Patents by Inventor Sujata Banerjee

Sujata Banerjee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240097970
    Abstract: Some embodiments provide a method for identifying root causes of incidents within a network. The method receives a graph of a portion of the network related to a particular network entity for which an incident is reported. The graph specifies dependencies between neighboring network entities in the network. The method uses probabilistic analysis to determine, for each network entity of a set of network entities represented in the graph, whether adjusting a set of metrics of the entity affects one or more metrics of the particular network entity that have been diagnosed as indicative of a problem. The method reports a subset of the network entities with metrics that affect the one or more metrics of the particular network entity as potential root causes of the incident.
    Type: Application
    Filed: January 8, 2023
    Publication date: March 21, 2024
    Inventors: Vipul Harsh, Wenxuan Zhou, Radhika Niranjan Mysore, Philip Brighten Godfrey, Sujata Banerjee
  • Publication number: 20240097966
    Abstract: Some embodiments provide a method for evaluating incidents within a network. The method receives notification of a first incident related to a first network entity and a second incident related to a second network entity. In response to the respective notifications of the first and second incidents, the method uses network monitoring data to generate a first component graph of a first portion of the network that includes the first network entity and a second component graph of a second portion of the network that includes the second network entity. The first and second component graphs respectively include first and second sets of network entities related to the first and second network entities according to the network monitoring data. The method uses the first and second component graphs to respectively identify root causes of the first and second incidents.
    Type: Application
    Filed: January 8, 2023
    Publication date: March 21, 2024
    Inventors: Vipul Harsh, Wenxuan Zhou, Radhika Niranjan Mysore, Philip Brighten Godfrey, Sujata Banerjee
  • Publication number: 20240097971
    Abstract: Some embodiments provide a method for reporting potential root causes of incidents within a network. The method identifies a first network entity as a potential root cause of an incident affecting a second network entity. For each network entity of a set of network entities in a dependency chain beginning with the first network entity and ending with the second network entity, the method assigns a label to the network entity based on measured metrics of the network entity. The method uses a state machine that encodes causality between different network entity labels to generate a human-readable explanation for the first network entity causing the incident affecting the second network entity.
    Type: Application
    Filed: January 8, 2023
    Publication date: March 21, 2024
    Applicant: VMware, Inc.
    Inventors: Vipul Harsh, Wenxuan Zhou, Radhika Niranjan Mysore, Philip Brighten Godfrey, Sujata Banerjee
  • Patent number: 11425049
    Abstract: In some implementations, a method includes conducting, by a network device, a query associated with a network function chain comprising a plurality of switches and middleboxes to verify whether a service performed by the network function chain complies with a Service Level Agreement (SLA); computing, by the network device, based on a result of the query, a difference in metric value between an actual performance metric of a packet passing through a path in the network function chain and an expected performance metric of the packet passing through the path; deriving, by the network device, a probability of SLA violation associated with the path based on the difference in metric value; and selectively monitoring, by the network device, a network of network function chains by monitoring the path for passive performance measurements based on the probability of SLA violation.
    Type: Grant
    Filed: November 15, 2019
    Date of Patent: August 23, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Ying Zhang, Wenfei Wu, Sujata Banerjee
  • Patent number: 11190458
    Abstract: The disclosure provides an approach for enabling network functions to be executed in serverless computing environments. One embodiment employs a per-packet architecture, in which the trigger for launching a serverless computing instance is receipt of a packet. In such a case, each received packet is packaged into a request to invoke network function(s) required to process the packet, and a serverless computing environment in turn executes the requested network function(s) as serverless computing instance(s) that process the packet and return a response. Another embodiment employs a per-flow architecture in which the trigger for launching a serverless computing instance is receipt of a packet belonging to a new traffic flow. In such a case, a coordinator identifies (or receives notification of) a received packet that belongs to a new sub-flow and launches a serverless computing instance to process packets of the sub-flow that are redirected to the serverless computing instance.
    Type: Grant
    Filed: November 15, 2017
    Date of Patent: November 30, 2021
    Assignee: VMware, Inc.
    Inventors: Arjun Singhvi, Sujata Banerjee, Mark Peek, Yotam Harchol, Pontus Rydin
  • Patent number: 10992520
    Abstract: Example implementations disclosed herein can be used to generate composite network policy graphs based on multiple network policy graphs input by network users that may have different goals for the network. The resulting composite network policy graph can be used to program a network so that it meets the requirements necessary to achieve the goals of at least some of the network users. In one example implementation, a method can include receiving multiple network policy graphs, generating composite endpoint groups based on relationships between endpoint groups and policy graph sources, generating composite paths based on the relationships between the endpoints and the network policy graphs, generating a composite network policy graph based on the composite endpoint groups and the composite paths, and analyzing the composite network policy graph to determine conflicts or errors.
    Type: Grant
    Filed: November 6, 2014
    Date of Patent: April 27, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Junggun Lee, Chaithan M. Prakash, Charles F. Clark, Dave Lenrow, Yoshio Turner, Sujata Banerjee, Yadi Ma, Joon-Myung Kang, Puneet Sharma
  • Patent number: 10958547
    Abstract: In some examples, a system can verify a network function by inquiring a model using a query language is described. In some examples, the system can include at least a memory and a processor coupled to the memory. The processor can execute instructions stored in the memory to transmit a plurality of packets into at least one network function that is unverifiable; describe the at least one network function using a model comprising a set of match action rules and a state machine; inquire the model using a query language comprising a temporal logic to obtain a query result indicating an expected behavior of the plurality of packets; and verify the at least one network function based on the query result and the expected behavior of the plurality of packets.
    Type: Grant
    Filed: September 9, 2016
    Date of Patent: March 23, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Ying Zhang, Sujata Banerjee, Joon-Myung Kang
  • Publication number: 20200341789
    Abstract: A method for containerized workload scheduling can include monitoring network traffic between a first containerized workload deployed on a node in a virtual computing environment to determine affinities between the first containerized workload and other containerized workloads in the virtual computing environment. The method can further include scheduling, based, at least in part, on the determined affinities between the first containerized workload and the other containerized workloads, execution of a second containerized workload on the node on which the first containerized workload is deployed.
    Type: Application
    Filed: April 25, 2019
    Publication date: October 29, 2020
    Applicant: VMware, Inc.
    Inventors: Aditi Ghag, Pranshu Jain, Yaniv Ben-Itzhak, Sujata Banerjee, Yongzhe Fan
  • Patent number: 10812342
    Abstract: Example method includes: receiving, by a network device in a network, a first network policy and a second network policy configured by a network administrator, wherein the first network policy comprises a first metric and the second network policy comprises a second and different metric; detecting, by the network device, a conflict between the first network policy and the second network policy; determining, by the network device, a relationship between the first metric and the second metric; modifying, by the network device, at least one of the first network policy and the second network policy to resolve the conflict based on the relationship between the first metric and the second metric; and combining, by the network device, the first network policy and the second network policy to generate a composite network policy that is represented on a single policy graph.
    Type: Grant
    Filed: April 28, 2017
    Date of Patent: October 20, 2020
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Joon Myung Kang, Anubhavnidhi Abhashkumar, Sujata Banerjee, Ying Zhang, Wenfei Wu
  • Patent number: 10594574
    Abstract: In some examples, a method includes parsing, by a network device, a section of source code associated with a network function provided by a middlebox in a network; extracting, by the network device, a packet processing slice and a state transition slice from the section of source code; generating, by the network device, a plurality of execution paths from the packet processing slice and the state transition slice; and modeling the middlebox by inserting, by the network device, the plurality of execution paths to a match-action table that describes a packet processing model for the middlebox.
    Type: Grant
    Filed: November 7, 2016
    Date of Patent: March 17, 2020
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Wenfei Wu, Ying Zhang, Sujata Banerjee
  • Publication number: 20200084152
    Abstract: In some implementations, a method includes conducting, by a network device, a query associated with a network function chain comprising a plurality of switches and middleboxes to verify whether a service performed by the network function chain complies with a Service Level Agreement (SLA); computing, by the network device, based on a result of the query, a difference in metric value between an actual performance metric of a packet passing through a path in the network function chain and an expected performance metric of the packet passing through the path; deriving, by the network device, a probability of SLA violation associated with the path based on the difference in metric value; and selectively monitoring, by the network device, a network of network function chains by monitoring the path for passive performance measurements based on the probability of SLA violation.
    Type: Application
    Filed: November 15, 2019
    Publication date: March 12, 2020
    Inventors: Ying Zhang, Wenfei Wu, Sujata Banerjee
  • Patent number: 10567384
    Abstract: Example method includes: receiving, by a network device, a plurality of input policy graphs and a composed policy graph associated with the input policy graphs; dividing the composed policy graph into a plurality of sub-graphs, each sub-graph comprising a plurality of edges and a plurality of source nodes and destination nodes that the edges are connected to; selecting a first subset of sub-graphs that include, as a source node, a disjoint part of an original source EPG for each input policy graph; identifying a second subset within the first subset of sub-graphs that include, as a destination node, a disjoint part of an original destination EPG for the each input policy graph; and verifying whether connectivity in the composed policy graph reflects a corresponding policy in the plurality of input policy graphs for each sub-graph in the second subset.
    Type: Grant
    Filed: August 25, 2017
    Date of Patent: February 18, 2020
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Joon-Myung Kang, Mario Antonio Sanchez, Ying Zhang, Anu Mercian, Raphael Amorim Dantas Leite, Sujata Banerjee
  • Patent number: 10491528
    Abstract: In some implementations, a method includes conducting, by a network device, a query associated with a network function chain comprising a plurality of switches and middleboxes to verify whether a service performed by the network function chain complies with a Service Level Agreement (SLA); computing, by the network device, based on a result of the query, a difference in metric value between an actual performance metric of a packet passing through a path in the network function chain and an expected performance metric of the packet passing through the path; deriving, by the network device, a probability of SLA violation associated with the path based on the difference in metric value; and selectively monitoring, by the network device, a network of network function chains by monitoring the path for passive performance measurements based on the probability of SLA violation.
    Type: Grant
    Filed: October 27, 2016
    Date of Patent: November 26, 2019
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Ying Zhang, Wenfei Wu, Sujata Banerjee
  • Patent number: 10425293
    Abstract: Example implementations disclosed herein can be used to allocate network resources in a software defined network (SDN). In one example implementation, a method can include receiving a plurality of resource allocation proposals from a plurality of controller modules, instructing the controller modules to generate votes for the plurality of resource allocation proposals, and selecting one of the plurality of resource allocation proposals based on the votes to instantiate the selected resource allocation proposal in the SDN.
    Type: Grant
    Filed: July 30, 2014
    Date of Patent: September 24, 2019
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Alvin AuYoung, Yadi Ma, Sujata Banerjee, Junggun Lee, Puneet Sharma, Yoshio Turner
  • Patent number: 10326638
    Abstract: Systems, methods, and computer-readable executable instructions are provided for implementing an energy proportional network architecture. Implementing an energy proportional network architecture can include determining a number of desired network criteria and a desired number of access ports. A number of switches for the energy proportional network architecture can be calculated from the desired number of access ports and the number of desired network criteria. Implementing an energy proportional network architecture can also include using the number of calculated switches to form the energy proportional network.
    Type: Grant
    Filed: October 31, 2011
    Date of Patent: June 18, 2019
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Sujata Banerjee, Joseph P. Chabarek, Puneet Sharma, Jayaram Mudigonda
  • Publication number: 20190149480
    Abstract: The disclosure provides an approach for enabling network functions to be executed in serverless computing environments. One embodiment employs a per-packet architecture, in which the trigger for launching a serverless computing instance is receipt of a packet. In such a case, each received packet is packaged into a request to invoke network function(s) required to process the packet, and a serverless computing environment in turn executes the requested network function(s) as serverless computing instance(s) that process the packet and return a response. Another embodiment employs a per-flow architecture in which the trigger for launching a serverless computing instance is receipt of a packet belonging to a new traffic flow. In such a case, a coordinator identifies (or receives notification of) a received packet that belongs to a new sub-flow and launches a serverless computing instance to process packets of the sub-flow that are redirected to the serverless computing instance.
    Type: Application
    Filed: November 15, 2017
    Publication date: May 16, 2019
    Inventors: Arjun SINGHVI, Sujata BANERJEE, Mark PEEK, Yotam HARCHOL, Pontus RYDIN
  • Publication number: 20190068598
    Abstract: Example method includes: receiving, by a network device, a plurality of input policy graphs and a composed policy graph associated with the input policy graphs; dividing the composed policy graph into a plurality of sub-graphs, each sub-graph comprising a plurality of edges and a plurality of source nodes and destination nodes that the edges are connected to; selecting a first subset of sub-graphs that include, as a source node, a disjoint part of an original source EPG for each input policy graph; identifying a second subset within the first subset of sub-graphs that include, as a destination node, a disjoint part of an original destination EPG for the each input policy graph; and verifying whether connectivity in the composed policy graph reflects a corresponding policy in the plurality of input policy graphs for each sub-graph in the second subset.
    Type: Application
    Filed: August 25, 2017
    Publication date: February 28, 2019
    Inventors: Joon-Myung Kang, Mario Antonio Sanchez, Ying Zhang, Anu Mercian, Raphael Amorim Dantas Leite, Sujata Banerjee
  • Patent number: 10135673
    Abstract: An electronic device has a plurality of environments including respective communication stacks. The environments correspond to respective different user personas. Data associated with the different user personas are communicated in corresponding separate transport flows over the network.
    Type: Grant
    Filed: June 15, 2012
    Date of Patent: November 20, 2018
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Paul T. Congdon, Sujata Banerjee, Ran-Fun Chiu, Kyu Han Kim, James S. Hiscock
  • Publication number: 20180316576
    Abstract: Example method includes: receiving, by a network device in a network, a first network policy and a second network policy configured by a network administrator, wherein the first network policy comprises a first metric and the second network policy comprises a second and different metric; detecting, by the network device, a conflict between the first network policy and the second network policy; determining, by the network device, a relationship between the first metric and the second metric; modifying, by the network device, at least one of the first network policy and the second network policy to resolve the conflict based on the relationship between the first metric and the second metric; and combining, by the network device, the first network policy and the second network policy to generate a composite network policy that is represented on a single policy graph.
    Type: Application
    Filed: April 28, 2017
    Publication date: November 1, 2018
    Inventors: Joon Myung Kang, Anubhavnidhi Abhashkumar, Sujata Banerjee, Ying Zhang, Wenfei Wu
  • Publication number: 20180314957
    Abstract: Example method includes: negotiating, by a network device, a location of a data source for a particular network infrastructure manager; inferring, by the network device, a meta label namespace by analyzing the data source, wherein the meta label namespaces comprises at least a relationship between a plurality of meta labels; inferring, by the network device, a label namespace that is specific to the particular network infrastructure manager from the meta label namespace; converting, by the network device, the label namespace to an abstract label namespace; and aggregating, by the network device, the abstract label namespace into a global label namespace that is applicable across diverse network infrastructures.
    Type: Application
    Filed: April 28, 2017
    Publication date: November 1, 2018
    Inventors: Joon Myung Kang, Kshiteej S. Mahajan, Sujata Banerjee