Patents by Inventor Ranganatha Marathe

Ranganatha Marathe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8675601
    Abstract: Techniques are provided to enable a support for guest access of devices in a network. At a controller apparatus in a first mobility sub-domain of a network comprising a plurality of mobility sub-domains, a request message containing a request for guest network access for a device is received from a first access switch in the first mobility sub-domain. The controller apparatus forwards the request message to a guest controller. At a tunneling endpoint apparatus in the first mobility sub-domain, a tunnel is established to the guest controller to carry traffic between the device and the guest controller. Traffic for the device passes in a tunnel between the first access switch and the tunneling endpoint apparatus in the first mobility sub-domain, through the tunneling endpoint apparatus in the first mobility sub-domain and in the tunnel between the routing apparatus in the first mobility sub-domain and the guest controller.
    Type: Grant
    Filed: May 17, 2010
    Date of Patent: March 18, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Patrice Calhoun, Abhijit Choudhury, Rohit Suri, Sudhir Jain, Ranganatha Marathe, Bhanu Gopalasetty, Navindra Yadav, Sreenivasulu Mondem
  • Publication number: 20110280213
    Abstract: Techniques are provided to enable a support for guest access of devices in a network. At a controller apparatus in a first mobility sub-domain of a network comprising a plurality of mobility sub-domains, a request message containing a request for guest network access for a device is received from a first access switch in the first mobility sub-domain. The controller apparatus forwards the request message to a guest controller. At a tunneling endpoint apparatus in the first mobility sub-domain, a tunnel is established to the guest controller to carry traffic between the device and the guest controller. Traffic for the device passes in a tunnel between the first access switch and the tunneling endpoint apparatus in the first mobility sub-domain, through the tunneling endpoint apparatus in the first mobility sub-domain and in the tunnel between the routing apparatus in the first mobility sub-domain and the guest controller.
    Type: Application
    Filed: May 17, 2010
    Publication date: November 17, 2011
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Patrice Calhoun, Abhijit Choudhury, Rohit Suri, Sudhir Jain, Ranganatha Marathe, Bhanu Gopalasetty, Navindra Yadav, Sreenivasulu Mondem
  • Patent number: 7765256
    Abstract: A troubleshooting system. In particular implementations, a method includes collecting, from a first wireless network element, PEM state associated with a wireless client having a connection problem, and collecting log data associated with the wireless client from the first wireless network elements and one or more other wireless network elements. The method further includes correlating the PEM state and log data based on a network security protocol employed by the wireless client, where the network security protocol corresponds to an expected sequence of events. The correlating includes correlating events and messages collected based on the expected sequence of events, and comparing the correlated sequence of events to a data store of diagnostic information to identify one or more possible causes of the connection problem.
    Type: Grant
    Filed: December 17, 2007
    Date of Patent: July 27, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Bhautik Doshi, Robert B. O'Hara, Jr., Ranganatha Marathe, Bijuraj Raju, Ambika Prasad Mohanty, Pramod Badjate, Amish Gambhir, Premnath Narayanan
  • Publication number: 20090113244
    Abstract: A troubleshooting system. In particular implementations, a method includes collecting, from a first wireless network element, PEM state associated with a wireless client having a connection problem, and collecting log data associated with the wireless client from the first wireless network elements and one or more other wireless network elements. The method further includes correlating the PEM state and log data based on a network security protocol employed by the wireless client, where the network security protocol corresponds to an expected sequence of events. The correlating includes correlating events and messages collected based on the expected sequence of events, and comparing the correlated sequence of events to a data store of diagnostic information to identify one or more possible causes of the connection problem.
    Type: Application
    Filed: December 17, 2007
    Publication date: April 30, 2009
    Applicant: Cisco Technology, Inc.
    Inventors: Bhautik Doshi, Robert B. O'Hara, JR., Ranganatha Marathe, Bijuraj Raju, Ambika Prasad Mohanty, Pramod Badjate, Amish Gambhir, Premnath Narayanan
  • Publication number: 20070124802
    Abstract: A user gains access to a private network by connecting to a network, either through a hardwired or wireless connection, and then initiates an Internet access request targeting any website. If the user is not already authorized for Internet access, then the user is sent to a first predetermined website that points the user to an authentication server accessible via the Internet. The authentication server sends the user an HTTP form pages requesting authentication information. When the user responds, a network monitoring device within the private network alters the form page to include the user's hardware address and an encoded ID based on the network's location. The authentication server forwards this data to a gate keeper server, which authenticates the new user and transmits an unblock message along with another encoded ID based on the network's location and the user's hardware address.
    Type: Application
    Filed: January 26, 2007
    Publication date: May 31, 2007
    Applicant: HEREUARE COMMUNICATIONS INC.
    Inventors: Francis Anton, Clark Dong, Jong Kim, Ranganatha Marathe
  • Patent number: 7185360
    Abstract: A user gains access to a private network by connecting to a network, either through a hardwired or wireless connection, and then initiates an Internet access request targeting any website. If the user is not already authorized for Internet access, then the user is sent to a first predetermined website that points the user to an authentication server accessible via the Internet. The authentication server sends the user an HTTP form pages requesting authentication information. When the user responds, a network monitoring device within the private network alters the form page to include the user's hardware address and an encoded ID based on the network's location. The authentication server forwards this data to a gate keeper server, which authenticates the new user and transmits an unblock message along with another encoded ID based on the network's location and the user's hardware address.
    Type: Grant
    Filed: August 1, 2000
    Date of Patent: February 27, 2007
    Assignee: Hereuare Communications, Inc.
    Inventors: Francis M. Anton, Jr., Clark Dong, Jong C. Kim, Ranganatha Marathe
  • Patent number: 7006467
    Abstract: Disclosed is a system which provides virtual Ethernet and virtual Wireless Ethernet (e.g. 802.11b) interfaces for client using a single host device. Providing virtual Ethernet interfaces for a client requires one physical Ethernet card/interface. Providing virtual Wireless Ethernet interfaces for a client requires two physical wireless Ethernet cards/interfaces. Applications can use these virtual interfaces as if they are real interfaces using socket interfaces.
    Type: Grant
    Filed: April 29, 2002
    Date of Patent: February 28, 2006
    Assignee: HereUare Communications, Inc.
    Inventors: Francis M. Anton, Jr., Ranganatha Marathe
  • Publication number: 20030202486
    Abstract: Disclosed is a system which provides virtual Ethernet and virtual Wireless Ethernet (e.g. 802.11b) interfaces for client using a single host device. Providing virtual Ethernet interfaces for a client requires one physical Ethernet card/interface. Providing virtual Wireless Ethernet interfaces for a client requires two physical wireless Ethernet cards/interfaces. Applications can use these virtual interfaces as if they are real interfaces using socket interfaces.
    Type: Application
    Filed: April 29, 2002
    Publication date: October 30, 2003
    Applicant: HereUare Communications, Inc.
    Inventors: Francis M. Anton, Ranganatha Marathe