Discovering and grouping application endpoints in a network environment
SW Danait, K Ponnuswamy, PJ Lesiak - US Patent 10,797,951, 2020 - Google Patents
An example method for discovering and grouping application endpoints in a network
environment is provided and includes discovering endpoints communicating in a network …
environment is provided and includes discovering endpoints communicating in a network …
Topology explorer
D Sethi, C Nagarajan, RR Kompella, G Gupta… - US Patent …, 2019 - Google Patents
Abstract Systems, methods, and computer-readable media for discovering a network's
topology and health. In some examples, a system can obtain, from at least one of a plurality …
topology and health. In some examples, a system can obtain, from at least one of a plurality …
Policy assurance for service chaining
In some examples, a system obtains a network logical model and, for each node in a
network, a node-level logical, concrete, and hardware model. The system identifies a service …
network, a node-level logical, concrete, and hardware model. The system identifies a service …
Handling controller and node failure scenarios during data collection
C Nagarajan, D Sethi, RR Kompella - US Patent 10,574,513, 2020 - Google Patents
Systems, methods, and computer-readable media for han dling failure scenarios during data
collection and analysis for assurance. In some examples, a system can obtain a logical …
collection and analysis for assurance. In some examples, a system can obtain a logical …
Cross-domain assurance
K Ponnuswamy, AL Wadhwa, FM Gisiger… - US Patent …, 2021 - Google Patents
Abstract Systems, methods, and computer-readable media for providing network assurance
across a network. In some embodiments, network traffic data of a cluster of nodes in a …
across a network. In some embodiments, network traffic data of a cluster of nodes in a …
Anomaly detection and reporting in a network assurance appliance
S Nazar, P Mamillapalli, A Suleman… - US Patent …, 2020 - Google Patents
8010952 B2 8/2011 Datla et al. 2 ()()()/() 24 () 758 A| 9/2009 Pasko et al. 8,073,935 B2
12/2011 Viswanath 2009/0249284 A 1 1 ()/2009 Antosz et al. 8, 103480 B2 1/2012 Korn et …
12/2011 Viswanath 2009/0249284 A 1 1 ()/2009 Antosz et al. 8, 103480 B2 1/2012 Korn et …
Assurance of security rules in a network
A Dixit, N Yadav, N Sharma, RR Kompella… - US Patent …, 2021 - Google Patents
2018-12-12 Assigned to CISCO TECHNOLOGY, INC. reassignment CISCO TECHNOLOGY,
INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS) …
INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS) …
Network policy analysis for networks
C Nagarajan, K Mohanram, S Iyer… - US Patent …, 2020 - Google Patents
Systems, methods, and computer-readable media for per forming network assurance in a
traditional network. In some examples, a system can collect respective sets of configu rations …
traditional network. In some examples, a system can collect respective sets of configu rations …
Shim layer for extracting and prioritizing underlying rules for modeling network intents
Systems, methods, and computer-readable media for receiv ing one or more models of
network intents, comprising a plurality of contracts between providers and consumers, each …
network intents, comprising a plurality of contracts between providers and consumers, each …
Static network policy analysis for networks
K Mohanram, C Nagarajan, S Iyer, S Nazar… - US Patent …, 2020 - Google Patents
Systems, methods, and computer-readable media for static network policy analysis for a
network. In one example, a system obtains a logical model based on configuration data …
network. In one example, a system obtains a logical model based on configuration data …