Patents by Inventor Srilatha Tangirala
Srilatha Tangirala has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250217191Abstract: A method for allocating resources of a virtual controller is disclosed. The method comprises: allocating resources of a virtual controller to a first tenant, wherein the first tenant is allocated a first tenant quantity of guaranteed resources of the virtual controller and a second tenant is allocated a second tenant quantity of guaranteed resources of the virtual controller; determining that resources requested by the first tenant are greater than the first tenant quantity of guaranteed resources; determining that the virtual controller has unutilized resources sufficient to at least partially provide additional resources beyond the first tenant quantity of guaranteed resources to the first tenant; and temporarily provisioning the additional resources to the first tenant, wherein the additional resources are greater than the first tenant quantity of guaranteed resources.Type: ApplicationFiled: March 3, 2025Publication date: July 3, 2025Inventors: Xiaohu Wang, Ajeet Pal Singh Gill, Srilatha Tangirala, Nithin Bangalore Raju, Prabahar Radhakrishnan, Vivek Agarwal, Balaji Sundararajan
-
Patent number: 12348492Abstract: Techniques for utilizing a network gateway provisioned in a software-defined network to verify service readiness of one or more security service(s) of a service chain prior to redirecting network traffic along a given data-path to the security service(s). The gateway may be configured to open a specific port on a network device hosting a security service to transmit network policies and/or test network traffic to the security service. The network gateway may host a virtual source and/or a virtual destination and cause the virtual source to send test network traffic through the security service via the port and to the virtual destination. The gateway may then utilize the received test network traffic to determine whether a given security service satisfies a threshold health and/or functionality measurement. Once it is determined that the security service satisfies the thresholds, the gateway may cause network traffic to be redirected to the security service.Type: GrantFiled: March 30, 2023Date of Patent: July 1, 2025Assignee: Cisco Technology, Inc.Inventors: Pritam Baruah, Balaji Sundararajan, Nithin Bangalore Raju, Srilatha Tangirala, Ramakumara Kariyappa
-
Patent number: 12335062Abstract: Techniques for virtualizing tenant transport interfaces configured to implement pertenant network routing attribute differentiation in each tenant overlay of a multisite wide area network (WAN) and share the virtual transport interfaces between multi-tenant edge (MTE) devices providing transport services to tenant devices based on a defined tenant tier model. A Software-Defined Networking (SDN) controller may receive a physical transport interface and/or a device type associated with a tenant device. The SDN controller may determine a virtual transport interface for the tenant device based on a tier associated with the tenant. MTE device(s) may utilize the physical transport interface to establish sessions with other MTE device(s) in the WAN. The virtual transport interface may be utilized by MTE devices to implement and/or enforce network routing attributes when forwarding network traffic associated with the tenant via the sessions established between the MTE devices through the WAN.Type: GrantFiled: March 18, 2024Date of Patent: June 17, 2025Assignee: Cisco Technology, Inc.Inventors: Balaji Sundararajan, Ajeet Pal Singh Gill, Srilatha Tangirala, Nithin Bangalore Raju, Ravi Kiran Chintallapudi, Pradeepan Kannawadi, Ganesh Devendrachar
-
Patent number: 12293224Abstract: A method for allocating resources of a virtual controller is disclosed. The method comprises: allocating resources of a virtual controller to a first tenant, wherein the first tenant is allocated a first tenant quantity of guaranteed resources of the virtual controller and a second tenant is allocated a second tenant quantity of guaranteed resources of the virtual controller; determining that resources requested by the first tenant are greater than the first tenant quantity of guaranteed resources; determining that the virtual controller has unutilized resources sufficient to at least partially provide additional resources beyond the first tenant quantity of guaranteed resources to the first tenant; and temporarily provisioning the additional resources to the first tenant, wherein the additional resources are greater than the first tenant quantity of guaranteed resources.Type: GrantFiled: July 30, 2021Date of Patent: May 6, 2025Assignee: Cisco Technology, Inc.Inventors: Xiaohu Wang, Ajeet Pal Singh Gill, Srilatha Tangirala, Nithin Bangalore Raju, Prabahar Radhakrishnan, Vivek Agarwal, Balaji Sundararajan
-
Publication number: 20250039089Abstract: Techniques for automatically providing per tenant weighted DCMP over shared transport interfaces and automated flow has load balancing are described. The techniques may include onboarding, by an SD-WAN controller, the tenant with a resource profile to a first multi-tenant edge device, where the resource profile defines a traffic allowance per transport interface for the tenant on the first multi-tenant edge device. The SD-WAN controller receives, from the first multi-tenant edge device, information including a first weight per transport interface of the first multi-tenant edge device for the tenant. The SD-WAN controller transmits the information to a second multi-tenant device. The SD-WAN controller receives, from the second multi-tenant edge device, information including a second weight per transport interface of the second multi-tenant edge device, and transmits the information to the first multi-tenant edge device.Type: ApplicationFiled: July 17, 2024Publication date: January 30, 2025Inventors: Ganesh Devendrachar, Ajeet Pal Singh Gill, Balaji Sundararajan, Srilatha Tangirala, Satish Varadarajula, Satyajit Das
-
Publication number: 20250038957Abstract: Disclosed are systems, apparatuses, methods, computer readable medium, and circuits for managing encryption keys in a multi-tenant network edge device. According to at least one example, a method includes: receiving tenant resource information at the multi-tenant network edge device; generating at least one parent encryption key; generating a plurality of child encryption keys; creating a routing connection to a network controller for each tenant in the plurality of tenants; transmitting the at least one parent encryption key and the plurality of child encryption keys to the network controller for distribution to the plurality of tenants; receiving a plurality of advertisements of transport locators from the network controller, wherein each advertisement includes a parent encryption key or a child encryption key; selecting a set of encryption keys from the plurality of advertisements; and forming a secure tunnel.Type: ApplicationFiled: July 27, 2023Publication date: January 30, 2025Inventors: Ajeet Pal Singh Gill, Srilatha Tangirala
-
Publication number: 20250030638Abstract: According to certain embodiments, a method by a network device includes receiving a handshake message for a traffic flow from a Software-Defined Wide-Area Network (SDWAN) and determining, from a traffic policy, whether the traffic flow should be symmetrical. In response to determining from the traffic policy that the traffic flow should be symmetrical, the method further includes performing a flow lookup on the traffic flow to determine if the network device originated the traffic flow. In response to determining that the network device did not originate the traffic flow, the method further includes determining a second network device that originated the traffic flow and sending the handshake message for the traffic flow to the second network device in order to maintain symmetry for the traffic flow.Type: ApplicationFiled: October 7, 2024Publication date: January 23, 2025Inventors: Balaji Sundararajan, Srilatha Tangirala, Ajeet Pal Singh Gill, Vivek Agarwal, Nithin Bangalore Raju
-
Publication number: 20250030737Abstract: Techniques for automatically integrating SD-WAN constructs to security policies are described. The techniques may include defining, by a security cloud provider, a security policy for an entity, the entity represented by a VPN security policy label and the security policy absent source and destination CIDR IP addresses. The security cloud provider notifies an SD-WAN controller of the security policy. The SD-WAN controller maps the VPN security policy label to an IP address pool and a VPN ID. The SD-WAN controller generates an enhanced security policy by automatically adding source and destination CIDR IP addresses to the security policy. The SD-WAN controller deploys the enhanced security policy to an SD-WAN branch router and generates a VPN segment between the SD-WAN branch router and the security cloud provider to establish a common secure internet gateway tunnel for the IP address pool.Type: ApplicationFiled: July 20, 2023Publication date: January 23, 2025Inventors: Srilatha Tangirala, Venkatesh Nataraj, Ambika Basappa Chandrappa, Kartik Katti, Sasi Veera, Balaji Sundararajan
-
Patent number: 12160370Abstract: Route exchange in a plurality of network controller appliances on a per-tenant basis is disclosed. In one aspect, a method includes receiving, from a network management system and at a first network controller appliance, a designation of at least two tenants to be hosted on the first network controller appliance, the first network controller appliance being one of a plurality of network controller appliances in a SD-WAN; sending, from the first network controller appliance to other network controller appliances of the plurality of network controller appliances, a tenant list query message to obtain a corresponding tenant list of each of the other network controller appliances; and receiving a corresponding response from each of the other network controller appliances indicating the corresponding tenant list of each of the other network controller appliances, the corresponding response being used to update the tenant list on the first network controller appliance.Type: GrantFiled: February 9, 2023Date of Patent: December 3, 2024Assignee: Cisco Technology, Inc.Inventors: Srilatha Tangirala, Nithin Bangalore Raju, Ananya Raval, Prabahar Radhakrishnan, Vivek Agarwal, Balaji Sundararajan
-
Patent number: 12132660Abstract: According to certain embodiments, a method by a network device includes receiving a handshake message for a traffic flow from a Software-Defined Wide-Area Network (SDWAN) and determining, from a traffic policy, whether the traffic flow should be symmetrical. In response to determining from the traffic policy that the traffic flow should be symmetrical, the method further includes performing a flow lookup on the traffic flow to determine if the network device originated the traffic flow. In response to determining that the network device did not originate the traffic flow, the method further includes determining a second network device that originated the traffic flow and sending the handshake message for the traffic flow to the second network device in order to maintain symmetry for the traffic flow.Type: GrantFiled: April 12, 2022Date of Patent: October 29, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Balaji Sundararajan, Srilatha Tangirala, Ajeet Pal Singh Gill, Vivek Agarwal, Nithin Bangalore Raju
-
Publication number: 20240333689Abstract: Techniques for utilizing a network gateway provisioned in a software-defined network to verify service readiness of one or more security service(s) of a service chain prior to redirecting network traffic along a given data-path to the security service(s). The gateway may be configured to open a specific port on a network device hosting a security service to transmit network policies and/or test network traffic to the security service. The network gateway may host a virtual source and/or a virtual destination and cause the virtual source to send test network traffic through the security service via the port and to the virtual destination. The gateway may then utilize the received test network traffic to determine whether a given security service satisfies a threshold health and/or functionality measurement. Once it is determined that the security service satisfies the thresholds, the gateway may cause network traffic to be redirected to the security service.Type: ApplicationFiled: March 30, 2023Publication date: October 3, 2024Inventors: Pritam Baruah, Balaji Sundararajan, Nithin Bangalore Raju, Srilatha Tangirala, Ramakumara Kariyappa
-
Patent number: 12068959Abstract: Techniques for automatically providing per tenant weighted DCMP over shared transport interfaces and automated flow has load balancing are described. The techniques may include onboarding the tenant to the local multi-tenant edge device associated with a tenant, where the resource profile defines a traffic allowance per transport interface for the tenant. Local weight per transport interface is applied. Information including local weight per transport interface is transmitted to a remote device via an SD-WAN controller. Information including a remote weight per transport interface of the remote device is received via the SD-WAN controller. Traffic is routed from the tenant based on local weight per transport interface of the local device and remote weight per transport interface of the remote device.Type: GrantFiled: July 24, 2023Date of Patent: August 20, 2024Assignee: Cisco Technology, Inc.Inventors: Ganesh Devendrachar, Ajeet Pal Singh Gill, Balaji Sundararajan, Srilatha Tangirala, Satish Varadarajula, Satyajit Das
-
Publication number: 20240223397Abstract: Techniques for virtualizing tenant transport interfaces configured to implement pertenant network routing attribute differentiation in each tenant overlay of a multisite wide area network (WAN) and share the virtual transport interfaces between multi-tenant edge (MTE) devices providing transport services to tenant devices based on a defined tenant tier model. A Software-Defined Networking (SDN) controller may receive a physical transport interface and/or a device type associated with a tenant device. The SDN controller may determine a virtual transport interface for the tenant device based on a tier associated with the tenant. MTE device(s) may utilize the physical transport interface to establish sessions with other MTE device(s) in the WAN. The virtual transport interface may be utilized by MTE devices to implement and/or enforce network routing attributes when forwarding network traffic associated with the tenant via the sessions established between the MTE devices through the WAN.Type: ApplicationFiled: March 18, 2024Publication date: July 4, 2024Inventors: Balaji Sundararajan, Ajeet Pal Singh Gill, Srilatha Tangirala, Nithin Bangalore Raju, Ravi Kiran Chintallapudi, Pradeepan Kannawadi, Ganesh Devendrachar
-
Publication number: 20240146565Abstract: Techniques for virtualizing tenant transport interfaces configured to implement per-tenant network routing attribute differentiation in each tenant overlay of a multisite wide area network (WAN) and share the virtual transport interfaces between multi-tenant edge (MTE) devices providing transport services to tenant devices based on a defined tenant tier model. A Software-Defined Networking (SDN) controller may receive a physical transport interface and/or a device type associated with a tenant device. The SDN controller may determine a virtual transport interface for the tenant device based on a tier associated with the tenant. MTE device(s) may utilize the physical transport interface to establish sessions with other MTE device(s) in the WAN. The virtual transport interface may be utilized by MTE devices to implement and/or enforce network routing attributes when forwarding network traffic associated with the tenant via the sessions established between the MTE devices through the WAN.Type: ApplicationFiled: November 2, 2022Publication date: May 2, 2024Inventors: Ajeet Pal Singh Gill, Balaji Sundararajan, Srilatha Tangirala, Nithin Bangalore Raju, Ravi Kiran Chintallapudi, Pradeepan Kannawadi, Ganesh Devendrachar
-
Patent number: 11962429Abstract: Techniques for virtualizing tenant transport interfaces configured to implement per-tenant network routing attribute differentiation in each tenant overlay of a multisite wide area network (WAN) and share the virtual transport interfaces between multi-tenant edge (MTE) devices providing transport services to tenant devices based on a defined tenant tier model. A Software-Defined Networking (SDN) controller may receive a physical transport interface and/or a device type associated with a tenant device. The SDN controller may determine a virtual transport interface for the tenant device based on a tier associated with the tenant. MTE device(s) may utilize the physical transport interface to establish sessions with other MTE device(s) in the WAN. The virtual transport interface may be utilized by MTE devices to implement and/or enforce network routing attributes when forwarding network traffic associated with the tenant via the sessions established between the MTE devices through the WAN.Type: GrantFiled: November 2, 2022Date of Patent: April 16, 2024Assignee: Cisco Technology, Inc.Inventors: Balaji Sundararajan, Srilatha Tangirala, Ajeet Pal Singh Gill, Nithin Bangalore Raju, Ravi Kiran Chintallapudi, Pradeepan Kannawadi, Ganesh Devendrachar
-
Publication number: 20240073084Abstract: Techniques and architecture are described for a pull model for obtaining and implementing config changes on network devices are described herein. A user submits intent configuration to the network controller that needs to be delivered to several network sites. The network controller generates a config file. The network controller sends a pull notification message to all network devices that need to retrieve the config file. This pull notification message only contains a corresponding transaction ID for each network device and a location for the network device to use to pull the config file. The network devices may utilize a HTTP REST API exposed by the network controller to obtain the config file from the network controller. The network devices may utilize a REST API exposed by the network controller to reply with statuses of the configuration transaction. The techniques and architecture may be applied to multi-tenant network devices.Type: ApplicationFiled: March 17, 2023Publication date: February 29, 2024Inventors: Bhairav Dutia, Manish Jiwansingh Mehra, Upendar Surabhi, Sharmishtha Upadhyay, Sanjeev Pandurang Tondale, Yanbo Zhang, Yogesh Mittal, Nithin Bangalore Raju, Srilatha Tangirala, Balaji Sundararajan
-
Publication number: 20240015225Abstract: In one embodiment, a method includes onboarding, by an edge router, a first tenant from a network management system and determining, by the edge router, a mapping of a tenant identifier associated with the first tenant to a controller identifier associated with a controller. The method also includes reserving, by the edge router, a port number in a kernel for the first tenant and inserting, by the edge router, the tenant identifier into a first control packet. The method further includes communicating, by the edge router, the first control packet to the controller via an encrypted control connection during a first peering session. The first peering session shares the encrypted control connection with a second peering session.Type: ApplicationFiled: September 25, 2023Publication date: January 11, 2024Inventors: Srilatha Tangirala, Rahul Hardikar, Sheikh Qumruzzaman, Ravi Kiran Chintallapudi, Samir Thoria, Ajeet Pal Singh Gill, Vivek Agarwal
-
Publication number: 20230327994Abstract: According to certain embodiments, a method by a network device includes receiving a handshake message for a traffic flow from a Software-Defined Wide-Area Network (SDWAN) and determining, from a traffic policy, whether the traffic flow should be symmetrical. In response to determining from the traffic policy that the traffic flow should be symmetrical, the method further includes performing a flow lookup on the traffic flow to determine if the network device originated the traffic flow. In response to determining that the network device did not originate the traffic flow, the method further includes determining a second network device that originated the traffic flow and sending the handshake message for the traffic flow to the second network device in order to maintain symmetry for the traffic flow.Type: ApplicationFiled: April 12, 2022Publication date: October 12, 2023Inventors: Balaji Sundararajan, Srilatha Tangirala, Ajeet Pal Singh Gill, Vivek Agarwal, Nithin Bangalore Raju
-
Patent number: 11778038Abstract: In one embodiment, a method includes onboarding, by an edge router, a first tenant from a network management system and determining, by the edge router, a mapping of a tenant identifier associated with the first tenant to a controller identifier associated with a controller. The method also includes reserving, by the edge router, a port number in a kernel for the first tenant and inserting, by the edge router, the tenant identifier into a first control packet. The method further includes communicating, by the edge router, the first control packet to the controller via an encrypted control connection during a first peering session. The first peering session shares the encrypted control connection with a second peering session.Type: GrantFiled: March 31, 2022Date of Patent: October 3, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Srilatha Tangirala, Rahul Hardikar, Sheikh Qumruzzaman, Ravi Kiran Chintallapudi, Samir Thoria, Ajeet Pal Singh Gill, Vivek Agarwal
-
Publication number: 20230188607Abstract: In one embodiment, a method includes onboarding, by an edge router, a first tenant from a network management system and determining, by the edge router, a mapping of a tenant identifier associated with the first tenant to a controller identifier associated with a controller. The method also includes reserving, by the edge router, a port number in a kernel for the first tenant and inserting, by the edge router, the tenant identifier into a first control packet. The method further includes communicating, by the edge router, the first control packet to the controller via an encrypted control connection during a first peering session. The first peering session shares the encrypted control connection with a second peering session.Type: ApplicationFiled: March 31, 2022Publication date: June 15, 2023Inventors: Srilatha Tangirala, Rahul Hardikar, Sheikh Qumruzzaman, Ravi Kiran Chintallapudi, Samir Thoria, Ajeet Pal Singh Gill, Vivek Agarwal