Patents by Inventor Ganapathy Sundaram
Ganapathy Sundaram has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10069803Abstract: The present invention provides a method of route optimization involving a first mobile device associated with a first home gateway. One embodiment of the method is implemented in a first mobility forwarding entity and includes registering the first mobile device at the first mobility forwarding entity. The first mobile device is registered using a session key included in a registration message transmitted by the first mobile device. The embodiment also includes establishing a secure route between the first mobility forwarding entity and a terminating node using the session key. The secure route bypasses the first home gateway.Type: GrantFiled: December 28, 2015Date of Patent: September 4, 2018Assignee: Alcatel-Lucent USA, INC.Inventors: Ganapathy Sundaram, Violeta Cakulev
-
Patent number: 9635672Abstract: According to an implementation of the present subject matter, systems and methods for scheduling and controlling device-to-device (D2D) communication are described. The method includes receiving device parameters and uplink parameters from a first communication device and at least one second communication device, respectively. Further, based on the device parameters and the uplink parameters, transmission format of a D2D communication link for allowing D2D communication between the first communication device and the at least one second communication device is determined. Further, an uplink transmit grant and an uplink listen grant are transmitted to the first communication device and the at least one second communication device, respectively, based on the determination, wherein the uplink transmit grant and the uplink listen grant indicate at least the transmission format and time of transmission on the D2D communication link to the first communication device and the at least one second communication device.Type: GrantFiled: May 22, 2013Date of Patent: April 25, 2017Assignee: Alcatel LucentInventors: Subramanian Vasudevan, Jialin Zou, Satish Kanugovi, Ganapathy Sundaram
-
Publication number: 20160119297Abstract: The present invention provides a method of route optimization involving a first mobile device associated with a first home gateway. One embodiment of the method is implemented in a first mobility forwarding entity and includes registering the first mobile device at the first mobility forwarding entity. The first mobile device is registered using a session key included in a registration message transmitted by the first mobile device. The embodiment also includes establishing a secure route between the first mobility forwarding entity and a terminating node using the session key. The secure route bypasses the first home gateway.Type: ApplicationFiled: December 28, 2015Publication date: April 28, 2016Inventors: Ganapathy Sundaram, Violeta Cakulev
-
Patent number: 9258696Abstract: The present invention provides a method of route optimization involving a first mobile device associated with a first home gateway. One embodiment of the method is implemented in a first mobility forwarding entity and includes registering the first mobile device at the first mobility forwarding entity. The first mobile device is registered using a session key included in a registration message transmitted by the first mobile device. The embodiment also includes establishing a secure route between the first mobility forwarding entity and a terminating node using the session key. The secure route bypasses the first home gateway.Type: GrantFiled: February 11, 2009Date of Patent: February 9, 2016Assignee: Alcatel-LucentInventors: Ganapathy Sundaram, Violeta Cakulev
-
Publication number: 20150163789Abstract: According to an implementation of the present subject matter, systems and methods for scheduling and controlling device-to-device (D2D) communication are described. The method includes receiving device parameters and uplink parameters from a first communication device and at least one second communication device, respectively. Further, based on the device parameters and the uplink parameters, transmission format of a D2D communication link for allowing D2D communication between the first communication device and the at least one second communication device is determined. Further, an uplink transmit grant and an uplink listen grant are transmitted to the first communication device and the at least one second communication device, respectively, based on the determination, wherein the uplink transmit grant and the uplink listen grant indicate at least the transmission format and time of transmission on the D2D communication link to the first communication device and the at least one second communication device.Type: ApplicationFiled: May 22, 2013Publication date: June 11, 2015Inventors: Subramanian Vasudevan, Jialin Zou, Satish Kanugovi, Ganapathy Sundaram
-
Patent number: 8650619Abstract: An automated method is provided for mutual discovery between a network entity and a client entity that cooperate for providing a service in a machine-to-machine environment. In an embodiment, the network entity receives an identifier in a communication from a server on behalf of the client entity. At some point in time, the network entity receives a communication containing the identifier from the client entity. Before or after receiving the client entity communication, the network entity discovers itself to the client entity. Some time after receiving the client entity communication, the network entity authenticates the client entity, establishes a permanent security association with the client entity, and initiates the service.Type: GrantFiled: August 19, 2010Date of Patent: February 11, 2014Assignee: Alcatel LucentInventors: Ganapathy Sundaram, Semyon B. Mizikovsky, Ioannis Broustis
-
Patent number: 8447968Abstract: The present invention provides a method for encrypting data for transmission over a wireless link. The method includes encrypting at least one block of data, at an air-interface application layer, using an encryption algorithm that receives a cryptosynch as input. The value of the cryptosynch is based on an order of the at least one block of data relative to other blocks of data. The value of the cryptosynch is recoverable by a receiver based on the ordering of the ordering of the blocks of data. The at least one encrypted block of data is transmitted to a receiver that is operable to preserve the order of the at least one block of data relative to the other blocks of data.Type: GrantFiled: October 28, 2005Date of Patent: May 21, 2013Assignee: Alcatel LucentInventors: Sarvar Patel, Ganapathy Sundaram, Ajay Rajkumar
-
Publication number: 20120047558Abstract: An automated method is provided for mutual discovery between a network entity and a client entity that cooperate for providing a service in a machine-to-machine environment. In an embodiment, the network entity receives an identifier in a communication from a server on behalf of the client entity. At some point in time, the network entity receives a communication containing the identifier from the client entity. Before or after receiving the client entity communication, the network entity discovers itself to the client entity. Some time after receiving the client entity communication, the network entity authenticates the client entity, establishes a permanent security association with the client entity, and initiates the service.Type: ApplicationFiled: August 19, 2010Publication date: February 23, 2012Inventors: Ganapathy Sundaram, Semyon B. Mizikovsky, Ioannis Broustis
-
Publication number: 20100202455Abstract: The present invention provides a method of route optimization involving a first mobile device associated with a first home gateway. One embodiment of the method is implemented in a first mobility forwarding entity and includes registering the first mobile device at the first mobility forwarding entity. The first mobile device is registered using a session key included in a registration message transmitted by the first mobile device. The embodiment also includes establishing a secure route between the first mobility forwarding entity and a terminating node using the session key. The secure route bypasses the first home gateway.Type: ApplicationFiled: February 11, 2009Publication date: August 12, 2010Inventors: Ganapathy Sundaram, Violeta Cakulev
-
Publication number: 20080095118Abstract: The packet-forwarding for proxy mobile IP, in accordance with various embodiments, includes registering a mobile access terminal (AT) and a first IP gateway (IPGW) with a home agent (HA) when a wireless communication session is established between the mobile AT and the first IPGW. In various embodiments the method additionally includes transferring context information regarding the mobile AT and a proxy mobile security key obtained by the first IPGW, from the first IPGW to a second IPGW when the mobile AT moves from a first access network to a second access network.Type: ApplicationFiled: October 5, 2007Publication date: April 24, 2008Inventors: Violeta Cakulev, Ajay Rajkumar, Ganapathy Sundaram
-
Publication number: 20070165667Abstract: A multiple mode data communication system and method provides the flexibility to schedule wireless unit transmissions and/or allow the wireless unit to transmit autonomously. In certain embodiments, the wireless units can transmit autonomously and/or use scheduling depending on the data rate, the length of the data packet or the type of data. For example, the wireless units can transmit autonomously at lower data rates and use scheduling at higher data rates. Thus, the multiple mode system enables wireless unit transmissions to be scheduled and/or be transmit autonomously, and wireless units can simultaneously operate in different scheduling and/or autonomous modes.Type: ApplicationFiled: December 27, 2006Publication date: July 19, 2007Inventors: Srinivas Kadaba, Farooq Khan, Eshwar Pittampalli, Ashok Rudrapatna, Ganapathy Sundaram, Subramanian Vasudevan, Yunsong Yang
-
Publication number: 20070101120Abstract: The present invention provides a method for encrypting data for transmission over a wireless link. The method includes encrypting at least one block of data, at an air-interface application layer, using an encryption algorithm that receives a cryptosynch as input. The value of the cryptosynch is based on an order of the at least one block of data relative to other blocks of data. The value of the cryptosynch is recoverable by a receiver based on the ordering of the ordering of the blocks of data. The at least one encrypted block of data is transmitted to a receiver that is operable to preserve the order of the at least one block of data relative to the other blocks of data.Type: ApplicationFiled: October 28, 2005Publication date: May 3, 2007Inventors: Sarvar Patel, Ganapathy Sundaram, Ajay Rajkumar
-
Publication number: 20060285490Abstract: In a wireless network or other communication system, admission of users to the system involves use of a first scheduler, which makes actual scheduling decisions for admitted users, and a second scheduler, which emulates the operation of the first scheduler. The first scheduler is configured to manage access to network resources for users already admitted to the system. The first scheduler is coupled to an admission control module which contains the second scheduler. The second scheduler, also referred to herein as a virtual scheduler, emulates operation of the first scheduler, under an operating scenario involving admission of at least one additional user to the system, in order to generate a performance metric. The performance metric is used to make an admission control decision regarding admission of the at least one additional user to the system.Type: ApplicationFiled: June 20, 2005Publication date: December 21, 2006Inventors: Srinivas Kadaba, Thierry Klein, Kin Leung, Ganapathy Sundaram, Haitao Zheng
-
Publication number: 20060171307Abstract: An apparatus and a method for managing resources for efficient packet data transmission. More specifically, there is provided a method for allocating transmission resources in a base station comprising determining a largest supportable packet size for a highest priority user, wherein the determination is based at least partially on the available modulation types, a total number of codes available for packet transmission, a total amount of available transmission power available for packet transmission, and frame durations supported by a base station.Type: ApplicationFiled: January 28, 2005Publication date: August 3, 2006Inventors: Nandu Gopalakrishnan, Niranjan Joshi, Srinivas Kadaba, Ashok Rudrapatna, Ganapathy Sundaram
-
Publication number: 20060140216Abstract: A wireless communication system (20) includes a wireless network (30) that selectively modifies an aggregation of voice over internet protocol wireless transmissions. In one example, a mobile station geometry provides an indication whether modification of the aggregation is desirable. For example, a mobile station with a better geometry allows for a higher level of aggregation. Another disclosed example includes determining a current cell load condition and increasing the amount of aggregation and the level of aggregation as cell load conditions increase. Another disclosed technique includes staggering the scheduling of aggregated packets to avoid delays at a scheduler. One or more of the disclosed techniques may be used to efficiently transmit voice over internet protocol communications.Type: ApplicationFiled: December 29, 2004Publication date: June 29, 2006Inventors: Niranjan Joshi, Achilles Kogiantis, Ashok Rudrapatna, Ganapathy Sundaram
-
Patent number: 7058946Abstract: In accordance with one embodiment of the invention, a central server system computes a feasible stretch value for use in scheduling the servicing of job requests by a plurality of communication channels. A stretch value provides an indication of the delay experienced by each job request to complete, when the central server processes many jobs concurrently. A processing time is calculated for each job request based on the size of the job request and the bandwidth of the channel. Thereafter, a stretch value is proposed. The server system computes a deadline for each job to be the arrival time of the job request plus the product of the processing time and the proposed stretch value. Thereafter, each job request is scheduled, based on an “earliest deadline first” arrangement.Type: GrantFiled: September 10, 2003Date of Patent: June 6, 2006Assignee: Lucent Technologies Inc.Inventors: Swarup Acharya, Shanmugavelayut Muthukrishnan, Ganapathy Sundaram
-
Publication number: 20060036737Abstract: A communication network includes an overload control algorithm that adapts to changing circumstances. In a disclosed example, an acceptance fraction for each of a plurality of message types depends upon the arrival rates of the message types. As at least one of the arrival rates changes, the acceptance fraction is responsively changed to provide an overload control algorithm that adapts to changes in message traffic.Type: ApplicationFiled: August 13, 2004Publication date: February 16, 2006Inventors: Gopal Kumar, Subhabrata Sen, Ganapathy Sundaram
-
Publication number: 20060028988Abstract: A communication network includes an overload control algorithm that reduces the number of messages that need to be opened, which reduces the computational cost of the overload control algorithm while still accounting for relative priorities among various message classes. In one example, statistical probabilities based upon arrival rate information provide the ability to determine a sufficient number of messages to open to ensure that the number of acceptable messages are processed. Messages exceeding the sufficient number are throttled without opening them. By not opening such messages, the computational cost otherwise associated with opening them is avoided. The statistical information based upon the arrival rate for a plurality of message classes provides a sufficient likelihood that the appropriate number of acceptable messages will be opened so that system performance is not compromised.Type: ApplicationFiled: August 9, 2004Publication date: February 9, 2006Inventors: Gopal Kumar, Aparajita Misra, Ganapathy Sundaram
-
Publication number: 20050096059Abstract: A method of wireless communication. The method includes the step of transmitting at least one message including delay information. This delay information may correspond with a delay length associated with accessing a service through an open loop network. The delay length may include a time interval between a first instant corresponding with a received service request and a second instant corresponding with granting service access. Alternatively, the delay length may comprise a time interval between a first instant corresponding with a received service request generating at a predefined moment in time and a second instant corresponding with granting service access. The delay length may correspond with traffic congestion, channel condition, system loading, processor occupancy, queuing delay, and/or scheduling delay, for example.Type: ApplicationFiled: October 31, 2003Publication date: May 5, 2005Inventors: Frances Jiang, Gopal Kumar, Aparajita Misra, Ganapathy Sundaram
-
Publication number: 20050013303Abstract: A method of transmitting or retransmitting a packet in a communication system. The method includes determining a modulation and coding scheme (MCS) to reduce the packet error rate (PER) for transmission, where the MCS is an aggregate of M redundant packet transmissions as a function of at least one of determined past channel conditions and/or allocated resources, determinable current channel conditions and/or allocated resources, future statistical channel conditions and/or allocated resources, and/or a cost function; and transmitting the packets in the communication system according to the MCS.Type: ApplicationFiled: July 16, 2003Publication date: January 20, 2005Inventors: Nandu Gopalakrishnan, Ganapathy Sundaram