-
公开(公告)号:US20210075728A1
公开(公告)日:2021-03-11
申请号:US16567324
申请日:2019-09-11
Applicant: Cisco Technology, Inc.
Inventor: Atri Indiresan , Roberto Mitsuo Kobo , Sanjay Kumar Hooda , Anton Smirnov
IPC: H04L12/803 , H04L12/931 , H04L12/939 , H04L29/12
Abstract: In one embodiment, a method comprises receiving traffic to send from a router to a host in the fabric edge network, wherein the fabric edge network comprises a plurality of switches and an inter-switch link (ISL); and sending the traffic from the router to the host via at least one of the switches based on the downlink connectivity of the host. Sending the traffic from the router to the host is performed without sending the traffic through the ISL. Sending the traffic from the router to the host comprises sending the traffic through the ISL when there is a link failure on a path between the router and the host.
-
公开(公告)号:US20200036610A1
公开(公告)日:2020-01-30
申请号:US16043779
申请日:2018-07-24
Applicant: Cisco Technology, Inc.
Inventor: Atri Indiresan , Linda Tin-Wen Cheng , Melvin Tsai , Peter Geoffrey Jones , Da-Yuan Tung , David John Zacks
IPC: H04L12/26 , H04L12/741 , H04L29/06
Abstract: Presented herein is an exemplified system and method that provides visibility, for traffic analytics, into secured encapsulated packet (e.g., secure VXLAN-GPE packet, a secure metadata-GPE packet or other GPE standards). The exemplified system and method facilitate encryption of traffic in a granular manner that also facilitate the monitoring of said secure traffic in a fabric network in an end-to-end manner throughout the network. Such monitoring can be beneficially used for analytics, performance analysis, and network debugging/troubleshooting.
-
公开(公告)号:US10432578B2
公开(公告)日:2019-10-01
申请号:US15276818
申请日:2016-09-27
Applicant: Cisco Technology, Inc.
Inventor: Sanjay Kumar Hooda , Sandesh Kumar Narappa Bheemanakone , Shivangi Sharma , Atri Indiresan , Kaushik Kumar Dam
Abstract: Client address based forwarding of dynamic host configuration protocol response packets may be provided. First, a first relay agent on a first network device may receive a first discovery message associated with a first client device. The first discovery message may include a first discovery message identifier field comprising a first identifier corresponding to the first client device. The first client device may be associated with a subnet. Then the first relay agent may register, with a map server, the first identifier with an address of the first network device and add a gateway address corresponding to the first relay agent to the first discovery message. Next, the first relay agent may encapsulate the first discovery message and forward the encapsulated first discovery message over a network to a border device.
-
公开(公告)号:US10397141B2
公开(公告)日:2019-08-27
申请号:US15721914
申请日:2017-10-01
Applicant: Cisco Technology, Inc.
Inventor: Sanjay Kumar Hooda , Atri Indiresan , Da-Yuan Tung , Kaushik Kumar Dam , Anand Pulicat Gopalakrishnan
IPC: H04L12/931 , H04L12/24 , H04L12/46 , H04L29/06
Abstract: In one embodiment a network device includes a plurality of ports. The network device is adapted to receive at least one configuring instruction, and adapted, after receipt of any of the at least one configuring instruction, to configure one or more access ports, of the plurality of ports, for endpoint virtual local area network (VLAN) assignment that is in accordance with at least one VLAN assignment algorithm. The at least one VLAN assignment algorithm allows at least two endpoints to be assigned to at least two different respective VLANs of a plurality of VLANs in a network, the at least one VLAN assignment algorithm enabling the at least two endpoints to connect to a same access port of the one or more access ports and provide data which is not VLAN tagged when received at the same access port.
-
公开(公告)号:US10367691B2
公开(公告)日:2019-07-30
申请号:US15461716
申请日:2017-03-17
Applicant: Cisco Technology, Inc.
Inventor: Atri Indiresan , Aniket Ghule , Himanshu Jain , Mariam Zaim
IPC: G06F15/177 , H04L12/24 , H04L12/26
Abstract: Semantic checking of multi-device and protocol configurations based on an extensible rules database for a variety of devices and operating systems may be provided. First, a configuration may be received. Then parent-child hierarchical relationships in the configuration may be determined. Next, a set of rules may be applied to the configuration based upon the determined parent-child hierarchical relationships. A report of errors found and corrective suggestions may then be produced in response to applying the set of rules.
-
公开(公告)号:US09917771B2
公开(公告)日:2018-03-13
申请号:US14820636
申请日:2015-08-07
Applicant: Cisco Technology, Inc.
Inventor: Sanjay Kumar Hooda , Nalinaksh M. Pai , Atri Indiresan
IPC: H04L12/721 , H04L12/751 , H04L12/931 , H04L12/947 , H04L12/933 , H04L29/12
CPC classification number: H04L45/66 , H04L45/02 , H04L49/15 , H04L49/25 , H04L61/2007
Abstract: Methods and systems are provided for virtual expansion of a fabric network edge to include edge network devices. For example, unique virtual Internet Protocol (IP) addresses may be assigned to a plurality of L2 switches, wherein the L2 switches are connected to one or more fabric edge devices in a fabric, and wherein the L2 switches are located outside of the fabric. Next, the unique virtual IP addresses may be announced in an underlay of the fabric.
-
公开(公告)号:US11882060B2
公开(公告)日:2024-01-23
申请号:US18058015
申请日:2022-11-22
Applicant: Cisco Technology, Inc.
Inventor: Riaz Khan , Atri Indiresan , Manas Pati
CPC classification number: H04L49/557 , G06F13/387 , H04L49/15 , H04L49/70 , H04L67/1095 , H04L69/08
Abstract: An embodiment is directed to switchover operations with a mobile virtualized network device in a mobile device. The mobile virtualized hardware switchover operations may be used to selectively and temporarily provide virtualized control-plane operations to the data-plane of a non-redundant network device undergoing an upgrade or a reboot of its control plane. A non-redundant network device may operate hitless, or near hitless, operation even when its control plane is unavailable.
-
公开(公告)号:US11818044B2
公开(公告)日:2023-11-14
申请号:US17377047
申请日:2021-07-15
Applicant: Cisco Technology, Inc.
Inventor: Atri Indiresan , Frank Brockners , Shwetha Subray Bhandari
IPC: H04W72/04 , H04L45/7453 , H04L41/0695 , H04L47/2483 , H04L61/5007
CPC classification number: H04L45/7453 , H04L41/0695 , H04L47/2483 , H04L61/5007
Abstract: This disclosure describes various methods, systems, and devices related to identifying path changes of data flows in a network. An example method includes receiving, at a node, a packet including a first value. The method further includes generating a second value by inputting the first value and one or more node details into a hash function. The method includes replacing the first value with the second value in the packet. The packet including the second value is forwarded by the node.
-
公开(公告)号:US11593144B2
公开(公告)日:2023-02-28
申请号:US17029559
申请日:2020-09-23
Applicant: Cisco Technology, Inc.
Inventor: Riaz Khan , Atri Indiresan , Manas Pati
IPC: G06F9/455 , H04L12/44 , H04L41/12 , G06F8/656 , G06F9/4401 , H04L67/141 , H04L67/00
Abstract: An embodiment is directed to switchover operations with a virtualized network device in a cloud or remote infrastructure. The virtualized hardware switchover operations may be used to selectively and temporarily provide virtualized control-plane operations to the data-plane of a non-redundant network device undergoing an upgrade or a reboot of its control plane. A non-redundant network device may operate hitless, or near hitless, operation even when its control plane is unavailable.
-
公开(公告)号:US11502872B1
公开(公告)日:2022-11-15
申请号:US17481856
申请日:2021-09-22
Applicant: Cisco Technology, Inc.
Inventor: Atri Indiresan , Ramchander Rao Nadipally , Rahul Kachalia
Abstract: Client device blocking may be provided. A switching device may receive data from a first client device. The data may be addressed to a second client device. Then it may be determined that both the first client device and the second client device belong to a protected group. Next, in response to determining that both the first client device and the second client device belong to the protected group, the data may be blocked from being forwarding to the second client device on a network interface of the switching device.
-
-
-
-
-
-
-
-
-