yadav
-
Patent number: 10374871Abstract: A method includes determining a network requirement for at least one application, dynamically determining a link suitable for data transmission in accordance with a policy based at least in part on a current network condition to meet the network requirement and routing one or more application network data flows associated with the at least one application over the link.Type: GrantFiled: September 16, 2015Date of Patent: August 6, 2019Assignee: CLOUDGENIX, INC.Inventors: Kumar Ramachandran, Venkataraman Anand, Navneet Yadav, Arivu Ramasamy, Aaron Edwards, Gopal Reddy, Vijay Sagar, Giorgio Valentini
-
Patent number: 10333833Abstract: Systems, methods, and computer-readable media for providing network assurance. In some embodiments, a method can include receiving input used to identify an endpoint. At least one logical object associated with the endpoint of logical objects in a network environment is identified based on the input. A health of the at least one logical object associated with the endpoint is determined. Additionally, a health of the network environment with respect to the endpoint operating to provide services through the network environment is determined based on the determined health of the at least one logical object associated with the endpoint.Type: GrantFiled: September 25, 2017Date of Patent: June 25, 2019Assignee: CISCO TECHNOLOGY, INC.Inventors: Kannan Ponnuswamy, Navneet Yadav, Arvind Chari, Paul Andrew Raytick
-
Publication number: 20190097918Abstract: Systems, methods, and computer-readable media for providing network assurance. In some embodiments, a method can include receiving input used to identify an endpoint. At least one logical object associated with the endpoint of logical objects in a network environment is identified based on the input. A health of the at least one logical object associated with the endpoint is determined. Additionally, a health of the network environment with respect to the endpoint operating to provide services through the network environment is determined based on the determined health of the at least one logical object associated with the endpoint.Type: ApplicationFiled: September 25, 2017Publication date: March 28, 2019Inventors: Kannan Ponnuswamy, Navneet Yadav, Arvind Chari, Paul Andrew Raytick
-
Publication number: 20190081850Abstract: Systems, methods, and computer-readable media for aggregating and presenting network events in a network environment. In some embodiments, a system can maintain event correlation rules for aggregating \network events occurring in a network based on characteristics of previously occurring network events. Network events occurring in the specific network environment can be identified. The network events can be aggregated to form an aggregated network event using the event correlation rules maintained based on the characteristics of previously occurring network events. The aggregated network event can subsequently be presented to a user.Type: ApplicationFiled: September 13, 2017Publication date: March 14, 2019Inventors: Shadab Nazar, Navneet Yadav, Azeem Suleman, Pavan Mamillapalli, John Thomas Monk, Chetan Narsude, Navjyoti Sharma, Gaurav Gupta
-
Publication number: 20180365121Abstract: Disclosed are systems, methods, and computer-readable media for assuring tenant forwarding in a network environment. Network assurance can be determined in layer 1, layer 2 and layer 3 of the networked environment including, internal-internal (e.g., inter-fabric) forwarding and internal-external (e.g., outside the fabric) forwarding in the networked environment.Type: ApplicationFiled: July 28, 2017Publication date: December 20, 2018Inventors: Sanchay Harneja, Navneet Yadav, Sanjay Sundaresan, Harsha Jagannati, Ramadoss Venkatesan