Patents by Inventor Sundar Iyer

Sundar Iyer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10560328
    Abstract: Systems, methods, and computer-readable media for static network policy analysis for a network. In one example, a system obtains a logical model based on configuration data stored in a controller on a software-defined network, the logical model including a declarative representation of respective configurations of objects in the software-defined network, the objects including one or more endpoint groups, bridge domains, contexts, or tenants. The system defines rules representing respective conditions of the objects according to a specification corresponding to the software-defined network, and determines whether the respective configuration of each of the objects in the logical model violates one or more of the rules associated with that object. When the respective configuration of an object in the logical model violates one or more of the rules, the system detects an error in the respective configuration associated with that object.
    Type: Grant
    Filed: July 28, 2017
    Date of Patent: February 11, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Kartik Mohanram, Chandra Nagarajan, Sundar Iyer, Shadab Nazar, Ramana Rao Kompella
  • Patent number: 10554483
    Abstract: Systems, methods, and computer-readable media for performing network assurance in a traditional network. In some examples, a system can collect respective sets of configurations programmed at network devices in a network and, based on the respective sets of configurations, determine a network-wide configuration of the network, the network-wide configuration including virtual local area networks (VLANs), access control lists (ACLs) associated with the VLANs, subnets, and/or a topology. Based on the network-wide configuration of the network, the system can compare the ACLs for each of the VLANs to yield a VLAN consistency check, compare respective configurations of the subnets to yield a subnet consistency check, and perform a topology consistency check based on the topology. Based on the VLAN consistency check, the subnet consistency check, and the topology consistency check, the system can determine whether the respective sets of configurations programmed at the network devices contain a configuration error.
    Type: Grant
    Filed: July 28, 2017
    Date of Patent: February 4, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Chandra Nagarajan, Kartik Mohanram, Sundar Iyer, Ramana Rao Kompella
  • Patent number: 10530658
    Abstract: An information handling system (IHS) includes controller that performs a method of automating acquisition of link local Internet Protocol (IP) network address of servers. Controller acts as Group manager server (GMS) that maintains an inventory of a respective link local Internet Protocol (IP) network address and public key of each server that is addressable over a local area network (LAN). GMS receives an IP network address and credentials associated with a management console that are used to obtain a public key from the management console. GMS transmits to the management console a GMS IP network address and public key associated with the GMS. GMS encrypts the inventory with the public key of the management console to generate an encrypted inventory. GMS transmits the IP network address and the public key of the management console to each server. GMS forwards the encrypted inventory to the management console to enable secure communication.
    Type: Grant
    Filed: May 12, 2017
    Date of Patent: January 7, 2020
    Assignee: Dell Products, L.P.
    Inventors: Sundar Dasar, Rakesh K. Ayolasomyajula, Cyril Jose, Swapnil Keshavrao Patil, Pushkala Iyer, Swathi Prasad Neti, Anoop Kumar Alladi
  • Publication number: 20190384370
    Abstract: Embodiments include an apparatus comprising an execution unit coupled to a memory, a microcode controller, and a hardware controller. The microcode controller is to identify a global power and performance hint in an instruction stream that includes first and second instruction phases to be executed in parallel, identify a local hint based on synchronization dependence in the first instruction phase, and use the first local hint to balance power consumption between the execution unit and the memory during parallel executions of the first and second instruction phases. The hardware controller is to use the global hint to determine an appropriate voltage level of a compute voltage and a frequency of a compute clock signal for the execution unit during the parallel executions of the first and second instruction phases. The first local hint includes a processing rate for the first instruction phase or an indication of the processing rate.
    Type: Application
    Filed: August 30, 2019
    Publication date: December 19, 2019
    Inventors: Jason Seung-Min Kim, Sundar Ramani, Yogesh Bansal, Nitin N. Garegrat, Olivia K. Wu, Mayank Kaushik, Mrinal Iyer, Tom Schebye, Andrew Yang
  • Patent number: 10505817
    Abstract: Aspects of the technology provide solutions for determining a time period (“epoch”) required to monitor or analyze a tenant network. Some implementations of the technology include a process for making automatic epoch determinations, which includes steps for identifying one or more network parameters for a tenant network, analyzing the tenant network using the network parameters to discover one or more configuration settings of the tenant network, and determining a first epoch for the tenant network, the first epoch corresponding with a period of time to complete analysis of the tenant network using the network parameters. In some aspects, the process can further include steps for generating a tenant profile for the tenant network, the tenant profile based on the network parameters, the first epoch, and the one or more configuration settings of the tenant network. Systems and machine-readable media are also provided.
    Type: Grant
    Filed: October 24, 2017
    Date of Patent: December 10, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Chetan Narsude, Gaurav Gupta, Shadab Nazar, Pavan Mamillapalli, Sundar Iyer
  • Patent number: 10505816
    Abstract: Systems, methods, and computer-readable media for performing semantic analysis to identify shadowing events. One or more models of network intents, based at least in part on a priority-ordered listing of rules representing network intents, is received. Each rule comprises a Boolean function of one or more packet characteristics and network fabric conditions, and a corresponding network action. For each given rule of the priority-ordered listing of rules, partial and complete shadowing events are detected based on semantic analysis. The semantic analysis comprises calculating an inverse set that comprises the inverse of the set comprising all rules with a higher or equal priority to the given rule, and then calculating a shadowing parameter that comprises the intersection between the inverse set and the given rule. If the shadowing parameter is equal to zero, a complete shadowing event is detected.
    Type: Grant
    Filed: August 31, 2017
    Date of Patent: December 10, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Kartik Mohanram, Sundar Iyer, Ramana Rao Kompella, Navneet Yadav
  • Patent number: 10498608
    Abstract: Systems, methods, and computer-readable media for discovering a network's topology and health. In some examples, a system can obtain, from at least one of a plurality of controllers on a network, a logical model of the network, the logical model including configurations of one or more objects defined for the network. Based on the logical model, the system can identify a respective location of the plurality of controllers in the network and a plurality of nodes in a fabric of the network. Based on the respective location of the plurality of controllers and plurality of nodes, the system can poll the plurality of controllers and plurality of nodes for respective status information, and determine a health and topology of the network based on the logical model, the respective location, and respective status information.
    Type: Grant
    Filed: October 23, 2017
    Date of Patent: December 3, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Divjyot Sethi, Chandra Nagarajan, Ramana Rao Kompella, Gaurav Gupta, Sundar Iyer
  • Patent number: 10437641
    Abstract: Aspects of the technology provide systems and methods for interleaving a processing task in a network monitoring appliance. A process of the technology could include steps for identifying operators in the network monitoring appliance, wherein the operators are sequentially arranged to form a processing pipeline, determining an epoch for the processing pipeline, wherein the epoch corresponds with a time duration required for a processing task to traverse the pipeline, and determining a time window in which a supplemental processing task can be interleaved into the processing pipeline, wherein the time window is based on the epoch. Machine-readable media are also provided.
    Type: Grant
    Filed: October 27, 2017
    Date of Patent: October 8, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Chetan Narsude, Gaurav Gupta, Azeem Suleman, Shadab Nazar, Pavan Mamillapalli, Sundar Iyer
  • Publication number: 20190222485
    Abstract: Systems, methods, and computer-readable media for emulating a state of a network environment for purposes of re-executing a network assurance appliance in the emulated state of the network environment. In some embodiments, a method can include receiving snapshot data for a network environment corresponding to a specific time in the network environment and including network events occurring in the network environment generated by a network assurance appliance. A state of the network environment at the specific time can be emulated using the snapshot data to create an emulated state of the network environment. Subsequently, the network assurance appliance can be re-executed in the emulated state of the network environment corresponding to the specific time and the network assurance appliance can be debugged outside of the network environment based on re-execution of the network assurance appliance in the emulated state of the network environment.
    Type: Application
    Filed: January 17, 2018
    Publication date: July 18, 2019
    Inventors: Divjyot Sethi, Chandra Nagarajan, Advait Dixit, John Thomas Monk, Gabriel Cheukbun Ng, Ramana Rao Kompella, Sundar Iyer
  • Patent number: 10293949
    Abstract: A control valve includes a slide valve having a slide movable within a channel between a first position and a second position. When the slide is in the second position, the channel is arranged in fluid communication with an outlet line. A pressure regulator is arranged upstream from and in fluid communication with the slide valve and is operably coupled to a fluid source. The pressure regulator includes a flow metering element movable between an open position and a closed position to regulate a flow of fluid and pressure through the control valve in response to a pressure variations within the downstream slide valve.
    Type: Grant
    Filed: March 11, 2016
    Date of Patent: May 21, 2019
    Assignee: GOODRICH CORPORATION
    Inventors: Poly Puthur John, S. Shyam Sundar Iyer, Manjunatha Prabhudevaiah, Tamizhannban Aruldasan Koilpillai
  • Patent number: 10282344
    Abstract: In one example a sensor module comprises at least one sensor and a controller communicatively coupled to the at least one sensor by a communication bus, the controller comprising logic, at least partially including hardware logic, configured to generate a signal to configure the at least one sensor in a notify power state mode and place the signal on a communication bus coupled to the at least one sensor. Other examples may be described.
    Type: Grant
    Filed: June 4, 2015
    Date of Patent: May 7, 2019
    Assignee: INTEL CORPORATION
    Inventors: Sundar Iyer, Rajasekaran Andiappan, Ajaya V. Durg, Kenneth P. Foust, Bruce L. Fleming
  • Publication number: 20180367411
    Abstract: Aspects of the technology provide solutions for determining a time period (“epoch”) required to monitor or analyze a tenant network. Some implementations of the technology include a process for making automatic epoch determinations, which includes steps for identifying one or more network parameters for a tenant network, analyzing the tenant network using the network parameters to discover one or more configuration settings of the tenant network, and determining a first epoch for the tenant network, the first epoch corresponding with a period of time to complete analysis of the tenant network using the network parameters. In some aspects, the process can further include steps for generating a tenant profile for the tenant network, the tenant profile based on the network parameters, the first epoch, and the one or more configuration settings of the tenant network. Systems and machine-readable media are also provided.
    Type: Application
    Filed: October 24, 2017
    Publication date: December 20, 2018
    Inventors: Chetan Narsude, Gaurav Gupta, Shadab Nazar, Pavan Mamillapalli, Sundar Iyer
  • Publication number: 20180365061
    Abstract: Aspects of the technology provide systems and methods for interleaving a processing task in a network monitoring appliance. A process of the technology could include steps for identifying operators in the network monitoring appliance, wherein the operators are sequentially arranged to form a processing pipeline, determining an epoch for the processing pipeline, wherein the epoch corresponds with a time duration required for a processing task to traverse the pipeline, and determining a time window in which a supplemental processing task can be interleaved into the processing pipeline, wherein the time window is based on the epoch. Machine-readable media are also provided.
    Type: Application
    Filed: October 27, 2017
    Publication date: December 20, 2018
    Inventors: Chetan Narsude, Gaurav Gupta, Azeem Suleman, Shadab Nazar, Pavan Mamillapalli, Sundar Iyer
  • Publication number: 20180365095
    Abstract: Systems, methods, and computer-readable media for fault code aggregation across application-centric dimensions. In an example embodiment, a system obtains respective fault codes corresponding to one or more network devices in a network and maps the one or more network devices and/or the respective fault codes to respective logical policy entities defined in a logical policy model of the network, to yield fault code mappings. The system aggregates the one or more of the fault code mappings along respective logical policy dimensions in the network to yield an aggregation of fault codes across respective logical policy dimensions and, based on the aggregation, presents, for each of the respective logical policy dimensions, one or more hardware-level errors along the respective logical policy dimension.
    Type: Application
    Filed: July 28, 2017
    Publication date: December 20, 2018
    Inventors: John Thomas Monk, Kartik Mohanram, Ramana Rao Kompella, Sundar Iyer
  • Publication number: 20180367412
    Abstract: Systems, methods, and computer-readable media for discovering a network's topology and health. In some examples, a system can obtain, from at least one of a plurality of controllers on a network, a logical model of the network, the logical model including configurations of one or more objects defined for the network. Based on the logical model, the system can identify a respective location of the plurality of controllers in the network and a plurality of nodes in a fabric of the network. Based on the respective location of the plurality of controllers and plurality of nodes, the system can poll the plurality of controllers and plurality of nodes for respective status information, and determine a health and topology of the network based on the logical model, the respective location, and respective status information.
    Type: Application
    Filed: October 23, 2017
    Publication date: December 20, 2018
    Inventors: Divjyot Sethi, Chandra Nagarajan, Ramana Rao Kompella, Gaurav Gupta, Sundar Iyer
  • Publication number: 20180367417
    Abstract: Systems, methods, and computer-readable media for receiving one or more models of network intents, comprising a plurality of contracts between providers and consumers, each contract containing entries with priority values. Each contract is flattened into a listing of rules and a new priority value is calculated. The listing of rules encodes the implementation of the contract between the providers and the consumers. Each entry is iterated over and added to a listing of entries if it is not already present. For each rule, the one or more entries associated with the contract from which the rule was flattened are identified, and for each given entry a flat rule comprising the combination of the rule and the entry is generated, wherein a flattened priority is calculated based at least in part on the priority value of the given one of given entry and the priority value of the rule.
    Type: Application
    Filed: August 31, 2017
    Publication date: December 20, 2018
    Inventors: Advait Dixit, Ramana Rao Kompella, Kartik Mohanram, Sundar Iyer, Shadab Nazar, Chandra Nagarajan
  • Publication number: 20180351819
    Abstract: Systems, methods, and computer-readable media for performing semantic analysis to identify shadowing events. One or more models of network intents, based at least in part on a priority-ordered listing of rules representing network intents, is received. Each rule comprises a Boolean function of one or more packet characteristics and network fabric conditions, and a corresponding network action. For each given rule of the priority-ordered listing of rules, partial and complete shadowing events are detected based on semantic analysis. The semantic analysis comprises calculating an inverse set that comprises the inverse of the set comprising all rules with a higher or equal priority to the given rule, and then calculating a shadowing parameter that comprises the intersection between the inverse set and the given rule. If the shadowing parameter is equal to zero, a complete shadowing event is detected.
    Type: Application
    Filed: August 31, 2017
    Publication date: December 6, 2018
    Inventors: Kartik Mohanram, Sundar Iyer, Ramana Rao Kompella, Navneet Yadav
  • Publication number: 20180351791
    Abstract: Systems, methods, and computer-readable media for performing network assurance in a traditional network. In some examples, a system can collect respective sets of configurations programmed at network devices in a network and, based on the respective sets of configurations, determine a network-wide configuration of the network, the network-wide configuration including virtual local area networks (VLANs), access control lists (ACLs) associated with the VLANs, subnets, and/or a topology. Based on the network-wide configuration of the network, the system can compare the ACLs for each of the VLANs to yield a VLAN consistency check, compare respective configurations of the subnets to yield a subnet consistency check, and perform a topology consistency check based on the topology. Based on the VLAN consistency check, the subnet consistency check, and the topology consistency check, the system can determine whether the respective sets of configurations programmed at the network devices contain a configuration error.
    Type: Application
    Filed: July 28, 2017
    Publication date: December 6, 2018
    Inventors: Chandra Nagarajan, Kartik Mohanram, Sundar Iyer, Ramana Rao Kompella
  • Publication number: 20180309629
    Abstract: Systems, methods, and computer-readable media for static network policy analysis for a network. In one example, a system obtains a logical model based on configuration data stored in a controller on a software-defined network, the logical model including a declarative representation of respective configurations of objects in the software-defined network, the objects including one or more endpoint groups, bridge domains, contexts, or tenants. The system defines rules representing respective conditions of the objects according to a specification corresponding to the software-defined network, and determines whether the respective configuration of each of the objects in the logical model violates one or more of the rules associated with that object. When the respective configuration of an object in the logical model violates one or more of the rules, the system detects an error in the respective configuration associated with that object.
    Type: Application
    Filed: July 28, 2017
    Publication date: October 25, 2018
    Inventors: Kartik Mohanram, Chandra Nagarajan, Sundar Iyer, Shadab Nazar, Ramana Rao Kompella
  • Publication number: 20180309640
    Abstract: Systems, methods, and computer-readable media for assurance of quality-of-service configurations in a network. In some examples, a system obtains a logical model of a software-defined network, the logical model including rules specified for the software-defined network, the logical model being based on a schema defining manageable objects and object properties for the software-defined network. The system also obtains, for each node in the software-defined network, a respective hardware model, the respective hardware model including rules rendered at the node based on a respective node-specific representation of the logical model. Based on the logical model and the respective hardware model, the system can perform an equivalency check between the rules in the logical model and the rules in the respective hardware model to determine whether the logical model and the respective hardware model contain configuration inconsistencies.
    Type: Application
    Filed: August 31, 2017
    Publication date: October 25, 2018
    Inventors: Chandra Nagarajan, Kartik Mohanram, Ramana Rao Kompella, Divjyot Sethi, Sundar Iyer