Doddapaneni
Ashok Doddapaneni, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20130246338 | System and method for indexing a capture system - An indexer to index keyword and metadata input to or captured by a network capture device acting on a stream of captured content is described. A keyword is a word, phrase, name, or other alphanumeric term that exists within common textual content such as an email, Microsoft Office document, or similar content. Metadata includes properties describing the network characteristics of the content containing keywords. Examples of network characteristics include, but are not limited to, the source and destination addresses (Internet Protocol (IP) addresses), time and date of the transmission, size and name of the content, and protocol used to transmit the content. Additional descriptive properties may be used to describe the device upon which the content was captured, the user, viewer of the captured content or security settings of the captured content, etc. | 09-19-2013 |
Ashok Babu Doddapaneni, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20140086102 | INTELLIGENT FEEDBACK LOOP TO ITERATIVELY REDUCE INCOMING NETWORK DATA FOR ANALYSIS - A method, apparatus and system related to an intelligent feedback loop to iteratively reduce target packet analysis is disclosed. According to one embodiment, a method of a network traffic monitoring system includes processing a flow data received through an aggregation switch of a network traffic monitoring system in a first stage module of the network traffic monitoring system, filtering the flow data to a target data based on a packet classification in the first stage module, determining that a portion of a target data is an extraneous data based on a content filtering algorithm applied in a data processing system of the network traffic monitoring system, and iteratively removing from the target data the extraneous data based on a feedback loop created between the data processing system and the first stage module of the network traffic monitoring system. | 03-27-2014 |
Kalyan Doddapaneni, Milpitas, CA US
Patent application number | Description | Published |
---|---|---|
20090283904 | FLIPCHIP BUMP PATTERNS FOR EFFICIENT I-MESH POWER DISTRIBUTION SCHEMES - Disclosed is a flipchip scheme where power and ground bumps are arranged in a striped configuration. Specifically, there are a plurality of lines of power bumps, and a plurality of lines of ground bumps. Each line of power bumps is interconnected by a mesh core power bus, and each line of ground bumps is interconnected by a mesh core ground bus. The busses are shorted across the bumps without having to use metal tab extensions. This arrangement provides that: signal routing can be provided between the lines of bumps; and/or the mesh core power busses can be provided as being wider in order to provide improved power mesh performance and/or in order to reduce or eliminate the metal required on the second top-most metal layer. | 11-19-2009 |
20100276816 | SEPARATE PROBE AND BOND REGIONS OF AN INTEGRATED CIRCUIT - Disclosed are a system and method of separate probe and bond regions of an integrated circuit (IC). An IC, an I/O region adjacent to the core region to enable the core region, and a die metal interconnect separating a bond pad area in the I/O region from a probe pad area outside the I/O region of the IC are disclosed. The die metal interconnect may have a length that is greater than the bond pad area length and/or the probe pad area length, and a width that is less than the bond pad area width and/or the probe pad area width. An in-front staggering technique may be used at a die corner of the IC to maintain the bond pad area in the I/O region, and a side staggering technique may be used at the die corner of the IC to maintain the bond pad area in the I/O region. | 11-04-2010 |
Kalyan Doddapaneni, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20090321897 | METHOD AND APPARATUS OF POWER RING POSITIONING TO MINIMIZE CROSSTALK - A method and/or an apparatus of power ring positioning to minimize crosstalk are disclosed. In one embodiment, a method includes generating an array of fingers between a power ring and a die, applying a signal wire between a bond pad of the die and a particular finger of the array of fingers, and applying a shielding wire between an adjacent bond pad and the power ring, such that the shielding wire is longer than the signal wire and does not couple to any of the array of fingers. The shielding wire may be placed between adjacent ones of the signal wire to minimize crosstalk between the adjacent ones of the signal wire. | 12-31-2009 |
Kalyan Doddapaneni, Mountain View, CA US
Patent application number | Description | Published |
---|---|---|
20080320432 | Disabling unused IO resources in platform-based integrated circuits - The present invention is directed to methods for disabling unused IO resources in a platform-based integrated circuit. A slice is received from a vendor. The slice includes an IO circuit unused by a customer. The IO circuit is disabled. For example, when the IO circuit is desired to be tied to a power source, a primary input/output pin of the IO circuit is shorted to a power bus of the IO circuit. When the IO circuit is desired to be tied to a ground source, a primary input/output pin of the IO circuit is shorted to a ground bus of the IO circuit. When the IO circuit is desired to be left floated, a primary input/output pin of the IO circuit is not connected to any bonding pad cell of the slice. Next, the IO circuit is removed from the customer's logic design netlist. The IO circuit is inserted in the vendor's physical design database. | 12-25-2008 |
Krishna Doddapaneni, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20150124590 | VIRTUAL PORT CHANNEL BOUNCE IN OVERLAY NETWORK - Aspects of the subject disclosure relate to methods for detecting a link failure between the first network device and a destination node, receiving a data packet addressed to the destination node, and rewriting encapsulation information of the first data packet. Subsequent to rewriting the encapsulation information of the first data packet, the first data packet is forwarded to a second network device (e.g., using updated address information in the packet header), wherein the second network device is paired with the first network device in the virtual port channel. In certain aspects, systems and computer readable media are also provided. | 05-07-2015 |
20150124821 | SOURCE ADDRESS TRANSLATION IN OVERLAY NETWORKS - Systems, methods, and non-transitory computer-readable storage media for translating source addresses in an overlay network. An access switch in an overlay network, such as a VXLAN, may receive an encapsulated packet from a tunnel endpoint in the overlay network. The encapsulated packet may originate from a host associated with the tunnel endpoint and be encapsulated at the tunnel endpoint with a first source tunnel endpoint address and a destination tunnel endpoint address. The access switch may replace the first source tunnel endpoint address in the encapsulated packet with a second source tunnel endpoint address of the access switch to yield a translated packet. The access switch may then transmit the translated packet towards the destination tunnel endpoint address. | 05-07-2015 |
20150124822 | MANAGING ROUTING INFORMATION FOR TUNNEL ENDPOINTS IN OVERLAY NETWORKS - Systems, methods, and non-transitory computer-readable storage media for managing routing information in overlay networks. A first tunnel endpoint in an overlay network may receive an encapsulated packet from a second tunnel endpoint. The encapsulated packet may have been encapsulated at the second tunnel endpoint based on another packet originating from a source host that is associated with the second tunnel endpoint. The encapsulated packet can include a source host address for the source host and a source tunnel endpoint address for the second tunnel endpoint. The first tunnel endpoint can then update a lookup table based on an association between the source host address and the source tunnel endpoint address. | 05-07-2015 |
20150124826 | NETWORK FABRIC OVERLAY - Disclosed herein are methods of forwarding packets on a network, such as a leaf-spine network having leaf devices and spine devices. The methods may include receiving a packet at an ingress leaf device, and determining based, at least in part, on a header of the packet whether the packet is to be transmitted to a spine device. The methods may further include ascertaining based, at least in part, on a header of the packet whether to perform encapsulation on the packet, encapsulating the packet according to a result of the ascertaining, and then transmitting the packet to a spine device according to a result of the determining. Also disclosed herein are network apparatuses which include a processor and a memory, at least one of the processor or the memory being configured to perform some or all of the foregoing described methods. | 05-07-2015 |
20150127701 | MULTICAST MULTIPATHING IN AN IP OVERLAY NETWORK - The subject technology addresses the need in the art for improving utilization of network bandwidth in a multicast network environment. More specifically, the disclosed technology addresses the need in the art for extending multipathing to tenant multicast traffic in an IP overlay network, which enables the network to fully utilize available bandwidth for multicast traffic. In some examples, nodes in the overlay network may be connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. | 05-07-2015 |
Krishna Doddapaneni, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20080313724 | N-PORT ID VIRTUALIZATION (NPIV) PROXY MODULE, NPIV PROXY SWITCHING SYSTEM AND METHODS - Embodiments of an N-Port ID virtualization (NPIV) proxy module, NPIV proxy switching system, and methods are generally described herein. Other embodiments may be described and claimed. In some embodiments, login requests are distributed over a plurality of available N-ports to allow servers to be functionally coupled to F-ports of a plurality of fiber-channel (FC) switches. Fiber-channel identifiers (FCIDs) are assigned to the servers in response to the logon requests to provide single end-host operations for each of the servers. | 12-18-2008 |
20150124643 | MISCABLING DETECTION PROTOCOL - Systems, methods, and non-transitory computer-readable storage media for a miscabling detection protocol. One or more switches can periodically send miscabling protocol (MCP) packets on non-fabric ports on all configured EPG VLANs. A first switch located at a network fabric receives a miscabling protocol (MCP) packet indicating an identity of an originating switch and a port number of an originating port of the MCP packet via a receiving port on the first switch, wherein the MCP packet is received from an external network connected to the receiving port, and wherein the originating switch and originating port are also located at the network fabric and connected to the external network. Based on the MCP packet, the first switch then detects a loop between the receiving port, the originating port, and the external network. Next, the first switch blocks the receiving port or the originating port in response to detecting the loop. | 05-07-2015 |
Raghuram Doddapaneni, Hyderabad IN
Patent application number | Description | Published |
---|---|---|
20090216874 | MONITORING ASYNCHRONOUS TRANSACTIONS WITHIN SERVICE ORIENTED ARCHITECTURE - A monitoring system is used to monitor extended business transactions comprised of asynchronous messages. Each message may be a request or a response of an application transaction request-response pair and may be identified with a unique identifier. The unique identifier may be used to identify two or more asynchronous messages, where each extended business transaction may be associated with one or more unique identifiers to identify messages that comprise the business transaction. The extended business transactions are completed over an extended period of time and implemented over several different machines which may or may not be in communication with each other are monitored. Alerts are generated when messages of the extended business transaction do not satisfy a threshold or other criteria, such as a time period for occurring. A user interface or other mechanism may be used to configure the transactions and provide information regarding the status of the transactions and alerts generated for uncompleted portions of the transaction. | 08-27-2009 |
Srinivas Naidu Doddapaneni, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20090017790 | SYSTEMS AND METHODS FOR RESTRICTING SERVICE IN MOBILE DEVICES - Systems and methods are described that enable remote restriction of workforce mobile phones, media players, computers and other devices. In particular, systems, apparatus and methods are described that deny or allow connections involving the mobile device based on the content of a preauthorized contact list provided by a business administrator. The connection may be any combination of incoming connection, outgoing connection, voice connection, data connection. The list of preauthorized contacts maybe updated upon receipt of a synchronization command from a business administrator. Access to the list of contacts can be blocked upon receiving a lockdown command from the business administrator. The list of contacts can be destroyed upon receiving a poison pill command from the business administrator. A client is described for controlling use of the mobile device. | 01-15-2009 |
Susruth Doddapaneni, Andhra Pradesh IN
Patent application number | Description | Published |
---|---|---|
20090299827 | Verifying Operator Competence - Systems and methods are disclosed herein for verifying the competence of an operator in a manufacturing facility. In one implementation, for example, an operator competence verifying system comprises one or more input/output (“I/O”) devices configured to receive information from a user and provide information to the user. The system also comprises a processing device, which is configured to enable the user to set up a competence profile of an operator in the manufacturing facility. The processing device is further configured to enable the user to define jobs related to handling sensitive material at multiple material handling stages in the manufacturing facility. Also, the processing device is configured to assign training to the operator as needed to meet industry guidelines. The processing device is also configured to enable the user to define competence levels required at each multiple material handling stage. | 12-03-2009 |