Patents by Inventor Amod Bodas
Amod Bodas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10912088Abstract: Method, systems, and apparatuses are described for wireless communications. More particularly, a wireless station may connect to a wireless network using a first radio frequency (RF) band and detect a signal strength of the first RF band is greater than a roaming threshold. The wireless station may perform a plurality of scans for support by the wireless network of a second RF band in response to the detected signal strength. Each scan may occur when the signal strength of the first RF band is greater than the roaming threshold. The wireless station may selectively connect to the wireless network using the second RF band based at least in part on the scanning and a throughput supported by the wireless network over the second RF band. The first RF band may be a 2.4 GHz band and the second RF band may be a 5 GHz band.Type: GrantFiled: May 31, 2018Date of Patent: February 2, 2021Assignee: QUALCOMM IncorporatedInventors: Srinivas Katar, Amod Bodas, Ramaswamy Venkateshwaran, Farrukh Usmani, Ravi Gidvani, Hang Su
-
Publication number: 20180295624Abstract: Method, systems, and apparatuses are described for wireless communications. More particularly, a wireless station may connect to a wireless network using a first radio frequency (RF) band and detect a signal strength of the first RF band is greater than a roaming threshold. The wireless station may perform a plurality of scans for support by the wireless network of a second RF band in response to the detected signal strength. Each scan may occur when the signal strength of the first RF band is greater than the roaming threshold. The wireless station may selectively connect to the wireless network using the second RF band based at least in part on the scanning and a throughput supported by the wireless network over the second RF band. The first RF band may be a 2.4 GHz band and the second RF band may be a 5 GHz band.Type: ApplicationFiled: May 31, 2018Publication date: October 11, 2018Inventors: Srinivas Katar, Amod Bodas, Ramaswamy Venkateshwaran, Farrukh Usmani, Ravi Gidvani, Hang Su
-
Publication number: 20180199342Abstract: A method, an apparatus, and a computer-readable medium for wireless communication are provided. An apparatus is configured to communicate over a primary channel via a first set of antennas and over the primary via a second set of antennas. The second set of antennas is switched from the primary channel to a secondary channel when the communication over the primary channel is idle. A channel availability checks (CACs) is performed on the secondary channel when the primary channel is idle to determine whether radar signals are detected on the secondary channel.Type: ApplicationFiled: January 9, 2018Publication date: July 12, 2018Inventors: Kapil RAI, Meriam REZK, Mahboobul ALEM, Amod BODAS
-
Patent number: 9992775Abstract: Method, systems, and apparatuses are described for wireless communications. More particularly, a wireless station may connect to a wireless network using a first radio frequency (RF) band and detect a signal strength of the first RF band is greater than a roaming threshold. The wireless station may perform a plurality of scans for support by the wireless network of a second RF band in response to the detected signal strength. Each scan may occur when the signal strength of the first RF band is greater than the roaming threshold. The wireless station may selectively connect to the wireless network using the second RF band based at least in part on the scanning and a throughput supported by the wireless network over the second RF band. The first RF band may be a 2.4 GHz band and the second RF band may be a 5 GHz band.Type: GrantFiled: January 28, 2016Date of Patent: June 5, 2018Assignee: QUALCOMM IncorporatedInventors: Srinivas Katar, Amod Bodas, Ramaswamy Venkateshwaran, Farrukh Usmani, Ravi Gidvani, Hang Su
-
Publication number: 20160227544Abstract: Method, systems, and apparatuses are described for wireless communications. More particularly, a wireless station may connect to a wireless network using a first radio frequency (RF) band and detect a signal strength of the first RF band is greater than a roaming threshold. The wireless station may perform a plurality of scans for support by the wireless network of a second RF band in response to the detected signal strength. Each scan may occur when the signal strength of the first RF band is greater than the roaming threshold. The wireless station may selectively connect to the wireless network using the second RF band based at least in part on the scanning and a throughput supported by the wireless network over the second RF band. The first RF band may be a 2.4 GHz band and the second RF band may be a 5 GHz band.Type: ApplicationFiled: January 28, 2016Publication date: August 4, 2016Inventors: Srinivas Katar, Amod Bodas, Ramaswamy Venkateshwaran, Farrukh Usmani, Ravi Gidvani, Hang Su
-
Publication number: 20160183113Abstract: Mobile devices implement a ranging mechanism that includes a lead responder receiving ranging measurement requests from two different initiators in the same DW cycle. At the beginning of the DW cycle the lead responder broadcasts and/or publishes a channel availability map that includes a list of slots and channels in which to respond to the ranging measurement requests based on a number of ranging operations supported in each slot within the DW cycle and based on an autonomously determined response sequence. If the lead responder responds to all ranging requests by all initiators in a DW cycle, secondary responders can perform ranging in the same or subsequent DW cycles. Upon exhausting all initiators paired with the lead responder, a secondary responder becomes the “active” responder that is chosen based on a prioritization scheme that is universal among the group of devices in the ranging operation.Type: ApplicationFiled: December 23, 2014Publication date: June 23, 2016Inventors: Praveen DUA, Zhifeng CAI, Meghna AGRAWAL, Andrew Mackinnon DAVIDSON, Samir KAPOOR, Amod BODAS
-
Patent number: 7191318Abstract: A copy instruction executed by a functional-level instruction-set computing (FLIC) processor copies a variable-length data block from one resource to another resource through a cross-bar switch. Resources include general-purpose registers, input, output, and execution buffers, DRAM, SRAM, and other memory. A copy-with-validate instruction has an operand pointing to a first rule in an immediate rule table. The first rule controls validation of a first data-item in the data being copied. Validation includes range and equality checking of the data-item. The value of the data-item or the current offset can be written to a register. A format field in the rule indicates the size of the data-item, or the size is read from the data-item for variable-size formats. The current offset is incremented by the size. The next data-item is validated by a next rule, and other rules in the immediate table control validation of other data-items in the data block.Type: GrantFiled: April 7, 2003Date of Patent: March 13, 2007Assignee: Alacritech, Inc.Inventors: Tarun Kumar Tripathy, Millind Mittal, Kaushik L. Popat, Amod Bodas
-
Patent number: 7093099Abstract: A processor natively executes lookup instructions. The lookup instruction is decoded to determine which general-purpose register (GPR) contains a pointer to a lookup key in a buffer. A variable-length key is read from the buffer and hashed to generate an index into a first-level cache and a hashed tag. An address of a bucket of entries for the index is generated and tags from these entries are read and compared to the hashed tag. When an entry matches the hashed tag, a second-level entry is read. A stored key from the second-level entry is compared to the input key to determine a match. The addresses of the matching second-level and first-level entries are written to GPR's specified by operands decoded from the lookup instruction. When the key or entry data is long, the second-level entry also contains a pointer to a key extension or data extension in a third-level cache.Type: GrantFiled: April 2, 2003Date of Patent: August 15, 2006Assignee: Alacritech, Inc.Inventors: Amod Bodas, Tarun Kumar Tripathy, Mehul Kharidia, Millind Mittal, J. Sukarno Mertoguno
-
Publication number: 20040117600Abstract: A processor natively executes lookup instructions. The lookup instruction is decoded to determine which general-purpose register (GPR) contains a pointer to a lookup key in a buffer. A variable-length key is read from the buffer and hashed to generate an index into a first-level cache and a hashed tag. An address of a bucket of entries for the index is generated and tags from these entries are read and compared to the hashed tag. When an entry matches the hashed tag, a second-level entry is read. A stored key from the second-level entry is compared to the input key to determine a match. The addresses of the matching second-level and first-level entries are written to GPR's specified by operands decoded from the lookup instruction. When the key or entry data is long, the second-level entry also contains a pointer to a key extension or data extension in a third-level cache.Type: ApplicationFiled: April 2, 2003Publication date: June 17, 2004Applicant: NEXSIL COMMUNICATIONS, INC.Inventors: Amod Bodas, Tarun Kumar Tripathy, Mehul Kharidia, Millind Mittal, J. Sukarno Mertoguno
-
Publication number: 20040117602Abstract: A copy instruction executed by a functional-level instruction-set computing (FLIC) processor copies a variable-length data block from one resource to another resource through a cross-bar switch. Resources include general-purpose registers, input, output, and execution buffers, DRAM, SRAM, and other memory. A copy-with-validate instruction has an operand pointing to a first rule in an immediate rule table. The first rule controls validation of a first data-item in the data being copied. Validation includes range and equality checking of the data-item. The value of the data-item or the current offset can be written to a register. A format field in the rule indicates the size of the data-item, or the size is read from the data-item for variable-size formats. The current offset is incremented by the size. The next data-item is validated by a next rule, and other rules in the immediate table control validation of other data-items in the data block.Type: ApplicationFiled: April 7, 2003Publication date: June 17, 2004Applicant: NEXSIL COMMUNICATIONS, INC.Inventors: Tarun Kumar Tripathy, Millind Mittal, Kaushik L. Popat, Amod Bodas
-
Patent number: 6442682Abstract: An apparatus and a method manage data stored on one or more data storage devices using an adaptive file system by characterizing the data on the data storage devices managed by the file system; and tuning the file system by selecting one or more options to configure a kernel during boot-up and an operating system during mount time.Type: GrantFiled: February 18, 1999Date of Patent: August 27, 2002Assignee: Auspex Systems, Inc.Inventors: Srinivas Pothapragada, Lakshman Narayanaswamy, Bhimsen Bhanjois, Amod Bodas, John S. Coviello