Patents by Inventor Sanjay Kumar Hooda
Sanjay Kumar Hooda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230344898Abstract: This disclosure describes techniques and mechanisms for providing hybrid cloud services for enterprise fabric. The techniques include enhancing an on-demand protocol (e.g., such as LISP) and allowing simplified security and/or firewall service insertion for datacenter servers providing those services. Accordingly, the techniques described herein provide hybrid cloud services that work in disaggregated, distributed, and consistent way, while avoiding complex datacenter network devices (e.g., such running overlay on TOR), replacing and moving the functionality to on demand protocol enabled servers, which intelligently receive the required mappings as well as registers and publishes the service information to intelligently interact with the network.Type: ApplicationFiled: February 6, 2023Publication date: October 26, 2023Inventors: Prakash C. Jain, Sanjay Kumar Hooda, Marc Portoles Comeras, Vinay Saini, Victor Manuel Moreno
-
Patent number: 11799767Abstract: Systems, methods, and computer-readable media for discovering silent hosts in a software-defined network and directing traffic to the silent hosts in a scalable and targeted manner include determining interfaces of a fabric device that are connected to respective one or more endpoints, where the fabric device is configured to connect the endpoints to a network fabric of the software-defined network. At least a first interface is identified, where an address of a first endpoint connected to the first interface is not available at the fabric device. A first notification is transmitted to a control plane of the software-defined network based on identifying the first interface, where the control plane may create a flood list which includes the fabric device. Traffic intended for the first endpoint from the network fabric is received by the fabric device can be based on the flood list.Type: GrantFiled: March 1, 2022Date of Patent: October 24, 2023Assignee: Cisco Technology, Inc.Inventors: Satish Kondalam, Sanjay Kumar Hooda, Prakash C. Jain, Vikram Vikas Pendharkar
-
Publication number: 20230308391Abstract: Systems, methods, and computer-readable media for communicating policy changes in a Locator/ID Separation Protocol (LISP) based network deployment include receiving, at a first routing device, a first notification from a map server, the first notification indicating a change in a policy for LISP based communication between at least a first endpoint device and at least a second endpoint device, the first endpoint device being connected to a network fabric through the first routing device and the second endpoint device being connected to the network fabric through a second routing device. The first routing device forwards a second notification to the second routing device if one or more entries of a first map cache implemented by the first routing device are affected by the policy change, the second notification indicating a set of one or more endpoints connected to the second routing device that are affected by the policy change.Type: ApplicationFiled: May 24, 2023Publication date: September 28, 2023Inventors: Prakash C. Jain, Sanjay Kumar Hooda, Satish Kondalam, Raja Janardanan, Aaditya Vadnere, Shivangi Sharma
-
Publication number: 20230308389Abstract: Methods and devices configure edge nodes of a virtual network overlay to continuously forward data plane traffic flows between client devices of a common subnet over the course of at least some of the edge nodes being EF-configured. TF-configured edge nodes and EF-configured edge nodes both play roles in unilaterally inducing address discovery by sending to client devices address discovery responses that were not prompted by address discovery requests. TF-configured edge nodes then handle ensuing address discovery requests by proxy, and subsequently handle certain traffic flows according to an EF-compatible forwarding mode, while EF-configured edge nodes continue to forward traffic flows by IP routing normally. This averts throughput of data plane traffic over the network overlay being reduced as a side effect of the heterogeneously configured edge nodes, and averts the possibility of client devices broadcasting address discovery protocol requests as a result of remote client devices being unreachable.Type: ApplicationFiled: March 24, 2022Publication date: September 28, 2023Inventors: Victor Manuel Moreno, Sanjay Kumar Hooda, Roberto Mitsuo Kobo, Balaji Pitta Venkatachalapathy
-
Publication number: 20230300024Abstract: In one embodiment, dynamic user private networks are virtually segmented within a shared virtual network. A network control system maintains the dynamic logical segmentation of the shared virtual network. User entities (e.g., user devices and/or services) are communicatively coupled to respective personal virtual networks via endpoints of access devices. Each of these endpoints is associated with a corresponding user private network. Responsive in real-time to automated processing of a received electronic particular user request, the network control system automatically modifies the dynamic logical segmentation of the shared virtual network to move a particular user entity on the shared virtual network to newly being on the first dynamic user private network without being disconnected from the shared virtual network. One embodiment uses different user private network identifiers (UPN-IDs) associated with endpoints and received packets to identify their respective user private network.Type: ApplicationFiled: May 23, 2023Publication date: September 21, 2023Inventors: Shyamsundar N. Maniyar, Sanjay Kumar Hooda, Shree N. Murthy, Sonal Prem Kumar Chhabria, Akshay Dorwat
-
Publication number: 20230291687Abstract: Techniques for group-based classification and policy enforcement at a network fabric edge for traffic that is being sent to external network destinations are disclosed herein. The techniques may include receiving, at a control plane of a network and from an edge node of the network, a request to provide mapping data associated with sending a packet to a destination. Based at least in part on an address prefix value associated with the destination, the control plane may determine that the destination is located in an external network. Additionally, a group identifier that is associated with the destination may be determined. In this way, an indication of the group identifier may be sent to the edge node such that the edge node may determine, based at least in part on the group identifier, a policy decision for routing the packet to the external network.Type: ApplicationFiled: May 16, 2023Publication date: September 14, 2023Inventors: Prakash C. Jain, Sanjay Kumar Hooda, Darrin Joseph Miller, Ashwin Kumar
-
Publication number: 20230269139Abstract: Systems, methods, and computer-readable storage media are provided for provisioning a common subnet across a number of subscribers and their respective virtual networks using dynamically generated network policies that provide isolation between the subscribers. The dynamic generation of the network policies is performed when a host (e.g. client) is detected (via a switch) as the host joins the computing network via virtual networks. This ability to configure a common subnet for all the subscriber virtual networks allows these subscribers to more easily access external shared services coming from a headquarter site while keeping the separation and segmentation of multiple subscriber virtual networks within a single subnet. This allows the Enterprise fabric to be more simple and convenient to deploy without making security compromises.Type: ApplicationFiled: April 21, 2023Publication date: August 24, 2023Inventors: Sanjay Kumar Hooda, Muninder Singh Sambi, Victor Moreno, Prakash C. Jain, Tarunesh Ahuja, Satish Kondalam
-
Publication number: 20230261981Abstract: In one embodiment, a method by an edge router configured to operate at a first site of a software-defined wide-area network includes receiving a data packet from a first host located in the first site, where the data packet is destined to a second host located in a second site, determining that an identifier of a second group to which the second host belongs is not available at the edge router, sending a request for an identifier of the second group to a network apparatus, where the request may comprise an address of the second host, receiving a response comprising the identifier of the second group from the network apparatus, determining that the second group is a destination group, applying one or more policies associated with the destination group to the data packet, and causing the data packet to be routed to the second host.Type: ApplicationFiled: April 19, 2023Publication date: August 17, 2023Inventors: Anubhav Gupta, Rex Fernando, Sanjay Kumar Hooda, Syam Sundar Appala, Samir Thoria
-
Patent number: 11729280Abstract: Services with policy control may be provided. A computing device may receive registration information associated with a border device. The registration information may comprise information identifying a service provided by a server associated with the border device, information identifying the border device, and policies associated with the service. Then an address for the server may be determined. Next a request may be received comprising the information identifying the service provided by the server. In response to receiving the request comprising the information identifying the service provided by the server, the address for the server, the information identifying the border device, and the policies associated with the service may be provided.Type: GrantFiled: October 10, 2022Date of Patent: August 15, 2023Assignee: Cisco Technology Inc.Inventors: Prakash C. Jain, Sanjay Kumar Hooda, Rajeev Kumar, Ramesh Yeevani-Srinivas
-
Publication number: 20230254250Abstract: Techniques and architecture are described that utilize network address translation (NAT) based on a group tag such that legacy and third-party devices may utilize and apply “subnet” based policies, thereby allowing the subnet based policies to be as effective as “group” based policies. In particular, a subnet may be applied to a group tag where the group tag is not understandable outside an access network such as, for example, a fabric network. Thus, when a packet originates from a fabric network utilizing group tags representing source groups of endpoints and is destined for a legacy or a third-party device-based network that does not utilize and/or understand group tags, then the group is converted into a subnet. Since that subnet is different from the source host within the fabric network, network address translation (NAT) is utilized.Type: ApplicationFiled: February 7, 2022Publication date: August 10, 2023Inventors: Victor Manuel Moreno, Shyamsundar N. Maniyar, Sanjay Kumar Hooda, Prakash C. Jain, Vinay Saini
-
Patent number: 11716284Abstract: Techniques for group-based classification and policy enforcement at a network fabric edge for traffic that is being sent to external network destinations are disclosed herein. The techniques may include receiving, at a control plane of a network and from an edge node of the network, a request to provide mapping data associated with sending a packet to a destination. Based at least in part on an address prefix value associated with the destination, the control plane may determine that the destination is located in an external network. Additionally, a group identifier that is associated with the destination may be determined. In this way, an indication of the group identifier may be sent to the edge node such that the edge node may determine, based at least in part on the group identifier, a policy decision for routing the packet to the external network.Type: GrantFiled: May 5, 2021Date of Patent: August 1, 2023Assignee: Cisco Technology, Inc.Inventors: Prakash C. Jain, Sanjay Kumar Hooda, Darrin Joseph Miller, Ashwin Kumar
-
Patent number: 11706139Abstract: Systems, methods, and computer-readable media for communicating policy changes in a Locator/ID Separation Protocol (LISP) based network deployment include receiving, at a first routing device, a first notification from a map server, the first notification indicating a change in a policy for LISP based communication between at least a first endpoint device and at least a second endpoint device, the first endpoint device being connected to a network fabric through the first routing device and the second endpoint device being connected to the network fabric through a second routing device. The first routing device forwards a second notification to the second routing device if one or more entries of a first map cache implemented by the first routing device are affected by the policy change, the second notification indicating a set of one or more endpoints connected to the second routing device that are affected by the policy change.Type: GrantFiled: September 15, 2021Date of Patent: July 18, 2023Assignee: Cisco Technology, Inc.Inventors: Prakash C. Jain, Sanjay Kumar Hooda, Satish Kondalam, Raja Janardanan, Aaditya Vadnere, Shivangi Sharma
-
Patent number: 11706303Abstract: The present disclosure provides systems, methods and computer-readable media for maintaining network connectivity, in a LISP based network, when one or more network edge nodes lose connectivity to a LISP control plane of the network, using multicast messaging. In one example, a method includes receiving a connection request from a first endpoint to a second endpoint communicatively coupled to a second edge node; determining, by the first edge node, that a connection session to a control plane for locating the second endpoint has failed; querying one or more available edge nodes for locating the second endpoint using a multicast message; locating the second endpoint based on at least one query response received from the one or more available edge nodes, at least one query response including an identifier of the second endpoint; and establishing the connection request between the first endpoint and the second endpoint upon locating the second endpoint.Type: GrantFiled: April 22, 2021Date of Patent: July 18, 2023Assignee: Cisco Technology, Inc.Inventors: Raja Janardanan, Sanjay Kumar Hooda, Victor Manuel Moreno
-
Patent number: 11700173Abstract: In one embodiment, dynamic user private networks are virtually segmented within a shared virtual network. A network control system maintains the dynamic logical segmentation of the shared virtual network. User entities (e.g., user devices and/or services) are communicatively coupled to respective personal virtual networks via endpoints of access devices. Each of these endpoints is associated with a corresponding user private network. Responsive in real-time to automated processing of a received electronic particular user request, the network control system automatically modifies the dynamic logical segmentation of the shared virtual network to move a particular user entity on the shared virtual network to newly being on the first dynamic user private network without being disconnected from the shared virtual network. One embodiment uses different user private network identifiers (UPN-IDs) associated with endpoints and received packets to identify their respective user private network.Type: GrantFiled: September 25, 2020Date of Patent: July 11, 2023Assignee: Cisco Technology, Inc.Inventors: Shyamsundar N. Maniyar, Sanjay Kumar Hooda, Shree N. Murthy, Sonal Prem Kumar Chhabria, Akshay Dorwat
-
Patent number: 11695824Abstract: Presented herein are techniques to provide an endpoint in a multi-site Software-defined network (SDN) fabric with an Internet access route that is optimal for the specific site in which the endpoint is located. In particular, a control plane node in a first site of a multi-site SDN fabric registers a border node in the first site as a Default Egress Tunnel Router (ETR) for Internet access or unknown endpoint identifier (EID) of the first site. The first site includes at least one endpoint. The control plane node receives a request for Internet access for the at least one endpoint and provides a dynamically-selected Internet access route via a same or different virtual instance (e.g., Virtual Routing and Forwarding (VRF) function(s), Virtual Private Network(s) (VPNs), Virtual Networks (VNs), etc.) for Internet traffic sent by the at least one endpoint.Type: GrantFiled: August 9, 2021Date of Patent: July 4, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Prakash Jain, Sanjay Kumar Hooda, Satish Kumar Kondalam
-
Publication number: 20230198902Abstract: Techniques for dynamically adapting a router capacity to system needs in a network. The border router may receive a list of summarized prefixes for endpoint devices associated with the router from control-plane nodes. The router may store the list of summarized prefixes in memory of the border router. Once the router receives traffic that is destined for endpoint devices associated with the border router, it may determine that the destination address is included in the summarized prefixes. In some examples, the router may download complete prefixes from the control-plane nodes, and forward the traffic to the destination address indicated by the complete prefixes.Type: ApplicationFiled: December 21, 2021Publication date: June 22, 2023Inventors: Balaji Pitta Venkatachalapathy, Sanjay Kumar Hooda, Marc Portoles Comeras
-
Patent number: 11683262Abstract: In one embodiment, a method includes receiving a data packet from a first host located in the first site, where the data packet may be destined to a second host located in a second site that may be different from the first site, determining that an identifier of a second group to which the second host belongs is not available at the first network apparatus, sending a request for an identifier of the second group to a second network apparatus, where the request may comprise an address of the second host, receiving a response comprising the identifier of the second group from the second network apparatus, determining that the second group is a destination group, applying one or more policies associated with the destination group to the data packet, and causing the data packet to be routed to the second host.Type: GrantFiled: November 26, 2019Date of Patent: June 20, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Anubhav Gupta, Rex Fernando, Sanjay Kumar Hooda, Syam Sundar Appala, Samir Thoria
-
Publication number: 20230188413Abstract: An enterprise controller of an enterprise network sends to a service gateway of a service provider network a request for network slice information about network slices provisioned on a data plane of the service provider network. Responsive to the sending, the enterprise controller receives from the service gateway the network slice information including identifiers of and properties associated with the network slices. Responsive to receiving a request for the network slice information from a network device at a border of a forwarding plane of the enterprise network, the enterprise controller sends the network slice information to the network device to cause the network device to perform configuring network traffic in the forwarding plane with identifiers of ones of the network slices that match the network traffic, and to perform forwarding the network traffic configured with the identifiers to the data plane of the service provider network.Type: ApplicationFiled: February 3, 2023Publication date: June 15, 2023Inventors: Oliver James Bull, Rex Emmanuel Fernando, Anand Oswal, Kausik Majumdar, Darren Russell Dukes, Sanjay Kumar Hooda
-
Publication number: 20230179598Abstract: Cloud delivered access may be provided. A network device may provide a client device with a pre-authentication virtual network and a pre-authentication address. Next, a policy may be received in response to the client device authenticating. The client device may then be moved to a post-authentication virtual network based on the policy. A post-authentication address may then be obtained for the client device in response to moving the client device to a post-authentication virtual network. Traffic for the client device may then be translated to the post-authentication address.Type: ApplicationFiled: February 2, 2023Publication date: June 8, 2023Applicant: Cisco Technology, Inc.Inventors: Muninder Sambi, Anand Oswal, Sanjay Kumar Hooda
-
Publication number: 20230179526Abstract: This disclosure describes techniques for software-defined service insertion. The techniques include a method of configuring a network for service insertion. The techniques include processing a master policy correlating an endpoint group pair, of source endpoint group and destination endpoint group, to a service graph. The service graph indicates a template service chain, and the template service chain indicates an ordering of a plurality of services. Processing the master policy includes disaggregating the master policy into at least one location specific policy, each of the at least one location specific policy corresponding to a separate location in the network and including traffic steering directives corresponding to a portion of the plurality of services associated with the separate location. The techniques further include causing each of the at least one location specific policy to be stored in association with the separate location to which that location specific policy corresponds.Type: ApplicationFiled: January 30, 2023Publication date: June 8, 2023Inventors: Victor Manuel Moreno, Sanjay Kumar Hooda, Anoop Vetteth, Prakash C. Jain