Patents by Inventor Sundar Iyer

Sundar Iyer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10505817
    Abstract: Aspects of the technology provide solutions for determining a time period (“epoch”) required to monitor or analyze a tenant network. Some implementations of the technology include a process for making automatic epoch determinations, which includes steps for identifying one or more network parameters for a tenant network, analyzing the tenant network using the network parameters to discover one or more configuration settings of the tenant network, and determining a first epoch for the tenant network, the first epoch corresponding with a period of time to complete analysis of the tenant network using the network parameters. In some aspects, the process can further include steps for generating a tenant profile for the tenant network, the tenant profile based on the network parameters, the first epoch, and the one or more configuration settings of the tenant network. Systems and machine-readable media are also provided.
    Type: Grant
    Filed: October 24, 2017
    Date of Patent: December 10, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Chetan Narsude, Gaurav Gupta, Shadab Nazar, Pavan Mamillapalli, Sundar Iyer
  • Patent number: 10505816
    Abstract: Systems, methods, and computer-readable media for performing semantic analysis to identify shadowing events. One or more models of network intents, based at least in part on a priority-ordered listing of rules representing network intents, is received. Each rule comprises a Boolean function of one or more packet characteristics and network fabric conditions, and a corresponding network action. For each given rule of the priority-ordered listing of rules, partial and complete shadowing events are detected based on semantic analysis. The semantic analysis comprises calculating an inverse set that comprises the inverse of the set comprising all rules with a higher or equal priority to the given rule, and then calculating a shadowing parameter that comprises the intersection between the inverse set and the given rule. If the shadowing parameter is equal to zero, a complete shadowing event is detected.
    Type: Grant
    Filed: August 31, 2017
    Date of Patent: December 10, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Kartik Mohanram, Sundar Iyer, Ramana Rao Kompella, Navneet Yadav
  • Patent number: 10498608
    Abstract: Systems, methods, and computer-readable media for discovering a network's topology and health. In some examples, a system can obtain, from at least one of a plurality of controllers on a network, a logical model of the network, the logical model including configurations of one or more objects defined for the network. Based on the logical model, the system can identify a respective location of the plurality of controllers in the network and a plurality of nodes in a fabric of the network. Based on the respective location of the plurality of controllers and plurality of nodes, the system can poll the plurality of controllers and plurality of nodes for respective status information, and determine a health and topology of the network based on the logical model, the respective location, and respective status information.
    Type: Grant
    Filed: October 23, 2017
    Date of Patent: December 3, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Divjyot Sethi, Chandra Nagarajan, Ramana Rao Kompella, Gaurav Gupta, Sundar Iyer
  • Patent number: 10437641
    Abstract: Aspects of the technology provide systems and methods for interleaving a processing task in a network monitoring appliance. A process of the technology could include steps for identifying operators in the network monitoring appliance, wherein the operators are sequentially arranged to form a processing pipeline, determining an epoch for the processing pipeline, wherein the epoch corresponds with a time duration required for a processing task to traverse the pipeline, and determining a time window in which a supplemental processing task can be interleaved into the processing pipeline, wherein the time window is based on the epoch. Machine-readable media are also provided.
    Type: Grant
    Filed: October 27, 2017
    Date of Patent: October 8, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Chetan Narsude, Gaurav Gupta, Azeem Suleman, Shadab Nazar, Pavan Mamillapalli, Sundar Iyer
  • Publication number: 20190222485
    Abstract: Systems, methods, and computer-readable media for emulating a state of a network environment for purposes of re-executing a network assurance appliance in the emulated state of the network environment. In some embodiments, a method can include receiving snapshot data for a network environment corresponding to a specific time in the network environment and including network events occurring in the network environment generated by a network assurance appliance. A state of the network environment at the specific time can be emulated using the snapshot data to create an emulated state of the network environment. Subsequently, the network assurance appliance can be re-executed in the emulated state of the network environment corresponding to the specific time and the network assurance appliance can be debugged outside of the network environment based on re-execution of the network assurance appliance in the emulated state of the network environment.
    Type: Application
    Filed: January 17, 2018
    Publication date: July 18, 2019
    Inventors: Divjyot Sethi, Chandra Nagarajan, Advait Dixit, John Thomas Monk, Gabriel Cheukbun Ng, Ramana Rao Kompella, Sundar Iyer
  • Patent number: 10293949
    Abstract: A control valve includes a slide valve having a slide movable within a channel between a first position and a second position. When the slide is in the second position, the channel is arranged in fluid communication with an outlet line. A pressure regulator is arranged upstream from and in fluid communication with the slide valve and is operably coupled to a fluid source. The pressure regulator includes a flow metering element movable between an open position and a closed position to regulate a flow of fluid and pressure through the control valve in response to a pressure variations within the downstream slide valve.
    Type: Grant
    Filed: March 11, 2016
    Date of Patent: May 21, 2019
    Assignee: GOODRICH CORPORATION
    Inventors: Poly Puthur John, S. Shyam Sundar Iyer, Manjunatha Prabhudevaiah, Tamizhannban Aruldasan Koilpillai
  • Patent number: 10282344
    Abstract: In one example a sensor module comprises at least one sensor and a controller communicatively coupled to the at least one sensor by a communication bus, the controller comprising logic, at least partially including hardware logic, configured to generate a signal to configure the at least one sensor in a notify power state mode and place the signal on a communication bus coupled to the at least one sensor. Other examples may be described.
    Type: Grant
    Filed: June 4, 2015
    Date of Patent: May 7, 2019
    Assignee: INTEL CORPORATION
    Inventors: Sundar Iyer, Rajasekaran Andiappan, Ajaya V. Durg, Kenneth P. Foust, Bruce L. Fleming
  • Publication number: 20180367411
    Abstract: Aspects of the technology provide solutions for determining a time period (“epoch”) required to monitor or analyze a tenant network. Some implementations of the technology include a process for making automatic epoch determinations, which includes steps for identifying one or more network parameters for a tenant network, analyzing the tenant network using the network parameters to discover one or more configuration settings of the tenant network, and determining a first epoch for the tenant network, the first epoch corresponding with a period of time to complete analysis of the tenant network using the network parameters. In some aspects, the process can further include steps for generating a tenant profile for the tenant network, the tenant profile based on the network parameters, the first epoch, and the one or more configuration settings of the tenant network. Systems and machine-readable media are also provided.
    Type: Application
    Filed: October 24, 2017
    Publication date: December 20, 2018
    Inventors: Chetan Narsude, Gaurav Gupta, Shadab Nazar, Pavan Mamillapalli, Sundar Iyer
  • Publication number: 20180365095
    Abstract: Systems, methods, and computer-readable media for fault code aggregation across application-centric dimensions. In an example embodiment, a system obtains respective fault codes corresponding to one or more network devices in a network and maps the one or more network devices and/or the respective fault codes to respective logical policy entities defined in a logical policy model of the network, to yield fault code mappings. The system aggregates the one or more of the fault code mappings along respective logical policy dimensions in the network to yield an aggregation of fault codes across respective logical policy dimensions and, based on the aggregation, presents, for each of the respective logical policy dimensions, one or more hardware-level errors along the respective logical policy dimension.
    Type: Application
    Filed: July 28, 2017
    Publication date: December 20, 2018
    Inventors: John Thomas Monk, Kartik Mohanram, Ramana Rao Kompella, Sundar Iyer
  • Publication number: 20180367417
    Abstract: Systems, methods, and computer-readable media for receiving one or more models of network intents, comprising a plurality of contracts between providers and consumers, each contract containing entries with priority values. Each contract is flattened into a listing of rules and a new priority value is calculated. The listing of rules encodes the implementation of the contract between the providers and the consumers. Each entry is iterated over and added to a listing of entries if it is not already present. For each rule, the one or more entries associated with the contract from which the rule was flattened are identified, and for each given entry a flat rule comprising the combination of the rule and the entry is generated, wherein a flattened priority is calculated based at least in part on the priority value of the given one of given entry and the priority value of the rule.
    Type: Application
    Filed: August 31, 2017
    Publication date: December 20, 2018
    Inventors: Advait Dixit, Ramana Rao Kompella, Kartik Mohanram, Sundar Iyer, Shadab Nazar, Chandra Nagarajan
  • Publication number: 20180367412
    Abstract: Systems, methods, and computer-readable media for discovering a network's topology and health. In some examples, a system can obtain, from at least one of a plurality of controllers on a network, a logical model of the network, the logical model including configurations of one or more objects defined for the network. Based on the logical model, the system can identify a respective location of the plurality of controllers in the network and a plurality of nodes in a fabric of the network. Based on the respective location of the plurality of controllers and plurality of nodes, the system can poll the plurality of controllers and plurality of nodes for respective status information, and determine a health and topology of the network based on the logical model, the respective location, and respective status information.
    Type: Application
    Filed: October 23, 2017
    Publication date: December 20, 2018
    Inventors: Divjyot Sethi, Chandra Nagarajan, Ramana Rao Kompella, Gaurav Gupta, Sundar Iyer
  • Publication number: 20180365061
    Abstract: Aspects of the technology provide systems and methods for interleaving a processing task in a network monitoring appliance. A process of the technology could include steps for identifying operators in the network monitoring appliance, wherein the operators are sequentially arranged to form a processing pipeline, determining an epoch for the processing pipeline, wherein the epoch corresponds with a time duration required for a processing task to traverse the pipeline, and determining a time window in which a supplemental processing task can be interleaved into the processing pipeline, wherein the time window is based on the epoch. Machine-readable media are also provided.
    Type: Application
    Filed: October 27, 2017
    Publication date: December 20, 2018
    Inventors: Chetan Narsude, Gaurav Gupta, Azeem Suleman, Shadab Nazar, Pavan Mamillapalli, Sundar Iyer
  • Publication number: 20180351819
    Abstract: Systems, methods, and computer-readable media for performing semantic analysis to identify shadowing events. One or more models of network intents, based at least in part on a priority-ordered listing of rules representing network intents, is received. Each rule comprises a Boolean function of one or more packet characteristics and network fabric conditions, and a corresponding network action. For each given rule of the priority-ordered listing of rules, partial and complete shadowing events are detected based on semantic analysis. The semantic analysis comprises calculating an inverse set that comprises the inverse of the set comprising all rules with a higher or equal priority to the given rule, and then calculating a shadowing parameter that comprises the intersection between the inverse set and the given rule. If the shadowing parameter is equal to zero, a complete shadowing event is detected.
    Type: Application
    Filed: August 31, 2017
    Publication date: December 6, 2018
    Inventors: Kartik Mohanram, Sundar Iyer, Ramana Rao Kompella, Navneet Yadav
  • Publication number: 20180351791
    Abstract: Systems, methods, and computer-readable media for performing network assurance in a traditional network. In some examples, a system can collect respective sets of configurations programmed at network devices in a network and, based on the respective sets of configurations, determine a network-wide configuration of the network, the network-wide configuration including virtual local area networks (VLANs), access control lists (ACLs) associated with the VLANs, subnets, and/or a topology. Based on the network-wide configuration of the network, the system can compare the ACLs for each of the VLANs to yield a VLAN consistency check, compare respective configurations of the subnets to yield a subnet consistency check, and perform a topology consistency check based on the topology. Based on the VLAN consistency check, the subnet consistency check, and the topology consistency check, the system can determine whether the respective sets of configurations programmed at the network devices contain a configuration error.
    Type: Application
    Filed: July 28, 2017
    Publication date: December 6, 2018
    Inventors: Chandra Nagarajan, Kartik Mohanram, Sundar Iyer, Ramana Rao Kompella
  • Publication number: 20180309640
    Abstract: Systems, methods, and computer-readable media for assurance of quality-of-service configurations in a network. In some examples, a system obtains a logical model of a software-defined network, the logical model including rules specified for the software-defined network, the logical model being based on a schema defining manageable objects and object properties for the software-defined network. The system also obtains, for each node in the software-defined network, a respective hardware model, the respective hardware model including rules rendered at the node based on a respective node-specific representation of the logical model. Based on the logical model and the respective hardware model, the system can perform an equivalency check between the rules in the logical model and the rules in the respective hardware model to determine whether the logical model and the respective hardware model contain configuration inconsistencies.
    Type: Application
    Filed: August 31, 2017
    Publication date: October 25, 2018
    Inventors: Chandra Nagarajan, Kartik Mohanram, Ramana Rao Kompella, Divjyot Sethi, Sundar Iyer
  • Publication number: 20180309629
    Abstract: Systems, methods, and computer-readable media for static network policy analysis for a network. In one example, a system obtains a logical model based on configuration data stored in a controller on a software-defined network, the logical model including a declarative representation of respective configurations of objects in the software-defined network, the objects including one or more endpoint groups, bridge domains, contexts, or tenants. The system defines rules representing respective conditions of the objects according to a specification corresponding to the software-defined network, and determines whether the respective configuration of each of the objects in the logical model violates one or more of the rules associated with that object. When the respective configuration of an object in the logical model violates one or more of the rules, the system detects an error in the respective configuration associated with that object.
    Type: Application
    Filed: July 28, 2017
    Publication date: October 25, 2018
    Inventors: Kartik Mohanram, Chandra Nagarajan, Sundar Iyer, Shadab Nazar, Ramana Rao Kompella
  • Publication number: 20180309632
    Abstract: In some examples, a system obtains a network logical model and, for each node in a network, a node-level logical, concrete, and hardware model. The system identifies a service function chain, and determines a respective set of service function chain rules. For each node, the system determines whether the respective set of service function chain rules is correctly captured in the node-level logical model and/or concrete model to yield a node containment check result. Based on a comparison of policy actions in the concrete model, hardware model, and at least one of the node-level logical model or network logical model, the system determines whether the respective set of service function chain rules is correctly rendered on each node to yield a node rendering check result. Based on the node containment check result and node rendering check result, the system determines whether the service function chain is correctly configured.
    Type: Application
    Filed: August 31, 2017
    Publication date: October 25, 2018
    Inventors: Ramana Rao Kompella, Kartik Mohanram, Advait Dixit, Sundar Iyer
  • Patent number: 10042573
    Abstract: A system and method for designing and constructing hierarchical memory systems is disclosed. A plurality of different algorithmic memory blocks are disclosed. Each algorithmic memory block includes a memory controller that implements a specific storage algorithm and a set of lower level memory components. Each of those lower level memory components may be constructed with another algorithmic memory block or with a fundamental memory block. By organizing algorithmic memory blocks in various different hierarchical organizations, may different complex memory systems that provide new features may be created.
    Type: Grant
    Filed: July 19, 2016
    Date of Patent: August 7, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Sundar Iyer, Shang-Tse Chuang
  • Patent number: 9725177
    Abstract: A pressure control system for an aircraft seat includes a base plate and a plurality of cells attached to the base plate, each cell having a bellows and a top inflatable diaphragm and defines a pressure chamber therein. Charging apertures are formed in the base plate such that each cell has an associated charging aperture such that each charging aperture is in fluid communication with a pressure chamber. Discharging apertures are formed in the base plate such that each cell has an associated discharging aperture such that each discharging apertures is in fluid communication a pressure chamber. A charging valve and a discharging valve is in fluid communication with the pressure chambers and configured to supply or extract air to or from the chambers through the apertures. A pump is configured to supply pressurized air to the at least one charging valve.
    Type: Grant
    Filed: February 23, 2016
    Date of Patent: August 8, 2017
    Assignee: AMI INDUSTRIES, INC.
    Inventors: Poly Puthur John, S. Shyam Sundar Iyer, Manjunatha Prabhudevaiah
  • Publication number: 20170203849
    Abstract: A control valve includes a slide valve having a slide movable within a channel between a first position and a second position. When the slide is in the second position, the channel is arranged in fluid communication with an outlet line. A pressure regulator is arranged upstream from and in fluid communication with the slide valve and is operably coupled to a fluid source. The pressure regulator includes a flow metering element movable between an open position and a closed position to regulate a flow of fluid and pressure through the control valve in response to a pressure variations within the downstream slide valve.
    Type: Application
    Filed: March 11, 2016
    Publication date: July 20, 2017
    Inventors: Poly Puthur John, S. Shyam Sundar Iyer, Manjunatha Prabhudevaiah, Tamizhannban Aruldasan Koilpillai