Patents by Inventor Mahesh Jethanandani
Mahesh Jethanandani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230069604Abstract: Some embodiments use CRDs (custom resource definitions) to define resources in an O-RAN system. These resources include applications (xApps, rApps, etc.), components of these applications, deployment constructs, cloud constructs, AI/ML models and RTE constructs. Using these CRD descriptors, app developers can develop and distribute their applications in a platform independent manner. The CRDs of some embodiments are used to on board applications into an O-RAN system. In some embodiments, the SMO (Service, Management and Orchestration) framework of the O-RAN system has a service for processing CRDs. In some of these embodiments, this SMO service has one controller to process the new application CRD. In some embodiments, the SMO identifies clouds for placements of the deployed applications and directs Kubernetes managers of the identified clouds to deploy the applications.Type: ApplicationFiled: August 22, 2022Publication date: March 2, 2023Inventors: Giridhar Subramani Jayavelu, Mahesh Jethanandani
-
Patent number: 11146623Abstract: An orchestrator process can efficiently distribute images of virtual network functions (“VNFs”) in a telco network. The images can be accompanied by metadata that describes VNF requirements, such as computing requirements and functional characteristics. Based on the image metadata and location of a virtual infrastructure manager (“VIM”), the orchestrator can select a storage location and deploy the image to the storage location. The VIM can instantiate a corresponding VNF by retrieving the image. The orchestrator can track the storage location and cause the VIM to delete the image if the image is not used for a threshold period of time.Type: GrantFiled: March 19, 2020Date of Patent: October 12, 2021Assignee: VMWARE, INC.Inventors: Mahesh Jethanandani, Sachin Thakkar, Venu Gopala Rao Kotha, Akshatha Sathyanarayan, Shruti Parihar
-
Publication number: 20210218798Abstract: An orchestrator process can efficiently distribute images of virtual network functions (“VNFs”) in a telco network. The images can be accompanied by metadata that describes VNF requirements, such as computing requirements and functional characteristics. Based on the image metadata and location of a virtual infrastructure manager (“VIM”), the orchestrator can select a storage location and deploy the image to the storage location. The VIM can instantiate a corresponding VNF by retrieving the image. The orchestrator can track the storage location and cause the VIM to delete the image if the image is not used for a threshold period of time.Type: ApplicationFiled: March 19, 2020Publication date: July 15, 2021Inventors: MAHESH JETHANANDANI, SACHIN THAKKAR, VENU GOPALA RAO KOTHA, AKSHATHA SATHYANARAYAN, SHRUTI PARIHAR
-
Patent number: 9602374Abstract: A method and network element include receiving, at a receiver node, at least one of sender timestamps and sequence numbers in continuity check (CC) frames sent by a sender node; determining receiver timestamps at the receiver node; detecting instability based on one or more of the at least one of sender timestamps and sequence numbers and the receiver timestamps; and performing a remedial action based on the detecting instability. The CC frames can include Bidirectional Forwarding Detection (BFD) or Continuity Check Message (CCM) frames which are regularly transmitted in a session, but do not currently include timestamps or sequence numbers.Type: GrantFiled: July 21, 2014Date of Patent: March 21, 2017Assignee: Ciena CorporationInventors: Ashesh Mishra, Ankur Saxena, Mahesh Jethanandani
-
Patent number: 9537846Abstract: A method, a network element, and a network include determining an authentication mechanism between two nodes in a network path; operating the network path; performing connectivity check between the two nodes in the network path; and authenticating specific frames in the connectivity check between the two nodes with the authentication mechanism responsive to the specific frames affecting a state of the network path. The frames can be Bidirectional Forwarding Detection (BFD), Continuity Check Messages (CCMs), etc. Advantageously, the method, network element, and network reduce the computational load of providing authentication while maintaining secure authentication for important frames, i.e., ones that affect the state of the network path.Type: GrantFiled: April 15, 2014Date of Patent: January 3, 2017Assignee: Ciena CorporationInventors: Mahesh Jethanandani, Ankur Saxena, Ashesh Mishra
-
Patent number: 9485171Abstract: Methods and apparatus for optimizing fault synchronization in a bidirectional data network are provided. In an example, a downstream endpoint of the data network receives a first Alarm Indication Signal (AIS). The first AIS indicates a first FLI of an upstream interface having an interface fault. The downstream endpoint transmits, to an upstream endpoint of the data network, a second AIS including a Remote Defect Indication (RDI) and a second FLI identifying the downstream endpoint. An upstream endpoint of the data network receives the second AIS and determines that the AIS is an AIS-RDI (AIS-RDI) from the presence of the second FLI. The presence of the AIS-RDI triggers the upstream endpoint to initiate tunnel failure synchronization with the downstream endpoint.Type: GrantFiled: April 30, 2013Date of Patent: November 1, 2016Assignee: Ciena CorporationInventors: Ashesh Mishra, Mahesh Jethanandani, Ankur Saxena, Sowmya Chandran
-
Patent number: 9300642Abstract: In an embodiment, a method comprises establishing a first data communications session with a first router. In response to receiving a first request to establish a second data communications session, a probe message that is configured to test whether the first data communications session or the first router is responsive is sent to the first router. In response to determining that the first router has not acknowledged the probe message before a probe timer has expired, and receiving a second request to establish the second data communications session, the second data communications session with the first router is established and a state for the first data communications session is deleted.Type: GrantFiled: November 9, 2010Date of Patent: March 29, 2016Assignee: Cisco Technology, Inc.Inventors: Brian Weis, Mahesh Jethanandani, Keyur Patel, Anantha Ramaiah
-
Publication number: 20160020973Abstract: A method and network element include receiving, at a receiver node, at least one of sender timestamps and sequence numbers in continuity check (CC) frames sent by a sender node; determining receiver timestamps at the receiver node; detecting instability based on one or more of the at least one of sender timestamps and sequence numbers and the receiver timestamps; and performing a remedial action based on the detecting instability. The CC frames can include Bidirectional Forwarding Detection (BFD) or Continuity Check Message (CCM) frames which are regularly transmitted in a session, but do not currently include timestamps or sequence numbers.Type: ApplicationFiled: July 21, 2014Publication date: January 21, 2016Applicant: Ciena CorporationInventors: Ashesh MISHRA, Ankur SAXENA, Mahesh JETHANANDANI
-
Publication number: 20150295909Abstract: A method, a network element, and a network include determining an authentication mechanism between two nodes in a network path; operating the network path; performing connectivity check between the two nodes in the network path; and authenticating specific frames in the connectivity check between the two nodes with the authentication mechanism responsive to the specific frames affecting a state of the network path. The frames can be Bidirectional Forwarding Detection (BFD), Continuity Check Messages (CCMs), etc. Advantageously, the method, network element, and network reduce the computational load of providing authentication while maintaining secure authentication for important frames, i.e., ones that affect the state of the network path.Type: ApplicationFiled: April 15, 2014Publication date: October 15, 2015Applicant: CIENA CORPORATIONInventors: Mahesh Jethanandani, Ankur Saxena, Ashesh Mishra
-
Publication number: 20140321260Abstract: Methods and apparatus for optimizing fault synchronization in a bidirectional data network are provided. In an example, a downstream endpoint of the data network receives a first Alarm Indication Signal (AIS). The first AIS indicates a first FLI of an upstream interface having an interface fault. The downstream endpoint transmits, to an upstream endpoint of the data network, a second AIS including a Remote Defect Indication (RDI) and a second FLI identifying the downstream endpoint. An upstream endpoint of the data network receives the second AIS and determines that the AIS is an AIS-RDI (AIS-RDI) from the presence of the second FLI. The presence of the AIS-RDI triggers the upstream endpoint to initiate tunnel failure synchronization with the downstream endpoint.Type: ApplicationFiled: April 30, 2013Publication date: October 30, 2014Applicant: Ciena CorporationInventors: Ashesh MISHRA, Mahesh Jethanandani, Ankur Saxena, Sowmya Chandran
-
Patent number: 8639842Abstract: Systems and procedures are presented for communicating multiple data streams through an SSLVPN gateway. One implementation of a method includes receiving a plurality of incoming data streams and load balancing the incoming data streams. The load balancing includes assigning a first set of one or more incoming data streams to a first subprocessor, and responding to the first set of incoming data streams with outgoing data streams that include a first identifier that indicates the first subprocessor. One implementation of a network element includes a plurality of subprocessors and a dispatcher module. The dispatcher module is coupled to the plurality of subprocessors, and is configured to recognize an identifier in a received data stream. The dispatcher module dispatches the received data stream to a corresponding subprocessor of the plurality of processors in response to the identifier in the received data stream.Type: GrantFiled: June 30, 2006Date of Patent: January 28, 2014Assignee: Cisco Technology, Inc.Inventors: Nagaraj A. Bagepalli, Abhijit Patra, Murali Bashyam, David Wei-Shen Chang, Mahesh Jethanandani
-
Publication number: 20120117248Abstract: In an embodiment, a method comprises establishing a first data communications session with a first router. In response to receiving a first request to establish a second data communications session, a probe message that is configured to test whether the first data communications session or the first router is responsive is sent to the first router. In response to determining that the first router has not acknowledged the probe message before a probe timer has expired, and receiving a second request to establish the second data communications session, the second data communications session with the first router is established and a state for the first data communications session is deleted.Type: ApplicationFiled: November 9, 2010Publication date: May 10, 2012Inventors: Brian Weis, Mahesh Jethanandani, Keyur Patel, Anantha Ramaiah
-
METHOD AND APPARATUS TO MINIMIZE LATENCY BY AVOIDING SMALL TCP SEGMENTS IN A SSL OFFLOAD ENVIRONMENT
Publication number: 20070266233Abstract: Methods and apparatus for secure network communication in a Secure Sockets Layer (SSL) by avoiding small Transmission Control Protocol (TCP) packets are provided. For some embodiments, these small packets may be avoided by adjusting a maximum segment size (MSS) used in transmissions between an encryption engine and a server to compensate for the amount of overhead added by the encryption process.Type: ApplicationFiled: May 12, 2006Publication date: November 15, 2007Inventors: Mahesh Jethanandani, Murali Bashyam, Nagaraj Bagepalli, Abhijit Patra