Patents by Inventor Metin Balci

Metin Balci has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220200540
    Abstract: The non-linear behavior of power amplifier is linearized using a pre-distorter that is adaptive to changes in the behavior of the power amplifier and uses an artificial neural network. According to embodiments presented here, the pre-distorter's artificial neural network is model-trained from time to time to learn the inverse of the transfer function of the power amplifier by using a second pre-distorter modeling system. The second modeling system determines the parameters of the inverse of the transfer function of the power amplifier using a least square method by using the (un-distorted) output signal samples of the power amplifier. Using the output of the second system as output to train the neural network enables the neural network to more successfully linearize the power amplifier's behavior. Furthermore, the trained artificial neural network as the pre-distorter can be implemented in hardware and presents a small form factor.
    Type: Application
    Filed: December 21, 2021
    Publication date: June 23, 2022
    Inventors: DESDINA KOF, ALI ARSAL, ALPER SINAV, ALI METIN BALCI
  • Patent number: 10484285
    Abstract: A novel system and a new data communication method are invented in a software-defined (SDN) network to provide delivery of certain types of critical data flows with certain QoS and/or extra security requirements in a congested network. The method of invention allows such critical data not to traverse the data plane, as it normally would, but instead to go from the ingress switch directly to the egress switch, thereby always in two hops using the control channels. By shortcutting all other switches along the traditional data path computed by normal routing, it potentially provides guaranteed throughput, lower latency/jitter or higher level of security.
    Type: Grant
    Filed: December 30, 2015
    Date of Patent: November 19, 2019
    Assignee: ARGELA YAZILIM VE BILISIM TEKNOLOJILERI SAN. VE TIC. A.S.
    Inventors: Aydin Ulas, Erhan Lokman, Sinan Tatlicioglu, Seyhan Civanlar, Metin Balci, Burak Gorkemli, Bulent Kaytaz
  • Patent number: 10425327
    Abstract: An ingress forwarder receives the IP packet and strips off the entire packet header and replaces it with the simple flow header assigned by the controller, and looks up its flow-table to determine from which port to forward the packet. All other forwarders along the path up to the egress forwarder perform the forwarding action simply by inspecting the flow header. The egress forwarder, before forwarding to the egress port, replaces the flow header with the original layer-2/3/4 header. Doing so, the host behavior remains unchanged while the routing/forwarding within the cloud of SDN is performed based on only the flow header.
    Type: Grant
    Filed: November 10, 2016
    Date of Patent: September 24, 2019
    Assignee: Argela Yazilim ve Bilisim Teknolojileri San ve Tic. A.S.
    Inventors: Seyhan Civanlar, Sinan Tatlicioglu, A Metin Balci
  • Patent number: 10205706
    Abstract: Sensitive data is sent through insecure network regions across different software defined networks (SDNs) over an encrypted path without requiring encryption applications at the source or destination hosts. One or more special-purpose encryptors are strategically placed within each SDN, which can act as an encryptor or decryptor, of both the data packet content and the header. Using the controller and a special encryption service application, the encrypted IP packets are forwarded from an encryptor, closest to the source, towards a decryptor, closest to the destination, utilizing a tagging method. Each encryptor has a static and globally unique tag. Each controller advertises to other controllers its encryptor information: IP of the encryptor, the IP block of the users the encryptor is responsible for and the unique encryptor tag(s). Each forwarder along the flow path is instructed by its respective controller how to forward packets towards the destination according to the tag.
    Type: Grant
    Filed: May 11, 2016
    Date of Patent: February 12, 2019
    Assignee: ARGELA YAZILIM VE BILISIM TEKNOLOJILERI SAN. VE TIC. A.S.
    Inventors: Erhan Lokman, Sinan Tatlicioglu, Seyhan Civanlar, Burak Gorkemli, Metin Balci, Bulent Kaytaz
  • Patent number: 10084756
    Abstract: A system and method that rely on a centralized and trusted control mechanism for a software-defined network (SDN) to dynamically assign routes between two end points, and to simultaneously change their real IP addresses to fake IP addresses to establish short-lived obfuscated communications paths with a goal of preserving anonymity. The SDN controller determines the short-lived routes from a feasible route-set and new fake IP addresses from a reserved address pool for the source and destination hosts. It provisions only the switches along the route with rules so that a switch can forward packets of the data flow to another switch without needing to know the actual IP addresses of the communicating endpoints, and hence, providing strict anonymity even when the switches are compromised.
    Type: Grant
    Filed: December 30, 2015
    Date of Patent: September 25, 2018
    Assignee: ARGELA YAZILIM VE BILISIM TEKNOLOJILERI SAN. VE TIC. A.S.
    Inventors: Sinan Tatlicioglu, Seyhan Civanlar, Metin Balci, Erhan Lokman, Burak Gorkemli, Bulent Kaytaz
  • Publication number: 20180131602
    Abstract: An ingress forwarder receives the IP packet and strips off the entire packet header and replaces it with the simple flow header assigned by the controller, and looks up its flow-table to determine from which port to forward the packet. All other forwarders along the path up to the egress forwarder perform the forwarding action simply by inspecting the flow header. The egress forwarder, before forwarding to the egress port, replaces the flow header with the original layer-2/3/4 header. Doing so, the host behavior remains unchanged while the routing/forwarding within the cloud of SDN is performed based on only the flow header.
    Type: Application
    Filed: November 10, 2016
    Publication date: May 10, 2018
    Inventors: SEYHAN CIVANLAR, SINAN TATLICIOGLU, A METIN BALCI
  • Publication number: 20180069786
    Abstract: Random route hopping in a Software Defined Network (SDN) allows traffic flows to change routes frequently to obfuscate data paths or to meet specific performance requirements. Using the route hopping method and additional capabilities built into an SDN controller according to this invention, the controller determines multiple feasible routes for specific flows, called jumper flows, so that the active flow can randomly be assigned to different routes after a switch-over time period expires, or by a special randomization logic within the switch managed by the controller, or manually programmed by a system administrator.
    Type: Application
    Filed: September 2, 2016
    Publication date: March 8, 2018
    Inventors: ERHAN LOKMAN, SINAN TATLICIOGLU, BURAK GORKEMLI, SEYHAN CIVANLAR, METIN BALCI, BULENT KAYTAZ
  • Publication number: 20180013630
    Abstract: Controller(s) in a software defined network (SDN) are able to determine a control path towards each network switch by performing a switch-originated discovery and using an in-band control network that is an overlay on the data network. A topology tree is maintained, where each controller being the root of the tree, and where messages from the root to any switch may pass through neighboring switches to reach that switch (and vice-versa). Each switch in the SDN attempts to connect to the controller when it does not have a readily configured control connection towards the controller. Once the controller learns about the presence of a new switch and at least one or more paths to reach that switch through a novel discovery process, it can select, adjust and even optimize the control path's route towards that switch.
    Type: Application
    Filed: July 11, 2016
    Publication date: January 11, 2018
    Inventors: SINAN TATLICIOGLU, ERHAN LOKMAN, SEYHAN CIVANLAR, BURAK GORKEMLI, METIN BALCI, BULENT KAYTAZ
  • Publication number: 20180006833
    Abstract: Controller(s) can determine a control path towards each network switch using a novel controller-originated discovery process based on an in-band control network that is an overlay on the data network. The controller attempts to connect to each switch when it does not have a readily configured control connection towards the switch. Once the controller learns about the presence of a new switch and at least one or more paths to reach that switch through aforementioned discovery process, it can select, adjust and even optimize the control path's route towards that switch. During the controller-originated control network discovery process, the controller also learns about the to connectivity between all switches. Thereby, as a by-product of the discovery process, it uncovers the entire data network topology in parallel.
    Type: Application
    Filed: June 29, 2016
    Publication date: January 4, 2018
    Inventors: SINAN TATLICIOGLU, SEYHAN CIVANLAR, ERHAN LOKMAN, BURAK GORKEMLI, METIN BALCI, BULENT KAYTAZ
  • Publication number: 20170331794
    Abstract: Sensitive data is sent through insecure network regions across different software defined networks (SDNs) over an encrypted path without requiring encryption applications at the source or destination hosts. One or more special-purpose encryptors are strategically placed within each SDN, which can act as an encryptor or decryptor, of both the data packet content and the header. Using the controller and a special encryption service application, the encrypted IP packets are forwarded from an encryptor, closest to the source, towards a decryptor, closest to the destination, utilizing a tagging method. Each encryptor has a static and globally unique tag. Each controller advertises to other controllers its encryptor information: IP of the encryptor, the IP block of the users the encryptor is responsible for and the unique encryptor tag(s). Each forwarder along the flow path is instructed by its respective controller how to forward packets towards the destination according to the tag.
    Type: Application
    Filed: May 11, 2016
    Publication date: November 16, 2017
    Applicant: ARGELA YAZILIM VE BILISIM TEKNOLOJILERI SAN. VE TI C. A.S.
    Inventors: ERHAN LOKMAN, SINAN TATLICIOGLU, SEYHAN CIVANLAR, BURAK GORKEMLI, METIN BALCI, BULENT KAYTAZ
  • Publication number: 20170195229
    Abstract: A novel system and a new data communication method are invented in a software-defined (SDN) network to provide delivery of certain types of critical data flows with certain QoS and/or extra security requirements in a congested network. The method of invention allows such critical data not to traverse the data plane, as it normally would, but instead to go from the ingress switch directly to the egress switch, thereby always in two hops using the control channels. By shortcutting all other switches along the traditional data path computed by normal routing, it potentially provides guaranteed throughput, lower latency/jitter or higher level of security.
    Type: Application
    Filed: December 30, 2015
    Publication date: July 6, 2017
    Applicant: ARGELA YAZILIM VE BILISIM TEKNOLOJILERI SAN. VE TIC. A.S.
    Inventors: Aydin Ulas, Erhan Lokman, Sinan Tatlicioglu, Seyhan Civanlar, Metin Balci, Burak Gorkemli, Bulent Kaytaz
  • Publication number: 20170195295
    Abstract: A system and method that rely on a centralized and trusted control mechanism for a software-defined network (SDN) to dynamically assign routes between two end points, and to simultaneously change their real IP addresses to fake IP addresses to establish short-lived obfuscated communications paths with a goal of preserving anonymity. The SDN controller determines the short-lived routes from a feasible route-set and new fake IP addresses from a reserved address pool for the source and destination hosts. It provisions only the switches along the route with rules so that a switch can forward packets of the data flow to another switch without needing to know the actual IP addresses of the communicating endpoints, and hence, providing strict anonymity even when the switches are compromised.
    Type: Application
    Filed: December 30, 2015
    Publication date: July 6, 2017
    Applicant: ARGELA YAZILIM VE BILISIM TEKNOLOJILERI SAN. VE TIC. A.S.
    Inventors: SINAN TATLICIOGLU, SEYHAN CIVANLAR, METIN BALCI, ERHAN LOKMAN, BURAK GORKEMLI, BULENT KAYTAZ