Patents by Inventor Manish Tiwari

Manish Tiwari has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8116275
    Abstract: A technique for wireless network monitoring involves scanning channels using clients instead of access points. An example of a method according to the technique may include, for example, receiving from a wireless access point a command to perform a channel scanning function, listening on a channel associated with the channel scanning function, and sending RF data found on the channel to the wireless access point. Another example of a method according to the technique may include, for example, scanning a first channel, switching from the first channel to a second channel, sending data on the second channel to an access point, switching from the second channel to the first channel, and resuming scanning on the first channel. A system according to the technique may include one or more scanning clients, proxy clients, multi-channel clients, or other clients that are capable of scanning channels in lieu of an access point.
    Type: Grant
    Filed: May 21, 2010
    Date of Patent: February 14, 2012
    Assignee: Trapeze Networks, Inc.
    Inventors: Sudheer Poorna Chandra Matta, Manish Tiwari
  • Patent number: 7995533
    Abstract: A system and method for efficient state transfer in mobile networks provides improved performance by providing seamless transfer of updated reference state information across network access points during mobile node hand-off. This state transfer processing may be used in an Internet Protocol (IP) network and may include seamless transfer of header compression state.
    Type: Grant
    Filed: July 14, 2000
    Date of Patent: August 9, 2011
    Assignee: Spyder Navigations L.L.C.
    Inventors: Rajeev Koodli, Charles E. Perkins, Manish Tiwari
  • Publication number: 20110128858
    Abstract: A technique for wireless network monitoring involves scanning channels using clients instead of access points. An example of a method according to the technique may include, for example, receiving from a wireless access point a command to perform a channel scanning function, listening on a channel associated with the channel scanning function, and sending RF data found on the channel to the wireless access point. Another example of a method according to the technique may include, for example, scanning a first channel, switching from the first channel to a second channel, sending data on the second channel to an access point, switching from the second channel to the first channel, and resuming scanning on the first channel. A system according to the technique may include one or more scanning clients, proxy clients, multi-channel clients, or other clients that are capable of scanning channels in lieu of an access point.
    Type: Application
    Filed: May 21, 2010
    Publication date: June 2, 2011
    Applicants: Trapeze Networks, Inc., Belden Inc.
    Inventors: Sudheer Poorna Chandra Matta, Manish Tiwari
  • Patent number: 7724703
    Abstract: A technique for wireless network monitoring involves scanning channels using clients instead of access points. An example of a method according to the technique may include, for example, receiving from a wireless access point a command to perform a channel scanning function, listening on a channel associated with the channel scanning function, and sending RF data found on the channel to the wireless access point. Another example of a method according to the technique may include, for example, scanning a first channel, switching from the first channel to a second channel, sending data on the second channel to an access point, switching from the second channel to the first channel, and resuming scanning on the first channel. A system according to the technique may include one or more scanning clients, proxy clients, multi-channel clients, or other clients that are capable of scanning channels in lieu of an access point.
    Type: Grant
    Filed: January 14, 2006
    Date of Patent: May 25, 2010
    Assignee: Belden, Inc.
    Inventors: Sudheer Poorna Chandra Matta, Manish Tiwari
  • Publication number: 20090257437
    Abstract: A technique for identity based networking is disclosed. A system according to the technique can include a WAN, a first VLAN, a second VLAN, and a network database. The first VLAN and second VLAN can be coupled to the WAN. The network database can include VLAN information. In operation, a client that is authorized on the second VLAN can attempt to connect to the first VLAN. A switch in the WAN can perform a lookup in the network database and determine that the client is authorized on the second VLAN. Based on this information, the client can be connected to the second VLAN using VLAN tunneling.
    Type: Application
    Filed: June 22, 2009
    Publication date: October 15, 2009
    Applicant: Trapeze Networks, Inc.
    Inventor: Manish Tiwari
  • Patent number: 7551619
    Abstract: A technique for identity based networking is disclosed. A system according to the technique can include a WAN, a first VLAN, a second VLAN, and a network database. The first VLAN and second VLAN can be coupled to the WAN. The network database can include VLAN information. In operation, a client that is authorized on the second VLAN can attempt to connect to the first VLAN. A switch in the WAN can perform a lookup in the network database and determine that the client is authorized on the second VLAN. Based on this information, the client can be connected to the second VLAN using VLAN tunneling.
    Type: Grant
    Filed: April 5, 2006
    Date of Patent: June 23, 2009
    Assignee: Trapeze Networks, Inc.
    Inventor: Manish Tiwari
  • Publication number: 20080151844
    Abstract: A technique for addressing access point (AP) authentication issues involves providing AP fingerprinting. With AP fingerprinting, it becomes relatively difficult to spoof a basic service set ID (bssid) in a domain. Advantageously, wired connectivity is not required for AP authentication when an AP fingerprint is used. In a specific implementation, 802.11 management packets are used to communicate network identity and authentication information for APs.
    Type: Application
    Filed: December 20, 2006
    Publication date: June 26, 2008
    Inventor: Manish Tiwari
  • Publication number: 20070183375
    Abstract: A technique for maintaining network integrity is disclosed. A system according to the technique may include a wired network, a switch, and a wireless access point. The switch can be coupled to the wired network and the wireless access point can be coupled to the switch. The system may further include a forwarding database that stores a mac address for a plurality of devices seen by the switch on the wired network. A method according to the technique may involve detecting identifying information of a device by a wireless access point. The identifying information can be compared with the mac addresses in a forwarding database. If the device is unknown, the unknown device can be classified as rogue and countermeasures can be taken against the rogue device.
    Type: Application
    Filed: February 8, 2006
    Publication date: August 9, 2007
    Inventor: Manish Tiwari
  • Publication number: 20070086378
    Abstract: A technique for wireless network monitoring involves scanning channels using clients instead of access points. An example of a method according to the technique may include, for example, receiving from a wireless access point a command to perform a channel scanning function, listening on a channel associated with the channel scanning function, and sending RF data found on the channel to the wireless access point. Another example of a method according to the technique may include, for example, scanning a first channel, switching from the first channel to a second channel, sending data on the second channel to an access point, switching from the second channel to the first channel, and resuming scanning on the first channel. A system according to the technique may include one or more scanning clients, proxy clients, multi-channel clients, or other clients that are capable of scanning channels in lieu of an access point.
    Type: Application
    Filed: January 14, 2006
    Publication date: April 19, 2007
    Inventors: Sudheer Matta, Manish Tiwari
  • Publication number: 20070086398
    Abstract: A technique for identity based networking is disclosed. A system according to the technique can include a WAN, a first VLAN, a second VLAN, and a network database. The first VLAN and second VLAN can be coupled to the WAN. The network database can include VLAN information. In operation, a client that is authorized on the second VLAN can attempt to connect to the first VLAN. A switch in the WAN can perform a lookup in the network database and determine that the client is authorized on the second VLAN. Based on this information, the client can be connected to the second VLAN using VLAN tunneling.
    Type: Application
    Filed: April 5, 2006
    Publication date: April 19, 2007
    Inventor: Manish Tiwari