Patents by Inventor Sri Goli
Sri Goli has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12028314Abstract: Techniques are presented herein for providing a persistent external Internet Protocol (IP) address for extra-cluster services. One example involves initiating, in a cluster, a first pod with a label that identifies a service. The first pod is configured to provide the service to one or more network entities outside the cluster. The first pod is assigned an IP address configured for communicating outside the cluster. A mapping of the service to the IP address is stored. In response to a determination that the service has been disrupted, a second pod is initiated in the cluster with the label that identifies the service. The second pod is configured to provide the service to the one or more network entities outside the cluster. Based on the mapping and the label that identifies the service, the IP address is assigned to the second pod.Type: GrantFiled: March 15, 2023Date of Patent: July 2, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Akshya Kumar Singh, Rajesh Nataraja, Shyam N. Kapadia, Sri Goli, Naoshad Mehta
-
Patent number: 11962494Abstract: Two versions of a database can be held in two trees that have many of the same nodes. Both trees can be concurrently searched using recursive algorithms. A root node indicator indicates a root node for a tree search algorithm. The root node indicator can indicate a first root node of a first tree. A tree search algorithm can identify a record node in the first tree. Intermediate nodes between the record node and the first root node can be identified and retained nodes can be identified. A second root node and replacement intermediate nodes can be instantiated. A second tree that includes the second root node, the replacement intermediate node, and the retained nodes can be created. The root node indicator can be set to indicate the second root node after creating the second tree.Type: GrantFiled: July 20, 2021Date of Patent: April 16, 2024Assignee: Pensando Systems Inc.Inventors: Pavithra Ramaswamy, Sarat Kamisetty, Lakshmi Narasimhan Seshan, Sri Goli
-
Patent number: 11922216Abstract: Techniques and mechanisms for managing workloads in compute clusters comprising compute nodes by managing the workloads at the resource level of the compute clusters. For example, virtual service contexts (VSCs) may be defined where the VSCs represent service classes. Policies may be defined with respect to each service class. These service classes are dynamically constructed based on business needs. Hence there is natural requirement for a user to construct and rebalance the compute resources for these service classes dynamically. The policies may be related to resources of the compute clusters for executing workload units in the compute clusters. Resources of the compute clusters may be allocated to each service class. Each workload unit may be assigned to a one of the service classes based on the service context or type of workload unit. The workload units may then be executed by the compute clusters using the resources in accordance with the policies.Type: GrantFiled: October 22, 2020Date of Patent: March 5, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Akshya Kumar Singh, Sri Goli, Amitkumar Patel, Ravi Nag Chamarthy
-
Publication number: 20240073099Abstract: Techniques for automatically claiming switches of a tenant computer network by a remote, cloud-based network controller. A first seed switch is manually claimed by a user by implementing the remote, cloud-based network controller. After claiming the seed switch a set of switches immediately connected with the seed switch are identified by Device Connector logic in the seed switch and immediately connected switches. Switches directly connected to those switches are then identified using Device Connector logic of the switches. This process is performed iteratively by identifying immediately connected switches until all of the switches are identified. All or a subset of the identified switches can then be claimed by the remote, cloud-based controller based on a response from the tenant network user.Type: ApplicationFiled: March 8, 2023Publication date: February 29, 2024Inventors: Deepak Kumar, Shyam Nayan Kapadia, Neelesh Kumar, Sri Goli, Eshwar Rao Yedavalli
-
Publication number: 20230216828Abstract: Techniques are presented herein for providing a persistent external Internet Protocol (IP) address for extra-cluster services. One example involves initiating, in a cluster, a first pod with a label that identifies a service. The first pod is configured to provide the service to one or more network entities outside the cluster. The first pod is assigned an IP address configured for communicating outside the cluster. A mapping of the service to the IP address is stored. In response to a determination that the service has been disrupted, a second pod is initiated in the cluster with the label that identifies the service. The second pod is configured to provide the service to the one or more network entities outside the cluster. Based on the mapping and the label that identifies the service, the IP address is assigned to the second pod.Type: ApplicationFiled: March 15, 2023Publication date: July 6, 2023Inventors: Akshya Kumar Singh, Rajesh Nataraja, Shyam N. Kapadia, Sri Goli, Naoshad Mehta
-
Patent number: 11671401Abstract: Techniques are presented herein for providing a persistent external Internet Protocol (IP) address for extra-cluster services. One example involves initiating, in a cluster, a first pod with a label that identifies a service. The first pod is configured to provide the service to one or more network entities outside the cluster. The first pod is assigned an IP address configured for communicating outside the cluster. A mapping of the service to the IP address is stored. In response to a determination that the service has been disrupted, a second pod is initiated in the cluster with the label that identifies the service. The second pod is configured to provide the service to the one or more network entities outside the cluster. Based on the mapping and the label that identifies the service, the IP address is assigned to the second pod.Type: GrantFiled: November 19, 2021Date of Patent: June 6, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Akshya Kumar Singh, Rajesh Nataraja, Shyam N. Kapadia, Sri Goli, Naoshad Mehta
-
Publication number: 20230023674Abstract: Two versions of a database can be held in two trees that have many of the same nodes. Both trees can be concurrently searched using recursive algorithms. A root node indicator indicates a root node for a tree search algorithm. The root node indicator can indicate a first root node of a first tree. A tree search algorithm can identify a record node in the first tree. Intermediate nodes between the record node and the first root node can be identified and retained nodes can be identified. A second root node and replacement intermediate nodes can be instantiated. A second tree that includes the second root node, the replacement intermediate node, and the retained nodes can be created. The root node indicator can be set to indicate the second root node after creating the second tree.Type: ApplicationFiled: July 20, 2021Publication date: January 26, 2023Inventors: Pavithra Ramaswamy, Sarat Kamisetty, Lakshmi Narasimhan Seshan, Sri Goli
-
Publication number: 20220311738Abstract: Techniques are presented herein for providing a persistent external Internet Protocol (IP) address for extra-cluster services. One example involves initiating, in a cluster, a first pod with a label that identifies a service. The first pod is configured to provide the service to one or more network entities outside the cluster. The first pod is assigned an IP address configured for communicating outside the cluster. A mapping of the service to the IP address is stored. In response to a determination that the service has been disrupted, a second pod is initiated in the cluster with the label that identifies the service. The second pod is configured to provide the service to the one or more network entities outside the cluster. Based on the mapping and the label that identifies the service, the IP address is assigned to the second pod.Type: ApplicationFiled: November 19, 2021Publication date: September 29, 2022Inventors: Akshya Kumar Singh, Rajesh Nataraja, Shyam N. Kapadia, Sri Goli, Naoshad Mehta
-
Publication number: 20220129326Abstract: Techniques and mechanisms for managing workloads in compute clusters comprising compute nodes by managing the workloads at the resource level of the compute clusters. For example, virtual service contexts (VSCs) may be defined where the VSCs represent service classes. Policies may be defined with respect to each service class. These service classes are dynamically constructed based on business needs. Hence there is natural requirement for a user to construct and rebalance the compute resources for these service classes dynamically. The policies may be related to resources of the compute clusters for executing workload units in the compute clusters. Resources of the compute clusters may be allocated to each service class. Each workload unit may be assigned to a one of the service classes based on the service context or type of workload unit. The workload units may then be executed by the compute clusters using the resources in accordance with the policies.Type: ApplicationFiled: October 22, 2020Publication date: April 28, 2022Inventors: Akshya Kumar Singh, Sri Goli, Amitkumar Patel, Ravi Nag Chamarthy
-
Patent number: 8804570Abstract: A first provider edge (PE) device is configured to: receive a Label Distribution Protocol (LDP) MAC Flush message from a PE device via an input port; flush a routing table in response to the LDP MAC Flush message; determine whether the LDP MAC Flush message comprises a PE identifier corresponding to the PE device; generate a Topology Change Notification (TCN) message based on the LDP MAC Flush message when the LDP MAC Flush message comprises the PE identifier corresponding to the PE device; and output the TCN message.Type: GrantFiled: December 17, 2010Date of Patent: August 12, 2014Assignee: Juniper Networks, Inc.Inventors: Manish Gupta, Ramasamy Ramanathan, Sri Goli
-
Patent number: 8724629Abstract: Techniques are described for supporting metro Ethernet “E-TREE” service over a packet-switched MPLS network, including a VPLS core, in a manner that allows a service provide to easily integrate with different types of technologies deployed by its various customers. Moreover, the techniques described herein provide increased flexibility with respect to the topology of the roots and leafs of the E-TREE service and, in particular, allow roots and leaf nodes to be coupled to a common router that provides access to the VPLS core. An NNI port of a PE router may process network traffic to provide E-TREE service to a bridged network having both leaf nodes and root nodes process and direct traffic between logical interfaces as changed next hops.Type: GrantFiled: June 13, 2011Date of Patent: May 13, 2014Assignee: Juniper Networks, Inc.Inventors: Sri Goli, Sunesh Rustagi, Pankaj Shukla
-
Patent number: 8665739Abstract: In general, techniques are described for measuring packet data unit (PDU) loss in a L2 virtual private network (L2VPN) service, such as a VPLS instance. In one example of the techniques, provider edge (PE) routers that participate in the L2VPN measure known unicast and multicast PDU traffic at the service endpoints for the instance to determine unicast PDU loss within the service provider network. As the routers learn the outbound service (i.e., core-facing) interfaces and outbound local (i.e., customer-facing) interfaces for L2 addresses of customer devices that issue packets to the VPLS instance, the routers establish respective unicast transmit and receipt counters for the service endpoints that serve the customer devices. In another example, PE routers that participate in the L2VPN measure multicast PDU traffic at the service endpoints for the instance and account for internal replication by intermediate service nodes to determine multicast PDU loss within the service.Type: GrantFiled: March 16, 2011Date of Patent: March 4, 2014Assignee: Juniper Networks, Inc.Inventors: Prabakaran Thirumali Sampath, Sri Goli
-
Patent number: 8514746Abstract: The reliability of the connection of a client edge (CE) device to a core network may be improved using redundant provider edge (PE) devices. A first of the PE devices may monitor a connection to the core network, where the PE device acts as a root device in a set of devices that implement a spanning tree using a spanning tree protocol and where a second PE device in the set of devices additionally connects to the core network. The PE device may additionally detect failure of the connection of the PE device to the core network; and change, in response to the detected failure of the connection, a spanning tree protocol priority value of the device to a value having a lower priority than that of the second PE device.Type: GrantFiled: November 8, 2010Date of Patent: August 20, 2013Assignee: Juniper Networks, Inc.Inventors: Sri Goli, Ramanarayanan Ramakrishnan, Deepak Ojha, Apurva Mehta
-
Patent number: 8467316Abstract: In general, techniques are described for enhanced learning in layer two (L2) networks. A first network device of the intermediate network comprising a control unit and an interface may implement these techniques. The control unit executes a loop-prevention protocol (LPP) that determines a bridge identifier associated with a second network device of the intermediate network, where the first and second network devices each couple to a first network. The LPP selects the second network device as a root bridge and detects a topology change that splits the first network into sub-networks. The interface then outputs a message to direct remaining network devices of the intermediate network to clear L2 address information learned when forwarding L2 communications. The message includes the bridge identifier determined by the loop-prevention protocol as the root bridge and directs these remaining network devices to clear only the L2 addresses learned from this bridge identifier.Type: GrantFiled: December 29, 2010Date of Patent: June 18, 2013Assignee: Juniper Networks, Inc.Inventors: Sri Goli, Ramasamy Ramanathan, Ramanarayanan Ramakrishnan, Sanjiv Doshi, Deepak Ojha, Jagadish Grandhi
-
Publication number: 20120236734Abstract: In general, techniques are described for measuring packet data unit (PDU) loss in a L2 virtual private network (L2VPN) service, such as a VPLS instance. In one example of the techniques, provider edge (PE) routers that participate in the L2VPN measure known unicast and multicast PDU traffic at the service endpoints for the instance to determine unicast PDU loss within the service provider network. As the routers learn the outbound service (i.e., core-facing) interfaces and outbound local (i.e., customer-facing) interfaces for L2 addresses of customer devices that issue packets to the VPLS instance, the routers establish respective unicast transmit and receipt counters for the service endpoints that serve the customer devices. In another example, PE routers that participate in the L2VPN measure multicast PDU traffic at the service endpoints for the instance and account for internal replication by intermediate service nodes to determine multicast PDU loss within the service.Type: ApplicationFiled: March 16, 2011Publication date: September 20, 2012Applicant: JUNIPER NETWORKS, INC.Inventors: Prabakaran Thirumali Sampath, Sri Goli