Patents by Inventor Shadab Nazar
Shadab Nazar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10554477Abstract: Systems, methods, and computer-readable media for aggregating and presenting network events in a network environment. In some embodiments, a system can maintain event correlation rules for aggregating \network events occurring in a network based on characteristics of previously occurring network events. Network events occurring in the specific network environment can be identified. The network events can be aggregated to form an aggregated network event using the event correlation rules maintained based on the characteristics of previously occurring network events. The aggregated network event can subsequently be presented to a user.Type: GrantFiled: September 13, 2017Date of Patent: February 4, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Shadab Nazar, Navneet Yadav, Azeem Suleman, Pavan Mamillapalli, John Thomas Monk, Chetan Narsude, Navjyoti Sharma, Gaurav Gupta
-
Patent number: 10505817Abstract: Aspects of the technology provide solutions for determining a time period (“epoch”) required to monitor or analyze a tenant network. Some implementations of the technology include a process for making automatic epoch determinations, which includes steps for identifying one or more network parameters for a tenant network, analyzing the tenant network using the network parameters to discover one or more configuration settings of the tenant network, and determining a first epoch for the tenant network, the first epoch corresponding with a period of time to complete analysis of the tenant network using the network parameters. In some aspects, the process can further include steps for generating a tenant profile for the tenant network, the tenant profile based on the network parameters, the first epoch, and the one or more configuration settings of the tenant network. Systems and machine-readable media are also provided.Type: GrantFiled: October 24, 2017Date of Patent: December 10, 2019Assignee: CISCO TECHNOLOGY, INC.Inventors: Chetan Narsude, Gaurav Gupta, Shadab Nazar, Pavan Mamillapalli, Sundar Iyer
-
Patent number: 10437641Abstract: Aspects of the technology provide systems and methods for interleaving a processing task in a network monitoring appliance. A process of the technology could include steps for identifying operators in the network monitoring appliance, wherein the operators are sequentially arranged to form a processing pipeline, determining an epoch for the processing pipeline, wherein the epoch corresponds with a time duration required for a processing task to traverse the pipeline, and determining a time window in which a supplemental processing task can be interleaved into the processing pipeline, wherein the time window is based on the epoch. Machine-readable media are also provided.Type: GrantFiled: October 27, 2017Date of Patent: October 8, 2019Assignee: CISCO TECHNOLOGY, INC.Inventors: Chetan Narsude, Gaurav Gupta, Azeem Suleman, Shadab Nazar, Pavan Mamillapalli, Sundar Iyer
-
Publication number: 20190081871Abstract: Systems, methods, and computer-readable media for detecting and reporting anomalies in a network environment for providing network assurance. In some embodiments, a system can determine confidence scores for at least one value of parameters of a network environment defining network events occurring in the network environment. The confidences scores can indicate a frequency that the defined network events have a specific event state. The confidence scores can be monitored to detect an anomaly in the network environment. In response to detecting the anomaly in the network environment, the system can determine a relevant network state of the network environment. The relevant network state of the network environment and the anomaly in the network environment can be presented to a user.Type: ApplicationFiled: September 12, 2017Publication date: March 14, 2019Inventors: Shadab Nazar, Pavan Mamillapalli, Azeem Suleman, Jagdev singh Tur, Ayas Pani
-
Publication number: 20190081852Abstract: Systems, methods, and computer-readable media for clustering events occurring in a network environment for providing network assurance. In one embodiment, a system can identify event states of network events defined by values of parameters of a network environment. The system can determine a confidence score that at least one of the values of parameters is associated with a specific event state using the network events and the identified event states of the network events. The confidence score can be presented to a user for purposes of providing network assurance for the network environment.Type: ApplicationFiled: September 12, 2017Publication date: March 14, 2019Inventors: Shadab Nazar, Azeem Suleman, Ayas Pani
-
Publication number: 20190081850Abstract: Systems, methods, and computer-readable media for aggregating and presenting network events in a network environment. In some embodiments, a system can maintain event correlation rules for aggregating \network events occurring in a network based on characteristics of previously occurring network events. Network events occurring in the specific network environment can be identified. The network events can be aggregated to form an aggregated network event using the event correlation rules maintained based on the characteristics of previously occurring network events. The aggregated network event can subsequently be presented to a user.Type: ApplicationFiled: September 13, 2017Publication date: March 14, 2019Inventors: Shadab Nazar, Navneet Yadav, Azeem Suleman, Pavan Mamillapalli, John Thomas Monk, Chetan Narsude, Navjyoti Sharma, Gaurav Gupta
-
Publication number: 20180367417Abstract: Systems, methods, and computer-readable media for receiving one or more models of network intents, comprising a plurality of contracts between providers and consumers, each contract containing entries with priority values. Each contract is flattened into a listing of rules and a new priority value is calculated. The listing of rules encodes the implementation of the contract between the providers and the consumers. Each entry is iterated over and added to a listing of entries if it is not already present. For each rule, the one or more entries associated with the contract from which the rule was flattened are identified, and for each given entry a flat rule comprising the combination of the rule and the entry is generated, wherein a flattened priority is calculated based at least in part on the priority value of the given one of given entry and the priority value of the rule.Type: ApplicationFiled: August 31, 2017Publication date: December 20, 2018Inventors: Advait Dixit, Ramana Rao Kompella, Kartik Mohanram, Sundar Iyer, Shadab Nazar, Chandra Nagarajan
-
Publication number: 20180365096Abstract: Aspects of the technology provide methods for aggregating error log data between multiple devices in a network monitoring appliance. A method of the technology can include steps for identifying a plurality of operators running in a network monitoring appliance, instantiating a plurality of sensors, wherein each of the plurality of sensors is associated with a respective one of the plurality of operators, and wherein each sensor is configured to capture error log data of its corresponding operator. In some aspects, the method can further include steps for aggregating error log data from two or more of the plurality of sensors. Systems and machine-readable media are also provided.Type: ApplicationFiled: October 23, 2017Publication date: December 20, 2018Inventors: Pavan Mamillapalli, Shadab Nazar, Chetan Narsude, Gaurav Gupta, Azeem Suleman, Jagdev Singh Tur, Navjyoti Sharma
-
Publication number: 20180365061Abstract: Aspects of the technology provide systems and methods for interleaving a processing task in a network monitoring appliance. A process of the technology could include steps for identifying operators in the network monitoring appliance, wherein the operators are sequentially arranged to form a processing pipeline, determining an epoch for the processing pipeline, wherein the epoch corresponds with a time duration required for a processing task to traverse the pipeline, and determining a time window in which a supplemental processing task can be interleaved into the processing pipeline, wherein the time window is based on the epoch. Machine-readable media are also provided.Type: ApplicationFiled: October 27, 2017Publication date: December 20, 2018Inventors: Chetan Narsude, Gaurav Gupta, Azeem Suleman, Shadab Nazar, Pavan Mamillapalli, Sundar Iyer
-
Publication number: 20180367435Abstract: Aspects of the technology provide methods for simulating a failure in a tenant network. In some aspects, a monitoring appliance of the disclosed technology can be configured to carry out operations for receiving packets at a virtual device in the monitoring appliance, from a corresponding network device in the tenant network, and instantiating a firewall at the virtual device, wherein the firewall is configured to selectively block traffic routed from the network device to the virtual device in the monitoring appliance. The monitoring appliance can simulate failure of the network device by blocking traffic from the network device to the virtual device using the firewall, and analyze the tenant network to determine a predicted impact a failure of the network device would have on the tenant network. Systems and machine-readable media are also provided.Type: ApplicationFiled: September 22, 2017Publication date: December 20, 2018Inventors: Shadab Nazar, Pavan Mamillapalli, Chetan Narsude, Gaurav Gupta, Azeem Suleman, Sravya Boggavarapu, Jose Delgado
-
Publication number: 20180367411Abstract: Aspects of the technology provide solutions for determining a time period (“epoch”) required to monitor or analyze a tenant network. Some implementations of the technology include a process for making automatic epoch determinations, which includes steps for identifying one or more network parameters for a tenant network, analyzing the tenant network using the network parameters to discover one or more configuration settings of the tenant network, and determining a first epoch for the tenant network, the first epoch corresponding with a period of time to complete analysis of the tenant network using the network parameters. In some aspects, the process can further include steps for generating a tenant profile for the tenant network, the tenant profile based on the network parameters, the first epoch, and the one or more configuration settings of the tenant network. Systems and machine-readable media are also provided.Type: ApplicationFiled: October 24, 2017Publication date: December 20, 2018Inventors: Chetan Narsude, Gaurav Gupta, Shadab Nazar, Pavan Mamillapalli, Sundar Iyer
-
Publication number: 20180309629Abstract: Systems, methods, and computer-readable media for static network policy analysis for a network. In one example, a system obtains a logical model based on configuration data stored in a controller on a software-defined network, the logical model including a declarative representation of respective configurations of objects in the software-defined network, the objects including one or more endpoint groups, bridge domains, contexts, or tenants. The system defines rules representing respective conditions of the objects according to a specification corresponding to the software-defined network, and determines whether the respective configuration of each of the objects in the logical model violates one or more of the rules associated with that object. When the respective configuration of an object in the logical model violates one or more of the rules, the system detects an error in the respective configuration associated with that object.Type: ApplicationFiled: July 28, 2017Publication date: October 25, 2018Inventors: Kartik Mohanram, Chandra Nagarajan, Sundar Iyer, Shadab Nazar, Ramana Rao Kompella
-
Patent number: 9466395Abstract: An ActiveTest solution for memory is disclosed which can search for memory errors during the operation of a product containing digital memory. The ActiveTest system tests memory banks that are not being accessed by normal memory users in order to continually test the memory system in the background. When there is a conflict between the ActiveTest system and a memory user, the memory user is generally given priority.Type: GrantFiled: September 17, 2015Date of Patent: October 11, 2016Assignee: Cisco Technology, Inc.Inventors: Sundar Iyer, Shadab Nazar, Sanjeev Joshi
-
Publication number: 20160005493Abstract: An ActiveTest solution for memory is disclosed which can search for memory errors during the operation of a product containing digital memory. The ActiveTest system tests memory banks that are not being accessed by normal memory users in order to continually test the memory system in the background. When there is a conflict between the ActiveTest system and a memory user, the memory user is generally given priority.Type: ApplicationFiled: September 17, 2015Publication date: January 7, 2016Inventors: Sundar Iyer, Shadab Nazar, Sanjeev Joshi
-
Patent number: 9165687Abstract: An ActiveTest solution for memory is disclosed which can search for memory errors during the operation of a product containing digital memory. The ActiveTest system tests memory banks that are not being accessed by normal memory users in order to continually test the memory system in the background. When there is a conflict between the ActiveTest system and a memory user, the memory user is generally given priority.Type: GrantFiled: January 21, 2014Date of Patent: October 20, 2015Assignee: Cisco Technology, Inc.Inventors: Sundar Iyer, Shadab Nazar, Sanjeev Joshi
-
Publication number: 20140344635Abstract: An ActiveTest solution for memory is disclosed which can search for memory errors during the operation of a product containing digital memory. The ActiveTest system tests memory banks that are not being accessed by normal memory users in order to continually test the memory system in the background. When there is a conflict between the ActiveTest system and a memory user, the memory user is generally given priority.Type: ApplicationFiled: January 21, 2014Publication date: November 20, 2014Inventors: Sundar Iyer, Shadab Nazar, Sanjeev Joshi
-
Patent number: 8850137Abstract: A memory device and related techniques are provided to modify data stored in the memory device without the need to send the data to an external device. A command is received at the memory device to modify data stored at a memory location in a memory array of the memory device. The command includes a value to be used for modifying the data. The memory device reads data from the memory location. The data read from the memory location is modified with modify circuit in the memory device based on the value obtained form the command to produce results data. The results data produced by the modify circuit is written back to the memory location. Since the memory device does not need to send the data read from the memory array off-chip to another device, referred to herein as a host device, to update the data, the input/output bandwidth of the bandwidth is substantially reduced, allowing for lower power memory device operation and reduced latency.Type: GrantFiled: October 11, 2010Date of Patent: September 30, 2014Assignee: Cisco Technology, Inc.Inventors: Shadab Nazar, Mainak Sen, Wing L. Ho, Ananda Shah
-
Publication number: 20120089793Abstract: A memory device and related techniques are provided to modify data stored in the memory device without the need to send the data to an external device. A command is received at the memory device to modify data stored at a memory location in a memory array of the memory device. The command includes a value to be used for modifying the data. The memory device reads data from the memory location. The data read from the memory location is modified with modify circuit in the memory device based on the value obtained form the command to produce results data. The results data produced by the modify circuit is written back to the memory location. Since the memory device does not need to send the data read from the memory array off-chip to another device, referred to herein as a host device, to update the data, the input/output bandwidth of the bandwidth is substantially reduced, allowing for lower power memory device operation and reduced latency.Type: ApplicationFiled: October 11, 2010Publication date: April 12, 2012Applicant: CISCO TECHNOLOGY, INC.Inventors: Shadab Nazar, Mainak Sen, Wing L. Ho, Ananda Shah
-
Publication number: 20110289349Abstract: Monitoring and repairing memory includes selecting a first memory bank comprising a plurality of memory cells to analyze. The plurality of memory cells are copied from the first memory bank to a second memory bank, wherein a request to access the first memory bank is redirected to the second memory bank. A determination is made whether the first memory bank comprises an error of the memory cell.Type: ApplicationFiled: May 24, 2010Publication date: November 24, 2011Applicant: Cisco Technology, Inc.Inventors: Matthias J. Loeser, Daniel V. Singletary, Sanjeev A. Joshi, Shadab Nazar