Patents by Inventor Sanjay K. HOODA

Sanjay K. HOODA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11916778
    Abstract: Techniques for extended network configuration conversion and reconfiguration are described. A network controller proceeds through a set of extended network nodes in an extended network and reconfigures ports in at the various nodes from a first configuration to a second configuration while preventing network traffic looping and maintaining data and management traffic connection to the nodes during the reconfiguration.
    Type: Grant
    Filed: February 7, 2022
    Date of Patent: February 27, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Shashank Vinchurkar, Sanjay K. Hooda, Chiragkumar P. Desai
  • Publication number: 20230421481
    Abstract: Techniques for communication network routing include receiving, at a routing device associated with a first site in an overlay communication network, a dynamic parameter value associated with each of a plurality of additional sites in the overlay communication network. The plurality of additional sites are each configured to provide a first network service for a computing device in the first site. A second site in the overlay communication network is selected, from among the plurality of additional sites, based on a first dynamic parameter value associated with the first site and a received second dynamic parameter value associated with the second site. The first network service is provided from the second site for the computing device, based on the selecting the second site.
    Type: Application
    Filed: June 28, 2022
    Publication date: December 28, 2023
    Inventors: Prakash C. JAIN, Balaji PITTA VENKATACHALAPATHY, Malathi A. SRINIVASAN, Sanjay K. HOODA, Victor MORENO
  • Publication number: 20230370886
    Abstract: An enterprise network may receive a WiFi packet associated with a 5G service (or other type of service) at an access point (AP) in the enterprise network. The enterprise network determines whether the WiFi packet satisfies a first-packet policy associated with the 5G service, where the first-packet policy controls access to a tunnel for traversing the enterprise network to reach the 5G service. If the packet satisfies the policy, the enterprise network queries a map server to identify a location of a 5G border in the enterprise network that is connected to the 5G service. The enterprise network can transmit the WiFi packet on the tunnel with priority to meet SLA using the location of the 5G border.
    Type: Application
    Filed: July 26, 2023
    Publication date: November 16, 2023
    Inventors: Prakash C. JAIN, Sanjay K. HOODA, Vinay SAINI
  • Publication number: 20230344746
    Abstract: Techniques for network routing border convergence are described. Backup paths for external connections for a network are established and provide for a temporary path for network traffic during network routing convergence, preventing traffic loss at network border nodes.
    Type: Application
    Filed: June 29, 2023
    Publication date: October 26, 2023
    Inventors: Prakash JAIN, Sanjay K. HOODA, Victor MORENO
  • Patent number: 11785493
    Abstract: An enterprise network may receive a WiFi packet associated with a 5G service (or other type of service) at an access point (AP) in the enterprise network. The enterprise network determines whether the WiFi packet satisfies a first-packet policy associated with the 5G service, where the first-packet policy controls access to a tunnel for traversing the enterprise network to reach the 5G service. If the packet satisfies the policy, the enterprise network queries a map server to identify a location of a 5G border in the enterprise network that is connected to the 5G service. The enterprise network can transmit the WiFi packet on the tunnel with priority to meet SLA using the location of the 5G border.
    Type: Grant
    Filed: July 23, 2021
    Date of Patent: October 10, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Prakash C. Jain, Sanjay K. Hooda, Vinay Saini
  • Patent number: 11729089
    Abstract: Techniques for network routing border convergence are described. Backup paths for external connections for a network are established and provide for a temporary path for network traffic during network routing convergence, preventing traffic loss at network border nodes.
    Type: Grant
    Filed: June 24, 2021
    Date of Patent: August 15, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Prakash Jain, Sanjay K. Hooda, Victor Moreno
  • Publication number: 20230171662
    Abstract: A wireless telemetry process (WTP) may obtain telemetry data which includes signal strength information associated with a plurality of fabric wireless access points (APs) of a network fabric. The WTP may identify that a signal strength between a current AP and a wireless endpoint is below a threshold. In response, the WTP may select addresses of a set of handoff candidate APs for the wireless endpoint based on the signal strength information. The WTP may communicate, to a map server, a message to register, as entries in a replication list, a plurality of routing locators associated with the addresses of the set of handoff candidate APs for association with an address of the wireless endpoint. The map server may notify a router of the replication list, for replicating packets intended for the wireless endpoint to a plurality of routers that are connected to the set of handoff candidate APs.
    Type: Application
    Filed: November 29, 2021
    Publication date: June 1, 2023
    Inventors: Victor M. Moreno, Sanjay K. Hooda, Errol Fenton Roberts
  • Publication number: 20230074222
    Abstract: Techniques and apparatus for allowing a network fabric to accept network devices associated with other fabric networks are described. An example technique involves establishing a communication session between a first network node and a first control plane of the network fabric, wherein the first network node supports a second control plane different from the first control plane; First routing information from the first network node is imported into a first routing table of the first control plane. Second routing information from a second network node is imported into a second routing table of the first network node.
    Type: Application
    Filed: September 3, 2021
    Publication date: March 9, 2023
    Inventors: Rajeev KUMAR, Sanjay K. HOODA, Balaji PITTA VENKATACHALAPATHY, Prakash C. JAIN, Rajagopal VENKATRAMAN
  • Publication number: 20230021912
    Abstract: An enterprise network may receive a WiFi packet associated with a 5G service (or other type of service) at an access point (AP) in the enterprise network. The enterprise network determines whether the WiFi packet satisfies a first-packet policy associated with the 5G service, where the first-packet policy controls access to a tunnel for traversing the enterprise network to reach the 5G service. If the packet satisfies the policy, the enterprise network queries a map server to identify a location of a 5G border in the enterprise network that is connected to the 5G service. The enterprise network can transmit the WiFi packet on the tunnel with priority to meet SLA using the location of the 5G border.
    Type: Application
    Filed: July 23, 2021
    Publication date: January 26, 2023
    Inventors: Prakash C. JAIN, Sanjay K. HOODA, Vinay SAINI
  • Patent number: 11563682
    Abstract: In one embodiment, a method generally includes a first edge (E) node in a network receiving an encapsulated data packet, wherein the encapsulated data packet comprises an outer header and a data packet, wherein the outer header comprises a first router locator (RLOC) corresponding to the first E node, wherein the data packet comprises an internet protocol (IP) header, and wherein the IP header comprises a destination endpoint identification (EID) corresponding to a host H. The first E node determines whether the host H is attached to the first E node. And in response to the first E node determining the host is attached to the first E node, the first E node forwards the data packet to the host H. The first E node receives a message from another node after the host H detaches from the first E node and reattaches to another E node, wherein the message comprises the destination EID.
    Type: Grant
    Filed: February 19, 2021
    Date of Patent: January 24, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Sanjay K. Hooda, Victor M. Moreno, Satish Kumar Kondalam
  • Patent number: 11463312
    Abstract: Techniques for automated configuration are provided. A first device detects a new device connected by one or more new links in a network, and the first device transmits, to a dynamic host configuration protocol (DHCP) server, a request for a first new subnet. The first device then assigns a first address of the first new subnet to a first new interface of the first device. The first device additionally transmits a second address of the first new subnet to the new device, where the new device uses the second address to establish connectivity to the network.
    Type: Grant
    Filed: January 21, 2021
    Date of Patent: October 4, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: Shyamsundar N. Maniyar, Muninder S. Sambi, Sanjay K. Hooda, Rajeev Kumar, Kedar S. Karmarkar, Himanshu Mehra, Nikhil Sharma
  • Publication number: 20220231915
    Abstract: Techniques for automated configuration are provided. A first device detects a new device connected by one or more new links in a network, and the first device transmits, to a dynamic host configuration protocol (DHCP) server, a request for a first new subnet. The first device then assigns a first address of the first new subnet to a first new interface of the first device. The first device additionally transmits a second address of the first new subnet to the new device, where the new device uses the second address to establish connectivity to the network.
    Type: Application
    Filed: January 21, 2021
    Publication date: July 21, 2022
    Inventors: Shyamsundar N. MANIYAR, Muninder S. SAMBI, Sanjay K. HOODA, Rajeev KUMAR, Kedar S. KARMARKAR, Himanshu MEHRA, Nikhil SHARMA
  • Publication number: 20220158869
    Abstract: Secure network segmentation using logical subnet segments is described. A single network segment or subnet provided by a third party is mapped into multiple layer-3 virtual or logical segments without requiring separate subnets. This mapping is accomplished by using virtual routing functions (VRFs) per logical subnet segment while retaining a single subnet across the segments. The logical subnet segments interact with the single network segment provided by the third party (ISP). The layer-3 VRF instances are created without the need for separate IP subnet pools per layer-3 segment. Each VRF instance for the various logical subnet segments is mapped to an identifier and tag.
    Type: Application
    Filed: February 4, 2022
    Publication date: May 19, 2022
    Inventors: Anand OSWAL, Muninder S. SAMBI, Sanjay K. HOODA, Gangadharan Byju PULARIKKAL, Kedar KARMARKAR
  • Publication number: 20220158930
    Abstract: Techniques for extended network configuration conversion and reconfiguration are described. A network controller proceeds through a set of extended network nodes in an extended network and reconfigures ports in at the various nodes from a first configuration to a second configuration while preventing network traffic looping and maintaining data and management traffic connection to the nodes during the reconfiguration.
    Type: Application
    Filed: February 7, 2022
    Publication date: May 19, 2022
    Inventors: Shashank VINCHURKAR, Sanjay K. HOODA, Chiragkumar P. DESAI
  • Patent number: 11277282
    Abstract: Secure network segmentation using logical subnet segments is described. A single network segment or subnet provided by a third party is mapped into multiple layer-3 virtual or logical segments without requiring separate subnets. This mapping is accomplished by using virtual routing functions (VRFs) per logical subnet segment while retaining a single subnet across the segments. The logical subnet segments interact with the single network segment provided by the third party (ISP). The layer-3 VRF instances are created without the need for separate IP subnet pools per layer-3 segment. Each VRF instance for the various logical subnet segments is mapped to a Virtual Network Identifier (VNI) and Scalable Group Tag (SGT).
    Type: Grant
    Filed: January 19, 2020
    Date of Patent: March 15, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: Anand Oswal, Muninder S. Sambi, Sanjay K. Hooda, Gangadharan Byju Pularikkal, Kedar Karmarkar
  • Patent number: 11265239
    Abstract: Techniques for extended network configuration conversion and reconfiguration are described. A network controller proceeds through a set of extended network nodes in an extended network and reconfigures ports in at the various nodes from a first configuration to a second configuration while preventing network traffic looping and maintaining data and management traffic connection to the nodes during the reconfiguration.
    Type: Grant
    Filed: September 10, 2019
    Date of Patent: March 1, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: Shashank Vinchurkar, Sanjay K. Hooda, Chiragkumar P. Desai
  • Publication number: 20210314249
    Abstract: Techniques for network routing border convergence are described. Backup paths for external connections for a network are established and provide for a temporary path for network traffic during network routing convergence, preventing traffic loss at network border nodes.
    Type: Application
    Filed: June 24, 2021
    Publication date: October 7, 2021
    Inventors: Prakash JAIN, Sanjay K. HOODA, Victor MORENO
  • Publication number: 20210226817
    Abstract: Secure network segmentation using logical subnet segments is described. A single network segment or subnet provided by a third party is mapped into multiple layer-3 virtual or logical segments without requiring separate subnets. This mapping is accomplished by using virtual routing functions (VRFs) per logical subnet segment while retaining a single subnet across the segments. The logical subnet segments interact with the single network segment provided by the third party (ISP). The layer-3 VRF instances are created without the need for separate IP subnet pools per layer-3 segment. Each VRF instance for the various logical subnet segments is mapped to a Virtual Network Identifier (VNI) and Scalable Group Tag (SGT).
    Type: Application
    Filed: January 19, 2020
    Publication date: July 22, 2021
    Inventors: Anand OSWAL, Muninder S. SAMBI, Sanjay K. HOODA, Gangadharan Byju PULARIKKAL, Kedar KARMARKAR
  • Patent number: 11057292
    Abstract: Techniques for network routing border convergence are described. Backup paths for external connections for a network are established and provide for a temporary path for network traffic during network routing convergence, preventing traffic loss at network border nodes.
    Type: Grant
    Filed: September 10, 2019
    Date of Patent: July 6, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: Prakash Jain, Sanjay K. Hooda, Victor Moreno
  • Publication number: 20210176173
    Abstract: In one embodiment, a method generally includes a first edge (E) node in a network receiving an encapsulated data packet, wherein the encapsulated data packet comprises an outer header and a data packet, wherein the outer header comprises a first router locator (RLOC) corresponding to the first E node, wherein the data packet comprises an internet protocol (IP) header, and wherein the IP header comprises a destination endpoint identification (EID) corresponding to a host H. The first E node determines whether the host H is attached to the first E node. And in response to the first E node determining the host is attached to the first E node, the first E node forwards the data packet to the host H. The first E node receives a message from another node after the host H detaches from the first E node and reattaches to another E node, wherein the message comprises the destination EID.
    Type: Application
    Filed: February 19, 2021
    Publication date: June 10, 2021
    Inventors: Sanjay K. Hooda, Victor M. Moreno, Satish Kumar Kondalam