Patents by Inventor Latha Kant
Latha Kant has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8665715Abstract: Network management for providing and managing Quality of Service (QoS) in converged networks, and particularly management of bursty, short-lived data loads, in an opaque network where knowledge of or control over network elements is not required. Preferential treatment is provided to some subset of the network users that require better QoS assurances from the underlying network by applying probabilistic admission control decisions in conjunction with estimated network state provides improved performance for high priority data with bursty data loads.Type: GrantFiled: May 20, 2011Date of Patent: March 4, 2014Assignee: Telcordia Technologies, Inc.Inventors: Abhrajit Ghosh, Alexander Poylisher, Ricardo Martija, Ritu Chadha, Latha Kant
-
Patent number: 8509166Abstract: A resource scheduling and power allocation technique is provided for a LTE radio network integrated with femtocells. The technique utilizes a tri-phase approach that includes a stochastic geometric model of an exemplary radio network that generates a channel attenuation matrix for each channel at each PRB. A resource scheduling and power allocation procedure determines a near optimal assignment of mobile user to PRBs based on the channel attenuations, potential data rates, and transmit power subject to maximizing the data rates in accordance with a fairness objective. A discrete-event simulation procedure simulates the end-to-end transmission of the data packets in a packet-switch network in accordance with the assignments to analyze the behavior of the overall network.Type: GrantFiled: January 28, 2010Date of Patent: August 13, 2013Assignee: TTI Inventions D LLCInventors: Kenneth J. Kerpez, Tian Lan, Kaustubh Sinkar, Latha Kant
-
Publication number: 20120257498Abstract: Network management for providing and managing Quality of Service (QoS) in converged networks, and particularly management of bursty, short-lived data loads, in an opaque network where knowledge of or control over network elements is not required. Preferential treatment is provided to some subset of the network users that require better QoS assurances from the underlying network by applying probabilistic admission control decisions in conjunction with estimated network state provides improved performance for high priority data with bursty data loads.Type: ApplicationFiled: May 20, 2011Publication date: October 11, 2012Applicant: TELCORDIA TECHNOLOGIES, INC.Inventors: Abhrajit Ghosh, Alexander Poylisher, Ricardo Martija, Ritu Chadha, Latha Kant
-
Publication number: 20120030150Abstract: In a network that executes a link state routing protocol, a network node receives periodic disseminations of link state information from other network nodes. The link state information includes neighboring node identity and link cost metrics. The network node calculates the initial routing paths based on the received link state information by using a link state routing algorithm. It then adapts the calculated path based on both the current link state information and past link state information through a reinforcement learning process. The network node then selects a routing path to each destination node based on the adaptation and updates the routing table accordingly.Type: ApplicationFiled: July 29, 2010Publication date: February 2, 2012Applicant: TELCORDIA TECHNOLOGIES, INC.Inventors: Anthony McAuley, Latha Kant, Kaustubh Sinkar
-
Publication number: 20110183678Abstract: A resource scheduling and power allocation technique is provided for a LTE radio network integrated with femtocells. The technique utilizes a tri-phase approach that includes a stochastic geometric model of an exemplary radio network that generates a channel attenuation matrix for each channel at each PRB. A resource scheduling and power allocation procedure determines a near optimal assignment of mobile user to PRBs based on the channel attenuations, potential data rates, and transmit power subject to maximizing the data rates in accordance with a fairness objective. A discrete-event simulation procedure simulates the end-to-end transmission of the data packets in a packet-switch network in accordance with the assignments to analyze the behavior of the overall network.Type: ApplicationFiled: January 28, 2010Publication date: July 28, 2011Applicant: TELCORDIA TECHNOLOGIES, INC.Inventors: Kenneth J. Kerpez, Tian Lan, Kaustubh Sinkar, Latha Kant
-
Patent number: 7975300Abstract: The present invention, among other things, obviates the effects of an attack on a wireless network through appropriate isolation and recovery. An aspect of the present invention can include a system and method of isolating a victim of malicious behavior in a wireless access network, and in particular WLAN networks. By having software on the victim's device, the system provides the capability of recovering the victim from the effects of the intruder, and prevents the victim from being affected by subsequent attacks by the intruder. The preferred embodiments include two key components: a local monitor and a global monitor.Type: GrantFiled: August 15, 2005Date of Patent: July 5, 2011Assignees: Toshiba America Research, Inc., Telcordia Technologies, Inc.Inventors: Byungsuk Kim, Farooq Anjum, Subir Das, Praveen Gopalakrishnan, Latha Kant
-
Patent number: 7933237Abstract: A method and apparatus for controlling ingress to a communications network to control quality of service is described. A request to admit a new communications flow is received. A polynomial and its coefficients representing a state of the network is determined and applied to the network state plus the new communications flow to determine whether admission of the new communications flow would cause the network to operate in a stable or unstable state. In response to determining that the network would operate in the unstable state, a communications flow for the ingress device is downgraded in its quality of service. By another approach, it is determined whether the new communications flow exceeds an allocated quota of bandwidth. Admission or rejection of the communications flow can be determined.Type: GrantFiled: December 26, 2006Date of Patent: April 26, 2011Assignee: Telcordia Licensing Company, LLCInventors: Farooq Anjum, Latha Kant, Alexander Poylisher, Ritu Chadha
-
Patent number: 7764635Abstract: Disclosed is a method and apparatus for improved self-healing in a mobile ad-hoc wireless network in which network communication functions are divided into a plurality of functional layers. The system utilizes cross-layer self-healing techniques. Network data from at least one of the functional layers is stored, for example in a storage unit of the network node. The stored network data is then used to modify the functioning of at least one of the other layers. In one embodiment, a management module manages the storage and use of the network data. In particular embodiments, the stored network data relates to successful transmission rates and/or clear channel rates, and this stored data is used to adjust the transmission power of the network node. In another embodiment, the stored data may be used to generate a table of interchangeable network nodes, which may then be used to reroute a data packet to a network node other than an originally specified destination node.Type: GrantFiled: April 26, 2005Date of Patent: July 27, 2010Assignee: Telcordia Technologies, Inc.Inventors: Wai Chen, Latha Kant, Christopher Sadler
-
Publication number: 20100034138Abstract: Our invention is a method and system for a method of providing Quality of Service (QoS) over networks that do not provide any information and only serve to carry packets. Specifically, as Traffic traverses between various user networks via an opaque network, gateways at the edge of the user networks keep a record of the packets traversing into the opaque networks and packets traversing out of the opaque network. These gateways also know about the traffic classes that each of these packets belong to. The gateways at the ingress points (the user network where the packets originate) and the gateways at the egress points (the user network where the packets terminate) coordinate amongst themselves to exchange information about the number and latency of packets exchanged between the two. This information is used by the gateway at the ingress to estimate the state of the opaque network using dynamic throughput graphs.Type: ApplicationFiled: December 26, 2006Publication date: February 11, 2010Inventors: Farooq Anjum, Latha Kant, Alexander Poylisher, Ritu Chandha
-
Publication number: 20060239216Abstract: Disclosed is a method and apparatus for improved self-healing in a mobile ad-hoc wireless network in which network communication functions are divided into a plurality of functional layers. The system utilizes cross-layer self-healing techniques. Network data from at least one of the functional layers is stored, for example in a storage unit of the network node. The stored network data is then used to modify the functioning of at least one of the other layers. In one embodiment, a management module manages the storage and use of the network data. In particular embodiments, the stored network data relates to successful transmission rates and/or clear channel rates, and this stored data is used to adjust the transmission power of the network node. In another embodiment, the stored data may be used to generate a table of interchangeable network nodes, which may then be used to reroute a data packet to a network node other than an originally specified destination node.Type: ApplicationFiled: April 26, 2005Publication date: October 26, 2006Inventors: Wai Chen, Latha Kant, Christopher Sadler
-
Publication number: 20060236391Abstract: The present invention, among other things, obviates the effects of an attack on a wireless network through appropriate isolation and recovery. An aspect of the present invention can include a system and method of isolating a victim of malicious behavior in a wireless access network, and in particular WLAN networks. By having software on the victim's device, the system provides the capability of recovering the victim from the effects of the intruder, and prevents the victim from being affected by subsequent attacks by the intruder. The preferred embodiments include two key components: a local monitor and a global monitor.Type: ApplicationFiled: August 15, 2005Publication date: October 19, 2006Applicants: TOSHIBA AMERICA RESEARCH, INC., TELCORIA TECHNOLOGIES INC.Inventors: Byungsuk Kim, Farooq Anjum, Subir Das, Praveen Gopalakrishnan, Latha Kant
-
Patent number: 6167025Abstract: Methods and apparatus for detecting faults and restoring connections in networks including, e.g., ATM networks are described. The restoration methods of the present invention can be applied on an application by application or user by user basis. In accordance with the present invention virtual connections affected by link or node failures are restored through re-routing as opposed to establishing a completely new connection between a source and a destination device. VPI/VCI values are assigned at the time of re-routing thereby avoiding the potential problem of VPI/VCI exhaustion which may be encountered when backup VPI/VCI values are assigned at the time a communication session is initiated. The connection restoration process of the present invention is initiated by a node on the source side of a connection detecting a failure and initiating a re-routing operation or transmitting a message to the source switch to initiate a re-routing operation.Type: GrantFiled: September 5, 1997Date of Patent: December 26, 2000Assignee: Telcordia Technologies, Inc.Inventors: Deh-phone K. Hsing, Tsong-Ho Wu, Latha Kant, Bo-Chao Cheng, Yusuf Goksel Goncu