Patents by Inventor Sridar Kandaswamy

Sridar Kandaswamy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10904099
    Abstract: In an embodiment, a computer-implemented method comprises receiving logical model input that specifies a logical topology model of networking elements and/or computing elements for deployment at least partially in a private cloud computing infrastructure and at least partially in a public cloud computing infrastructure; receiving resource input specifying an inventory of computing elements that are available at least partially in the private cloud computing infrastructure and at least partially in the public cloud computing infrastructure; automatically generating an intermediate topology comprising a set of deployment instructions that are capable of execution at least partially in the private cloud computing infrastructure and at least partially in the public cloud computing infrastructure to cause physical realization of a network deployment corresponding to the logical topology model; determining whether the intermediate topology is functionally equivalent to the logical topology model; in response to det
    Type: Grant
    Filed: September 7, 2018
    Date of Patent: January 26, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: Sridar Kandaswamy, Bob Melander
  • Patent number: 10880368
    Abstract: Certain aspects of the present disclosure provide a method for managing network operations. The method generally includes selecting an edge cloud of a plurality of edge clouds to be used for performing one or more network operations for at least one endpoint device. In certain aspects, the selection may be based on an indication of at least one of an amount of available resources or capabilities associated with each of the plurality of edge clouds. In certain aspects, the method also includes configuring the edge cloud to perform the one or more network operations based on the selection.
    Type: Grant
    Filed: January 29, 2019
    Date of Patent: December 29, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Sebastian Jeuk, Gonzalo A. Salgueiro, Sridar Kandaswamy, Bob C. Melander
  • Patent number: 10742686
    Abstract: A method and apparatus for dynamic integration of a covert namespace are provided. A Software-Defined Networking (SDN) controller is configured to send a request for workload transfer to an endpoint where the endpoint is connected to a virtual switch. The SDN controller determines that a connection between the endpoint and the virtual switch is secure based on a tenant-specific policy associated with the endpoint. A first covert namespace is configured to be connected between the endpoint and the virtual switch to communicate to the endpoint and the virtual switch directly. The operations of the virtual switch are executed using the first covert namespace according to the tenant-specific policy. A workload is caused to be transmitted to the endpoint through the first covert namespace.
    Type: Grant
    Filed: August 29, 2018
    Date of Patent: August 11, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Ralf Rantzau, Rajath Agasthya, Sebastian Jeuk, Sridar Kandaswamy
  • Publication number: 20200244722
    Abstract: Certain aspects of the present disclosure provide a method for managing network operations. The method generally includes selecting an edge cloud of a plurality of edge clouds to be used for performing one or more network operations for at least one endpoint device. In certain aspects, the selection may be based on an indication of at least one of an amount of available resources or capabilities associated with each of the plurality of edge clouds. In certain aspects, the method also includes configuring the edge cloud to perform the one or more network operations based on the selection.
    Type: Application
    Filed: January 29, 2019
    Publication date: July 30, 2020
    Inventors: Sebastian JEUK, Gonzalo A. SALGUEIRO, Sridar KANDASWAMY, Bob C. MELANDER
  • Publication number: 20200084112
    Abstract: In an embodiment, a computer-implemented method comprises receiving logical model input that specifies a logical topology model of networking elements and/or computing elements for deployment at least partially in a private cloud computing infrastructure and at least partially in a public cloud computing infrastructure; receiving resource input specifying an inventory of computing elements that are available at least partially in the private cloud computing infrastructure and at least partially in the public cloud computing infrastructure; automatically generating an intermediate topology comprising a set of deployment instructions that are capable of execution at least partially in the private cloud computing infrastructure and at least partially in the public cloud computing infrastructure to cause physical realization of a network deployment corresponding to the logical topology model; determining whether the intermediate topology is functionally equivalent to the logical topology model; in response to det
    Type: Application
    Filed: September 7, 2018
    Publication date: March 12, 2020
    Inventors: SRIDAR KANDASWAMY, BOB MELANDER
  • Publication number: 20200076851
    Abstract: A method and apparatus for dynamic integration of a covert namespace are provided. A Software-Defined Networking (SDN) controller is configured to send a request for workload transfer to an endpoint where the endpoint is connected to a virtual switch. The SDN controller determines that a connection between the endpoint and the virtual switch is secure based on a tenant-specific policy associated with the endpoint. A first covert namespace is configured to be connected between the endpoint and the virtual switch to communicate to the endpoint and the virtual switch directly. The operations of the virtual switch are executed using the first covert namespace according to the tenant-specific policy. A workload is caused to be transmitted to the endpoint through the first covert namespace.
    Type: Application
    Filed: August 29, 2018
    Publication date: March 5, 2020
    Inventors: Ralf Rantzau, Rajath Agasthya, Sebastian Jeuk, Sridar Kandaswamy
  • Patent number: 9225605
    Abstract: Embodiments generally provide techniques for mapping service modules on a network device. Embodiments identify a plurality of service modules, each configured to perform a respective service. A first one of the plurality of service modules is mapped to a first one of a plurality of virtual switches on the network device. Service policy information for a plurality of virtual switches is retrieved. The service policy information is indicative of service requirements for each of the plurality of virtual switches. Upon detecting an occurrence of a predefined event, embodiments determine a second one of the plurality of virtual switches to map the first service module to, based on the service policy information. The first service module is then mapped to the second virtual switch.
    Type: Grant
    Filed: November 19, 2012
    Date of Patent: December 29, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Rajasekhar Manam, Venkata Naga Ramesh Ponnapalli, Sridar Kandaswamy
  • Patent number: 9148367
    Abstract: A method is provided in one example and includes receiving a first packet of a connection between a client and a server. The first packet is tagged with a tag comprising a member id of a service node in a service cluster that includes a plurality of nodes having distinct member ids. The method can also include mapping the member id to the service node in a tag-to-node map; receiving a second packet of the connection, where the second packet is tagged with the tag comprising the member id; determining the service node from the tag-to-node map; and forwarding the second packet to the service node.
    Type: Grant
    Filed: October 2, 2012
    Date of Patent: September 29, 2015
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Sridar Kandaswamy, Rajasekhar Manam, Ramesh V. N. Ponnapalli
  • Publication number: 20140140221
    Abstract: Embodiments generally provide techniques for mapping service modules on a network device. Embodiments identify a plurality of service modules, each configured to perform a respective service. A first one of the plurality of service modules is mapped to a first one of a plurality of virtual switches on the network device. Service policy information for a plurality of virtual switches is retrieved. The service policy information is indicative of service requirements for each of the plurality of virtual switches. Upon detecting an occurrence of a predefined event, embodiments determine a second one of the plurality of virtual switches to map the first service module to, based on the service policy information. The first service module is then mapped to the second virtual switch.
    Type: Application
    Filed: November 19, 2012
    Publication date: May 22, 2014
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Rajasekhar Manam, Venkata Naga Ramesh Ponnapalli, Sridar Kandaswamy
  • Publication number: 20140092906
    Abstract: A method is provided in one example and includes receiving a first packet of a connection between a client and a server. The first packet is tagged with a tag comprising a member id of a service node in a service cluster that includes a plurality of nodes having distinct member ids. The method can also include mapping the member id to the service node in a tag-to-node map; receiving a second packet of the connection, where the second packet is tagged with the tag comprising the member id; determining the service node from the tag-to-node map; and forwarding the second packet to the service node.
    Type: Application
    Filed: October 2, 2012
    Publication date: April 3, 2014
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Sridar Kandaswamy, Rajasekhar Manam, Ramesh V.N. Ponnapalli
  • Patent number: 8301786
    Abstract: Network devices, computer-readable media, and other embodiments associated with packet inspection are described. Packet inspection may be performed on data packets associated with a session, where a session can include multiple data channels and associated control channels that have been bound together. A session may be associated with an identity. Various policies may be associated with that identity. As packet inspection occurs, it can be determined whether policies are being violated on a per identity basis. If a policy is being violated, then an action may be selectively performed. The action performed may affect a single channel in the session or may affect the whole session. Different identities may have different policies. Example actions include dropping a session, throttling a session, monitoring a session, controlling the number of channels associated with a session, dropping a channel, throttling a channel, monitoring a channel, and other actions.
    Type: Grant
    Filed: February 10, 2010
    Date of Patent: October 30, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Praveenkumar Reguraman, Rajasekhar Manam, Sridar Kandaswamy, Abhijit V. Warkhedi
  • Patent number: 8271775
    Abstract: Systems, methods, and other embodiments associated with layer two (L2) encryption for data center interconnectivity are described. One example system includes a receive logic to receive an unencrypted L2 switched frame (UL2SF). The UL2SF may include a payload and an L2 header. The example system may also include an encryption logic to selectively encrypt the UL2SF into an encrypted frame if the UL2SF is to be sent through an L2 virtual private network (L2VPN) requiring encryption. The example system may also include a delivery logic that adds a header to the encrypted frame. The header may include data to identify a decryption function to decrypt the encrypted frame and routing information for the encrypted frame. The delivery logic may also provide the encrypted frame to the L2VPN, where the providing includes selectively sending the encrypted frame as one of, a point to point packet, and a multipoint packet.
    Type: Grant
    Filed: December 17, 2008
    Date of Patent: September 18, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Sudhakar Shenoy, Khalil Jabr, Sridar Kandaswamy, Madhusudanan Manohar, Sandeep Hebbani
  • Publication number: 20110196971
    Abstract: Network devices, computer-readable media, and other embodiments associated with packet inspection are described. Packet inspection may be performed on data packets associated with a session, where a session can include multiple data channels and associated control channels that have been bound together. A session may be associated with an identity. Various policies may be associated with that identity. As packet inspection occurs, it can be determined whether policies are being violated on a per identity basis. If a policy is being violated, then an action may be selectively performed. The action performed may affect a single channel in the session or may affect the whole session. Different identities may have different policies. Example actions include dropping a session, throttling a session, monitoring a session, controlling the number of channels associated with a session, dropping a channel, throttling a channel, monitoring a channel, and other actions.
    Type: Application
    Filed: February 10, 2010
    Publication date: August 11, 2011
    Inventors: PRAVEENKUMAR REGURAMAN, Rajasekhar Manam, Sridar Kandaswamy, Abhijit V. Warkhedi
  • Publication number: 20100153701
    Abstract: Systems, methods, and other embodiments associated with layer two (L2) encryption for data center interconnectivity are described. One example system includes a receive logic to receive an unencrypted L2 switched frame (UL2SF). The UL2SF may include a payload and an L2 header. The example system may also include an encryption logic to selectively encrypt the UL2SF into an encrypted frame if the UL2SF is to be sent through an L2 virtual private network (L2VPN) requiring encryption. The example system may also include a delivery logic that adds a header to the encrypted frame. The header may include data to identify a decryption function to decrypt the encrypted frame and routing information for the encrypted frame. The delivery logic may also provide the encrypted frame to the L2VPN, where the providing includes selectively sending the encrypted frame as one of, a point to point packet, and a multipoint packet.
    Type: Application
    Filed: December 17, 2008
    Publication date: June 17, 2010
    Inventors: Sudhakar Shenoy, Khalil Jabr, Sridar Kandaswamy, Madhusudanan Manohar, Sandeep Hebbani