Patents by Inventor Umamaheswararao Karyampudi

Umamaheswararao Karyampudi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10819753
    Abstract: Disclosed are systems, methods, and computer-readable storage media for guaranteeing symmetric bi-directional policy based redirect of traffic flows. A first switch connected to a first endpoint can receive a first data packet transmitted by the first endpoint to a second endpoint connected to a second switch. The first switch can enforce an ingress data policy to the first data packet by applying a hashing algorithm to a Source Internet Protocol (SIP) value and a Destination Internet Protocol (DIP) value of the first data packet, resulting in a hash value of the first data packet. The first switch can then route the first data packet to a first service node based on the hash value of the first data packet.
    Type: Grant
    Filed: September 11, 2019
    Date of Patent: October 27, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Murukanandam Panchalingam, Umamaheswararao Karyampudi, Pirabhu Raman, Sameer Merchant
  • Publication number: 20200136985
    Abstract: Embodiments provide for mitigating priority flow control deadlock in stretch topologies by initializing a plurality of queues in a buffer of a leaf switch at a local cluster of a site having a plurality of clusters, wherein each queue of the plurality of queues corresponds to a respective one cluster of the plurality of clusters; receiving a pause command for no-drop traffic on the leaf switch, the pause command including an internal Class-of-Service (iCoS) identifier associated with a particular cluster of the plurality of cluster and a corresponding queue in the plurality of queues; and in response to determining, based on the iCoS identifier, that the pause command was received from a remote spine switch associated with a different cluster than the local cluster: forwarding the pause command to a local spine switch in the local cluster; and implementing the pause command on the corresponding queue in the buffer.
    Type: Application
    Filed: October 26, 2018
    Publication date: April 30, 2020
    Inventors: Saravanan SAMPATHKUMAR, Ajay K. MODI, Umamaheswararao KARYAMPUDI, Vikas V. PATEL, Gautam VENKATARAMANAN
  • Publication number: 20200014634
    Abstract: An endpoint group (EPG) can be stretched between the sites so that endpoints at different sites can be assigned to the same stretched EPG. Because the sites can use different bridge domains when establishing the stretched EPGs, the first time a site transmits a packet to an endpoint in a different site, the site learns or discovers a path to the destination endpoint. The site can use BGP to identify the site with the host and use a multicast tunnel to reach the site. A unicast tunnel can be used to transmit future packets to the destination endpoint. Additionally, a stretched EPG can be segmented to form a micro-stretched EPG. Filtering criteria can be used to identify a subset of the endpoints in the stretched EPG that are then assigned to the micro-stretched EPG, which can have different policies than the stretched EPG.
    Type: Application
    Filed: October 16, 2018
    Publication date: January 9, 2020
    Inventors: Javed ASGHAR, Sridhar VALLEPALLI, Umamaheswararao KARYAMPUDI, Srinivas KOTAMRAJU
  • Publication number: 20200014636
    Abstract: Embodiments herein describe using translation mappings and security contracts to establish interconnects and policies between switching fabrics at different sites to create a unified fabric. In one embodiment, a multi-site controller can stretch endpoint groups (EPGs) between the sites so that a host or application in a first site can communicate with a host or application in a second site which is assigned to the same stretched EPG, despite the two sites have different namespaces. Further, the shadow EPGs can be formed to facilitate security contracts between EPGs in different sites. Each site can store namespace translation mapping that enable the site to convert namespace information in packets received from a different site into its own namespace values. As a result, independent bridging and routing segments in the various sites can be interconnected as well as providing application accessibility across different fabrics with independent and private namespaces.
    Type: Application
    Filed: October 18, 2018
    Publication date: January 9, 2020
    Inventors: Sridhar VALLEPALLI, Javed ASGHAR, Umamaheswararao KARYAMPUDI, Saad MALIK, Amitkumar V. PATEL
  • Publication number: 20200007591
    Abstract: Disclosed are systems, methods, and computer-readable storage media for guaranteeing symmetric bi-directional policy based redirect of traffic flows. A first switch connected to a first endpoint can receive a first data packet transmitted by the first endpoint to a second endpoint connected to a second switch. The first switch can enforce an ingress data policy to the first data packet by applying a hashing algorithm to a Source Internet Protocol (SIP) value and a Destination Internet Protocol (DIP) value of the first data packet, resulting in a hash value of the first data packet. The first switch can then route the first data packet to a first service node based on the hash value of the first data packet.
    Type: Application
    Filed: September 11, 2019
    Publication date: January 2, 2020
    Inventors: Murukanandam Panchalingam, Umamaheswararao Karyampudi, Pirabhu Raman, Sameer Merchant
  • Publication number: 20190319916
    Abstract: A network device resolves a destination address of an endpoint in an endpoint isolation environment. The network device receives a request for a destination address associated with a destination endpoint. The request originates from an isolated source endpoint. The network device determines whether the destination address is stored on the network device in association with the destination endpoint. Responsive to a determination that the destination address is not stored in association with the destination endpoint, the network device generates a proxy request for the destination address, and sends the proxy request to at least one endpoint attached to the network device. The network device receives a proxy response from the destination endpoint that includes the destination address. The network device stores the destination address in association with the destination endpoint.
    Type: Application
    Filed: June 27, 2019
    Publication date: October 17, 2019
    Inventors: Gautam Venkataramanan, Umamaheswararao Karyampudi, Sundher Narayanaswamy
  • Publication number: 20190297114
    Abstract: Systems, methods, and computer-readable media for on-demand security provisioning using whitelist and blacklist rules. In some examples, a system in a network including a plurality of pods can configure security policies for a first endpoint group (EPG) in a first pod, the security policies including blacklist and whitelist rules defining traffic security enforcement rules for communications between the first EPG and a second EPG in a second pods in the network. The system can assign respective implicit priorities to the one or more security policies based on a respective specificity of each policy, wherein more specific policies are assigned higher priorities than less specific policies. The system can respond to a detected move of a virtual machine associated with the first EPG to a second pod in the network by dynamically provisioning security policies for the first EPG in the second pod and removing security policies from the first pod.
    Type: Application
    Filed: June 21, 2018
    Publication date: September 26, 2019
    Inventors: Murukanandam Panchalingam, Umamaheswararao Karyampudi, Gianluca Mardente, Aram Aghababyan
  • Patent number: 10419496
    Abstract: Disclosed are systems, methods, and computer-readable storage media for guaranteeing symmetric bi-directional policy based redirect of traffic flows. A first switch connected to a first endpoint can receive a first data packet transmitted by the first endpoint to a second endpoint connected to a second switch. The first switch can enforce an ingress data policy to the first data packet by applying a hashing algorithm to a Source Internet Protocol (SIP) value and a Destination Internet Protocol (DIP) value of the first data packet, resulting in a hash value of the first data packet. The first switch can then route the first data packet to a first service node based on the hash value of the first data packet.
    Type: Grant
    Filed: June 17, 2016
    Date of Patent: September 17, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Murukanandam Panchalingam, Umamaheswararao Karyampudi, Pirabhu Raman, Sameer Merchant
  • Patent number: 10382390
    Abstract: A network device resolves a destination address of an endpoint in an endpoint isolation environment. The network device receives a request for a destination address associated with a destination endpoint. The request originates from an isolated source endpoint. The network device determines whether the destination address is stored on the network device in association with the destination endpoint. Responsive to a determination that the destination address is not stored in association with the destination endpoint, the network device generates a proxy request for the destination address, and sends the proxy request to at least one endpoint attached to the network device. The network device receives a proxy response from the destination endpoint that includes the destination address. The network device stores the destination address in association with the destination endpoint.
    Type: Grant
    Filed: September 1, 2017
    Date of Patent: August 13, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Gautam Venkataramanan, Umamaheswararao Karyampudi, Sundher Narayanaswamy
  • Patent number: 10230628
    Abstract: Systems, methods, and computer-readable storage media for executing a copy service. A copy service engine can monitoring network data flow in a network, detect packet data containing a contract defining copy parameters for the execution of a copy service, and determine, based on the contract, when the particular data flow hits a particular network node specified in the contract parameters. When the data flow hits the specified node, the copy service engine can execute the copy service which copies the particular data flow, determines one or more endpoints for sending the copied data flow, and deploys the copies to the one or more endpoints.
    Type: Grant
    Filed: July 22, 2016
    Date of Patent: March 12, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Pavithra Ramaswamy, Umamaheswararao Karyampudi, Murukanandam Panchalingam, Harish Manoharan, Santosh Golecha, Pirabhu Raman
  • Patent number: 10171344
    Abstract: An ingress network device of a network fabric mark packets with source endpoint group information to enable intra-EPG isolation. The ingress network device receives an indication of endpoints associated with an isolated endpoint group that restricts network traffic among members of the isolated endpoint group. The ingress network device receives a packet from a source and detects that the source endpoint belongs to the isolated endpoint group. The ingress network device incorporates source endpoint group information into a header of the packet. The source endpoint group information indicates that the source endpoint belongs to the isolated endpoint group.
    Type: Grant
    Filed: February 2, 2017
    Date of Patent: January 1, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Gautam Venkataramanan, Umamaheswararao Karyampudi
  • Publication number: 20170366506
    Abstract: Disclosed are systems, methods, and computer-readable storage media for guaranteeing symmetric bi-directional policy based redirect of traffic flows. A first switch connected to a first endpoint can receive a first data packet transmitted by the first endpoint to a second endpoint connected to a second switch. The first switch can enforce an ingress data policy to the first data packet by applying a hashing algorithm to a Source Internet Protocol (SIP) value and a Destination Internet Protocol (DIP) value of the first data packet, resulting in a hash value of the first data packet. The first switch can then route the first data packet to a first service node based on the hash value of the first data packet.
    Type: Application
    Filed: June 17, 2016
    Publication date: December 21, 2017
    Inventors: Murukanandam Panchalingam, Umamaheswararao Karyampudi, Pirabhu Raman, Sameer Merchant
  • Publication number: 20170302569
    Abstract: Systems, methods, and computer-readable storage media for executing a copy service. A copy service engine can monitoring network data flow in a network, detect packet data containing a contract defining copy parameters for the execution of a copy service, and determine, based on the contract, when the particular data flow hits a particular network node specified in the contract parameters. When the data flow hits the specified node, the copy service engine can execute the copy service which copies the particular data flow, determines one or more endpoints for sending the copied data flow, and deploys the copies to the one or more endpoints.
    Type: Application
    Filed: July 22, 2016
    Publication date: October 19, 2017
    Inventors: Pavithra Ramaswamy, Umamaheswararao Karyampudi, Murukanandam Panchalingam, Harish Manoharan, Santosh Golecha, Pirabhu Raman