Patents by Inventor Nirwan Ansari

Nirwan Ansari has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7873997
    Abstract: The deterministic packet marking (DPM) method is based on marking packets with the partial address information of ingress interface only. The attack victim is able to recover the complete address(es) information after receiving several packets from a particular attacking host or hosts. The full path is not really essential for the traceback since it can be different for different packets for different reasons.
    Type: Grant
    Filed: March 14, 2005
    Date of Patent: January 18, 2011
    Assignee: New Jersey Institute of Technology
    Inventors: Andrey Belenky, Nirwan Ansari
  • Publication number: 20100309776
    Abstract: Implementations and techniques for allocating bandwidth in a resilient packet ring network by a P-type controller are generally disclosed.
    Type: Application
    Filed: June 5, 2009
    Publication date: December 9, 2010
    Inventors: Fahd Alharbi, Nirwan Ansari
  • Publication number: 20100309780
    Abstract: Implementations and techniques for allocating bandwidth in a resilient packet ring network by a PI-type controller are generally disclosed.
    Type: Application
    Filed: June 5, 2009
    Publication date: December 9, 2010
    Inventors: Fahd Alharbi, Nirwan Ansari
  • Publication number: 20100260189
    Abstract: Techniques for transferring data among nodes on a network are disclosed. Some example methods include a downloader-initiated random linear network coding algorithm. A downloading node may be aware of the chunks of original data held by neighboring nodes, and the downloading node can request linear combinations of chunks from the neighboring nodes that are linearly independent of any linear combinations of chunks already held by the downloading node.
    Type: Application
    Filed: April 8, 2009
    Publication date: October 14, 2010
    Inventors: Nirwan Ansari, Nan Wang
  • Publication number: 20100254271
    Abstract: Techniques for managing resources in a point-to-multipoint (P2MP) network are disclosed. In some examples, a root station is adapted to transmit and receive network packets and leaf stations are adapted to transmit and receive the network packets from the root station. An electrical control system can be adapted to adjust a control error toward a zero value and adjust an output toward a steady state. The electrical control system may include feedback to control the root station based, at least in part, on the output of the electrical control system.
    Type: Application
    Filed: April 6, 2009
    Publication date: October 7, 2010
    Inventors: Nirwan Ansari, Si Yin
  • Patent number: 7808913
    Abstract: A dynamic upstream bandwidth allocation scheme is disclosed, i.e., limited sharing with traffic prediction (LSTP), to improve the bandwidth efficiency of upstream transmission over PONs. LSTP adopts the PON MAC control messages, and dynamically allocates bandwidth according to the on-line traffic load. The ONU bandwidth requirement includes the already buffered data and a prediction of the incoming data, thus reducing the frame delay and alleviating the data loss. ONUs are served by the OLT in a fixed order in LSTP to facilitate the traffic prediction. Each optical network unit (ONU) classifies its local traffic into three classes with descending priorities: expedited forwarding (EF), assured forwarding (AF), and best effort (BE). Data with higher priority replace data with lower priority when the buffer is full. In order to alleviate uncontrolled delay and unfair drop of the lower priority data, the priority-based scheduling is employed to deliver the buffered data in a particular transmission timeslot.
    Type: Grant
    Filed: April 17, 2006
    Date of Patent: October 5, 2010
    Assignee: New Jersey Institute of Technology
    Inventors: Nirwan Ansari, Yuanqiu Luo
  • Publication number: 20100232790
    Abstract: Technologies are generally described for substantially maximizing capacity in a wavelength division multiplexing (WDM) passive optical network (PON). An “achievable rate region” may be defined as a set containing admissible traffic rates of a given WDM PON system such that a volume of an achievable rate region is proportional to a capacity of the network. Deriving the achievable rate region for a particular network, decisions may be made whether incoming traffic rate can or cannot be achieved for that network. Moreover, the achievable rate region may be used to construct a WDM PON utilizing a minimum number of wavelengths, a minimum number of lasers with narrowest tuning ranges, and a minimum number of receivers, thereby reducing a capital expenditure in building the PON system.
    Type: Application
    Filed: March 12, 2010
    Publication date: September 16, 2010
    Applicant: NEW JERSEY INSTITUTE OF TECHNOLOGY
    Inventors: Nirwan Ansari, Jingjing Zhang
  • Publication number: 20100220722
    Abstract: Techniques for managing resources in a point-to-multipoint (P2MP) network are disclosed. In some examples, a root station is adapted to transmit and receive network packets and leaf stations are adapted to transmit and receive the network packets from the root station. An electrical control system can be adapted to reduce an amount of time for the electrical control system to produce a steady state output and to define a maximum boundary for the output. The electrical control system may include feedback to control the root station based, at least in part, on the output of the electrical control system.
    Type: Application
    Filed: March 2, 2009
    Publication date: September 2, 2010
    Inventors: Nirwan Ansari, Si Yin
  • Publication number: 20100215361
    Abstract: Techniques for partitioning and/or combining at least a portion of an optical network tree including one or more array waveguide gratings (“AWGs”) and fibers in wavelength division multiplexing (“WDM”) passive optical networks (“PON”) with cascaded AWGs are disclosed. Example methods include deriving the optimal positions for the AWGs to minimize fiber cost and then determining the arrangement of cascaded AWGs to minimize the total cost of AWGs and fibers. Determining the arrangement of cascaded AWGs may include recursive partitioning followed by recursive combination. An example recursive partition-combination based algorithm for optimizing a tradeoff between the AWG cost and the fiber cost is disclosed.
    Type: Application
    Filed: February 20, 2009
    Publication date: August 26, 2010
    Inventors: Nirwan Ansari, JingJing Zhang
  • Publication number: 20100202415
    Abstract: Techniques of scheduling data packets are disclosed. For example, such data packet scheduling techniques may be employed to schedule data packets on wired and/or wireless networks. An example embodiment includes techniques for scheduling voice-over-Internet protocol data packets transmitted between a base station and a subscriber station on a WiMAX network.
    Type: Application
    Filed: February 10, 2009
    Publication date: August 12, 2010
    Inventors: Nirwan Ansari, Ehsan Haghani
  • Publication number: 20090180384
    Abstract: An exemplary method of controlling communications includes determining a total congestion window size for a router device. An allocation of at least a portion of the determined total congestion window size to allocated at least one mobile station that communicates with the router device over a wireless link is determined based on the determined total congestion window size. The determined allocation is then reported to a source of a communication intended for the at least one mobile station.
    Type: Application
    Filed: January 14, 2008
    Publication date: July 16, 2009
    Inventors: Nirwan Ansari, Shupeng Li, Ashok N. Rudrapatna
  • Publication number: 20090089139
    Abstract: A method of scheduling tasks for active network measurement includes identifying a first measurement task for measuring a first network parameter and a second measurement task for measuring a second network parameter. It is determined whether there is a conflict between the first measurement task and the second measurement task. A first execution time of the first measurement task and a second execution time of the second measurement task are also determined. A task schedule is generated based at least in part on the first execution time, the second execution time, and whether there is the conflict between the first measurement task and the second measurement task. The task schedule is further generated based at least in part on a color graph.
    Type: Application
    Filed: August 29, 2008
    Publication date: April 2, 2009
    Inventors: Roberto Rojas-Cessa, Nirwan Ansari, Zhen Qin
  • Publication number: 20080320585
    Abstract: A technique to mitigate low rate Denial-of-Service (DoS) attacks at routers in the Internet is described. In phase 1, necessary flow information from the packets traversing through the router is stored in fast memory; and in phase 2, stored flow information is periodically moved to slow memory from the fast memory for further analysis. The system detects a sudden increase in the traffic load of expired flows within a short period. In a network without low rate DoS attacks, the traffic load of all the expired flows is less than certain thresholds which are derived from real Internet traffic analysis. The system can also include a filtering solution to drop attack packets. The filtering scheme treats the long-lived flows in the Internet preferentially, and drops the attack traffic by monitoring the queue length if the queue length exceeds a threshold percent of the queue limit.
    Type: Application
    Filed: May 27, 2008
    Publication date: December 25, 2008
    Inventors: Nirwan Ansari, Amey Bhaskar Shevtekar
  • Publication number: 20080295175
    Abstract: A low rate DoS attack detection algorithm is used, which relies on a characteristic of the low rate DoS attack in introducing high rate traffic for short periods, and then uses a proactive test based differentiation technique to filter the attack packets. The proactive test defends against DDoS attacks and low rate DoS attacks which tend to ignore the normal operation of network protocols, but it also differentiates legitimate traffic from low rate DoS attack traffic instigated by botnets. It leverages on the conformity of legitimate flows, which obey the network protocols. It also differentiates legitimate connections by checking their responses to the proactive tests which include puzzles for distinguishing botnets from human users.
    Type: Application
    Filed: May 27, 2008
    Publication date: November 27, 2008
    Inventors: Nirwan Ansari, Amey Bhaskar Shevtekar
  • Patent number: 7457431
    Abstract: A method including identifying at least two subsets of pixels within a block of an image; forming a plurality of pixel groups from the at least two subsets of pixels, each pixel group having at least one pixel from a first of the at least two subsets and at least one pixel from a second of the at least two subsets; producing a plurality of difference values, each pixel group providing one of said difference values, each difference value being based on differences between pixel values of pixels within one of the pixel groups; and modifying pixel values of pixels in less than all of the at least two subsets, thereby embedding a bit value into the block.
    Type: Grant
    Filed: December 3, 2004
    Date of Patent: November 25, 2008
    Assignee: New Jersey Institute of Technology
    Inventors: Yun-Qing Shi, Zhicheng Ni, Nirwan Ansari
  • Patent number: 7415155
    Abstract: Methods and apparatus are provided for encoding a pixel domain image with hidden data by modifying the histogram of the pixel domain image to make space for such hidden data.
    Type: Grant
    Filed: April 12, 2004
    Date of Patent: August 19, 2008
    Assignee: New Jersey Institute of Technology
    Inventors: Yun-Qing Shi, Zhi-Cheng Ni, Nirwan Ansari
  • Publication number: 20070206605
    Abstract: Embodiments are directed to an Autonomous System-based Edge Marking (ASEM) for Internet Protocol (IP) traceback. In particular, the embodiments are a system and a method for IP traceback that receives one or more packets at routers; inscribes packets only at marking routers with autonomous system (AS) level and marking information; and forwards the marked packets to edge routers and other routers for verification. Additionally the packets are marked based on a probability measure and Border Gateway Protocol (BGP) routing table information is the AS level information used for marking and verification.
    Type: Application
    Filed: March 1, 2007
    Publication date: September 6, 2007
    Applicant: New Jersey Institute of Technology
    Inventors: Nirwan Ansari, Zhiqiang Gao
  • Publication number: 20070209068
    Abstract: Embodiments are directed toward a method for Behavior-based Traffic Differentiation (BTD) that initially receives incoming packets and performs traffic classification to determine the protocol of the incoming packets. In addition, BTD performs bandwidth division/allocation to further support traffic classification amongst non-TCP traffic such as UDP and ICMP. For TCP traffic, the method for BTD determines whether a TCP connection has been established and performs at least one of rate limiting, waiting time reduction for half-open connections, and incrementing backlog queue size when the TCP connection has not been established. If the TCP connection has been established successfully, the method for BTD further includes proactive tests for traffic differentiation which identify normal traffic, which is admitted, and attack traffic, which is dropped.
    Type: Application
    Filed: March 5, 2007
    Publication date: September 6, 2007
    Applicant: New Jersey Institute of Technology
    Inventors: Nirwan Ansari, Zhiqiang Gao
  • Publication number: 20070121505
    Abstract: Sharing a resource may include the use of label values associated with information units presented to the resource. The label values may be determined based on, for example, arrival rates and/or committed flow rates. Criteria may be applied to label values to determine if the associated information units may be dropped.
    Type: Application
    Filed: November 28, 2006
    Publication date: May 31, 2007
    Applicant: NEW JERSEY INSTITUTE OF TECHNOLOGY
    Inventors: Nirwan Ansari, Gang Cheng, Kai Xu
  • Publication number: 20060268704
    Abstract: A dynamic upstream bandwidth allocation scheme is disclosed, i.e., limited sharing with traffic prediction (LSTP), to improve the bandwidth efficiency of upstream transmission over PONs. LSTP adopts the PON MAC control messages, and dynamically allocates bandwidth according to the on-line traffic load. The ONU bandwidth requirement includes the already buffered data and a prediction of the incoming data, thus reducing the frame delay and alleviating the data loss. ONUs are served by the OLT in a fixed order in LSTP to facilitate the traffic prediction. Each optical network unit (ONU) classifies its local traffic into three classes with descending priorities: expedited forwarding (EF), assured forwarding (AF), and best effort (BE). Data with higher priority replace data with lower priority when the buffer is full. In order to alleviate uncontrolled delay and unfair drop of the lower priority data, the priority-based scheduling is employed to deliver the buffered data in a particular transmission timeslot.
    Type: Application
    Filed: April 17, 2006
    Publication date: November 30, 2006
    Applicant: New Jersey Institute of Technology
    Inventors: Nirwan Ansari, Yuanqiu Luo