1
Shimon Muller, Ariel Hendel, Louise Yeung, Leo Hejza, Shree Murthy: Hardware-assisted central processing unit access to a forwarding database. Sun Microsystems, Blakely Sokoloff Taylor & Zafman, June 1, 1999: US05909686 (356 worldwide citation)

A method and apparatus for providing hardware-assisted CPU access to a forwarding database is described. According to one aspect of the present invention, a switch fabric provides access to a forwarding database on behalf of a processor. The switch fabric includes a memory access interface configure ...


2
Ariel Hendel, Leo A Hejza, Shree Murthy, Louise Yeung: System and method for a multi-layer network element. Sun Microsystems, Blakely Sokoloff Taylor & Zafman, July 11, 2000: US06088356 (203 worldwide citation)

A multi-layer network element for forwarding received packets from an input port to one or more output ports. The packet is examined to look for first and second forwarding information. A packet is also assigned to a class and provided with default packet forwarding information. An associative memor ...


3
Don Hoffman, Shree Murthy, Asad Khamisy: System and method for a quality of service in a multi-layer network element. Sun Microsystems, Blakely Sokoloff Taylor & Zafman, July 25, 2000: US06094435 (164 worldwide citation)

A multi-layer network element for forwarding received packets from an input port to one or more output ports with quality of service. When output queues exceed or meet a threshold value below the queue's capacity packets are ramdomly discarded. When the queue becomes full, the network element determ ...


4
Ariel Hendel, Leo A Hejza, Shree Murthy: System and method for a multi-layer network element. Sun Microsystems, Blakely Sokoloff Taylor & Zafman, June 27, 2000: US06081522 (124 worldwide citation)

A multi-layer network element for forwarding received packets from an input port to one or more output ports. The packet is examined to look for different types of forwarding information. An associative memory is searched once for each type of information. The results from the two searches are combi ...


5
William T Zaumen, Donald L Hoffman, Shree Murthy: Management of entries in a network element forwarding memory. Sun Microsystems, Blakely Sokoloff Taylor & Zafman, September 12, 2000: US06118760 (47 worldwide citation)

The invention generally provides for a network element and methods in the network element for allowing a matching entry in a forwarding memory to be found in a single search of the memory, for determining when an entry should be placed in the memory, and for determining when an entry should be remov ...


6
Rajiv Asati, Mohamed Khalid, Sunil Cherukuri, Kenneth A Durazzo, Shree Murthy: Integrating service insertion architecture and virtual private network. Cisco Technology, Hickman Palermo Truong Becker Bingham Wong, February 11, 2014: US08650618 (34 worldwide citation)

Apparatus, methods, and other embodiments associated with providing service insertion architecture (SIA) differentiated services in a virtual private network (VPN) environment are described. Embodiments may provision an authentication, authorization, and accounting (AAA) server with user-to-SIA serv ...


7
Kenneth Durazzo, Shree Murthy: Control pool based enterprise policy enabler for controlled cloud access. Futurewei Technologies, Conley Rose P C, Grant Rodolph, Brandt D Howell, October 20, 2015: US09167050 (16 worldwide citation)

A method for controlling access to a Cloud, comprising receiving traffic from an Enterprise user at a gateway, wherein the traffic carries a first key specific to the Enterprise user for use internal to the gateway, replacing the first key with a second key, wherein the second key is a Cloud-negotia ...


8
Robert Andrews, Navindra Yadav, Shree Murthy, Gnanaprakasam Pandian: Method and system for simplified network wide traffic and/or flow monitoring in a data network. Cisco Technology, Cesari and McKenna, Michael R Reinemann, September 28, 2010: US07804832 (13 worldwide citation)

Method and system for providing dynamic network data traffic monitoring including monitoring a data network, detecting a change in the data network, initiating a span session based on the detected change in the data network, and dynamically modifying network configuration based on the detected chang ...


9
Andrew Persaud, Kavitha Kamarthy, Shree Murthy, Scott Fanning, David A McGrew, Thirunavukkarasu Suresh: Security management in a group based environment. Cisco Technology, Edell Shapiro & Finnan, June 3, 2014: US08745384 (12 worldwide citation)

Techniques are provided for securely storing data files in, or retrieving data files from, cloud storage. A data file transmitted to cloud storage from a client in an enterprise computing environment is intercepted by at least one network device. Using security information received from a management ...


10
Robert Andrews, Navindra Yadav, Shree Murthy: Method and system for providing network management based on defining and applying network administrative intents. Cisco Technology, Cesari and McKenna, Michael R Reinemann, May 4, 2010: US07710900 (6 worldwide citation)

Method and system for providing a dynamic network configuration and management based on defining and applying high level administrative intents including retrieving one or more attributes associated with one or more logical groups in a network, determining one or more network policies based on the o ...