Patents by Inventor Kevin D. Shatzkamer

Kevin D. Shatzkamer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130279337
    Abstract: In one embodiment, a load balancer receives a message from a tunnel termination gateway (TTG) associated with a mobile device. The load balancer may receive messages from a plurality of TTGs. A gateway node in a plurality of gateway nodes in which to send the message is determined. The load balancer then assigns a NSAPI for use by the gateway node. For example, the NSAPI may be associated with a tunnel that is generated between the TTG and GGSN. The load balancer ensures that the assigned NSAPI is not currently in use at the gateway node. Thus, no overlapping of NSAPIs may occur even though the load balancer is processing messages from multiple TTGs for multiple gateway nodes.
    Type: Application
    Filed: May 29, 2013
    Publication date: October 24, 2013
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Biswaranjan Panda, Kevin D. Shatzkamer, Mark Grayson, Richard Kyle Forster
  • Publication number: 20130232267
    Abstract: A method is provided in one example embodiment that includes aggregating resource availability from a plurality of network elements operating in a network; receiving a request to apply a policy to a network flow propagating in the network; and orchestrating resources to apply the policy to the network flow based on the aggregated resource availability. In more particular embodiments, the policy includes a quality of service for the network flow. In addition, the policy can include relocating subscribers accessing common content from a first gateway to a second gateway. In other instances, the policy includes relocating resources for the network flow.
    Type: Application
    Filed: March 1, 2012
    Publication date: September 5, 2013
    Inventors: Kevin D. Shatzkamer, Eric Hamel, Mark Grayson
  • Publication number: 20130166746
    Abstract: A method is provided in one example embodiment and includes receiving a request for a service for a subscriber at an access gateway; receiving a default subscriber policy and a default service policy at the access gateway; receiving a subscriber policy and a service policy for the service being requested at the access gateway; receiving the service being requested at the access gateway; and communicating the service being requested from the access gateway to the subscriber in response to the request.
    Type: Application
    Filed: December 23, 2011
    Publication date: June 27, 2013
    Inventors: Flemming S. Andreasen, Kevin D. Shatzkamer, Kirk McBean
  • Publication number: 20130163524
    Abstract: A method is provided in one example embodiment that includes receiving a radio signal stream, segmenting the radio signal stream based on a control word in the radio signal stream, mapping the segmented radio signal stream to a service class, transporting the segmented radio signal stream in packets through channels over a backhaul link, and maintaining the order of the radio signal stream over the backhaul link. In more particular embodiments, the backhaul link may use a DOCSIS link, the radio signal stream can be received using a Common Public Radio Interface, and the radio signal stream may include sub-streams transported through segmented channels over the backhaul link.
    Type: Application
    Filed: December 23, 2011
    Publication date: June 27, 2013
    Inventors: Kevin D. Shatzkamer, Ashish Dalela, Monique J. Morrow, Peter Christian Tomsu, Michael P. Hammer, Vojislav Vucetic
  • Publication number: 20130010686
    Abstract: A method is provided in one example embodiment and includes creating a service flow with an endpoint over a wireless link coupled to a backhaul; notifying a mobility anchor of a location associated with the endpoint; relaying control packets between the endpoint and an access gateway; and relaying bearer packets between the endpoint and the mobility anchor, where the bearer packets are exchanged with the endpoint over a locally terminated bearer tunnel and the bearer packets are exchanged with the mobility anchor using Proxy Mobile Internet Protocol.
    Type: Application
    Filed: July 10, 2011
    Publication date: January 10, 2013
    Inventors: Kevin D. Shatzkamer, Eric Hamel, Rajesh S. Pazhyannur, David E. Dukinfield, Mark Grayson
  • Publication number: 20120287784
    Abstract: A method is provided in one example embodiment and includes receiving a request for a service flow over a wireless link, where the request specifies resource requirements; dynamically reserving bandwidth for the resource requirements in a backhaul link; and mapping a packet received over the wireless link to the backhaul link based on an identification element associated with the packet and the service flow.
    Type: Application
    Filed: May 10, 2011
    Publication date: November 15, 2012
    Inventors: Kevin D. Shatzkamer, Rajesh S. Pazhyannur, Mark Millet, Mark Grayson, David E. Dukinfield, Eric Hamel
  • Patent number: 8312530
    Abstract: According to one embodiment of the present invention, there is provided a method for providing security in a network environment that includes receiving a flow that propagates through an access gateway. The flow is initiated by an end user associated with the flow and propagates through a network. The method also includes receiving accounting information indicative of the termination of the flow. In response, tearing down of the communication associated with the flow is initiated.
    Type: Grant
    Filed: May 24, 2006
    Date of Patent: November 13, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Hien T. Thai, Kevin D. Shatzkamer, Andrew G. Gasson, Laurent Andriantsiferana, Eric Hamel, Jayaraman R. Iyer
  • Publication number: 20120281540
    Abstract: A data flow is received from a mobile network relating to a mobile subscriber. Subscriber data is received for the subscriber identifying a service path corresponding to the subscriber and at least one service policy corresponding to the subscriber, the service path including a set of network service nodes in a plurality of network service nodes. Packets of the data flow are routed according to the service path, the packets corresponding to a request for a resource. At least one packet is appended with service header data identifying the service policy. Each service node performs at least one service based on received request data, each service node in the set of service nodes performing a service defined in a service subscription of the subscriber. At least one particular service node in the set of network service nodes performs a particular service based at least in part on the service policy.
    Type: Application
    Filed: May 3, 2011
    Publication date: November 8, 2012
    Inventors: Muhammad A. Khan, Kevin D. Shatzkamer, Kirk McBean
  • Publication number: 20120207022
    Abstract: A method is provided in one example embodiment and includes receiving a plurality of status signals, for a plurality of radio links, at a microwave device; detecting a bandwidth anomaly based on the status signals; and communicating a quality of service (QoS) control signal, which is based on the bandwidth anomaly, to a gateway coupled to at least one of the radio links.
    Type: Application
    Filed: February 15, 2011
    Publication date: August 16, 2012
    Inventors: Mark Grayson, Rajesh S. Pazhyannur, Kevin D. Shatzkamer
  • Publication number: 20120195202
    Abstract: A method is provided in one example embodiment and includes receiving a first congestion message associated with traffic congestion in a signaling system seven (SS7) a network, the first congestion message being associated with a first timer. The method also includes receiving a second congestion message after the first timer has expired and before a second timer has expired. The method further includes communicating a portion of traffic, which was originally intended for a first destination, to a second destination in the network based on receiving the second congestion message. The method can further include recovering and returning to an initial state.
    Type: Application
    Filed: January 28, 2011
    Publication date: August 2, 2012
    Inventors: Kevin D. Shatzkamer, Chris O'Rourke, James C. Balquist