Patents by Inventor Nitin Gogate
Nitin Gogate has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9712323Abstract: Methods and systems are provided for detection of unauthorized entities in communication systems. The method includes obtaining a secret string by a first network element and generating a random number by the first network element. The method also includes computing a first cryptographic result by the first network element. The first cryptographic result is based on a cryptographic function, the secret string, and the random number. The method further includes attempting to transmit, by the first network element, a first packet that includes the random number to a second network element using a layer 2 packet terminating protocol. The method includes receiving, within a configured time, a second packet including a second cryptographic result at the first network element, and terminating transmission to the second network element when a second cryptographic result is different from the first cryptographic result.Type: GrantFiled: October 9, 2014Date of Patent: July 18, 2017Assignee: Fujitsu LimitedInventors: Michael Green, Stephen John Unger, Nitin Gogate
-
Publication number: 20160105284Abstract: Methods and systems are provided for detection of unauthorized entities in communication systems. The method includes obtaining a secret string by a first network element and generating a random number by the first network element. The method also includes computing a first cryptographic result by the first network element. The first cryptographic result is based on a cryptographic function, the secret string, and the random number. The method further includes attempting to transmit, by the first network element, a first packet that includes the random number to a second network element using a layer 2 packet terminating protocol. The method includes receiving, within a configured time, a second packet including a second cryptographic result at the first network element, and terminating transmission to the second network element when a second cryptographic result is different from the first cryptographic result.Type: ApplicationFiled: October 9, 2014Publication date: April 14, 2016Inventors: Michael Green, Stephen John Unger, Nitin Gogate
-
Patent number: 9054985Abstract: A method may include monitoring available aggregate bandwidth of a network element and determining if the available aggregate bandwidth is sufficient to communicate traffic at a rate equal to an aggregate sum of committed information rates for a plurality of classes of traffic. If the available aggregate bandwidth is sufficient to communicate traffic at the rate equal to the aggregate sum of committed information rates for a plurality of classes of traffic, traffic may be communicated for each of the plurality of classes in accordance with the respective committed information rate for each class. Otherwise, traffic may be communicated for each of the plurality of classes in an amount proportional to the respective committed information rate for a particular class and the available aggregate bandwidth.Type: GrantFiled: June 27, 2011Date of Patent: June 9, 2015Assignee: Fujitsu LimitedInventors: Muhammad Sakhi Sarwar, Zigmunds Andis Putnins, Jaya Sarup, Zanjun Lu, Nitin Gogate
-
Patent number: 8917591Abstract: A method may include: (i) provisioning a first network-side interface of a first plug-in unit and a second network-side interface of a second plug-in unit as members of a network-side protection group, the first plug-in unit and the second plug-in unit integral to an adaptation layer network element; (ii) provisioning a first client-side interface of the first plug-in unit and a second client-side interface of the second plug-in unit as members of a client-side protection group; (iii) designating one of the first and second network-side interface as an active network-side interface of the network-side protection group; and (iv) designating one of the first second client-side interface as an active client-side interface of the client-side protection group, such that traffic ingressing on the active network-side interface may egress on the active client-side interface and traffic ingressing on the active client-side interface may egress on the active network-side interface.Type: GrantFiled: July 19, 2011Date of Patent: December 23, 2014Assignee: Fujitsu LimitedInventors: Muhammad Sakhi Sarwar, Zigmunds Andis Putnins, Jaya Sarup, Zanjun Lu, Nitin Gogate, Michael Charles Green
-
Publication number: 20140258772Abstract: In accordance with teachings of the present disclosure, a method includes—at a network element communicatively coupled to a y-cable through two transmitters of the network element—transmitting data from a transmitter through the y-cable to a client and withholding transmission from the other transmitter, and determining whether receivers have received a backward defect indicator from the client. The method further includes determining that an interruption has occurred within a transmission media between the network element and the client, based on the determinations of whether the receivers have received the backward defect indicator from the client. The method also includes, based on the determination of the interruption, transmitting data from the other transmitter through the y-cable to the client and withholding transmission from the transmitter.Type: ApplicationFiled: March 7, 2013Publication date: September 11, 2014Applicant: FUJITSU LIMITEDInventors: Deepak Kataria, David Solomon, Michael Green, Nitin Gogate, Junjie Chen
-
Publication number: 20130336129Abstract: In accordance with the present disclosure, a method may include receiving a delay measurement message frame at a responder maintenance end point from a controller maintenance end point. The method may further include writing an ingress time value to the delay measurement message frame upon receipt of the delay measurement message at the responder maintenance end point. The method may also include generating a delay measurement response frame based on the delay measurement message frame, the delay measurement response frame comprising an egress timestamp field having a value equal to the difference between a time at which the delay measurement response frame is transmitted from the responder maintenance end point and a time represented by the ingress time value. The method may additionally include transmitting the delay measurement response from the responder maintenance end point to the controller maintenance end point.Type: ApplicationFiled: June 15, 2012Publication date: December 19, 2013Applicant: FUJITSU LIMITEDInventors: Kumar Shanmugam, Jian-lin Mu, Nitin Gogate, Zafrir Babin, Muhammad Sawar, Basavaraj Menasinahal, RakeshKumar Patel, Zigmunds Andis Putnins
-
Patent number: 8571182Abstract: According to one embodiment, a method may include detecting existence of an alarm-triggering event associated with a service at a maintenance level. The method may also include analyzing one or more parameters associated with carrier traffic for the service. The method may additionally include determining whether a data path for carrier traffic associated with the service is operational based on the analysis of the one or more parameters. The method may further include masking or downgrading an alarm triggered by the alarm-triggering event in response to a determination that the data path is operational.Type: GrantFiled: September 22, 2010Date of Patent: October 29, 2013Assignee: Fujitsu LimitedInventors: Stephen John Unger, Nimer Ibrahim Yaseen, Nitin Gogate
-
Publication number: 20130022349Abstract: A method may include: (i) provisioning a first network-side interface of a first plug-in unit and a second network-side interface of a second plug-in unit as members of a network-side protection group, the first plug-in unit and the second plug-in unit integral to an adaptation layer network element; (ii) provisioning a first client-side interface of the first plug-in unit and a second client-side interface of the second plug-in unit as members of a client-side protection group; (iii) designating one of the first and second network-side interface as an active network-side interface of the network-side protection group; and (iv) designating one of the first second client-side interface as an active client-side interface of the client-side protection group, such that traffic ingressing on the active network-side interface may egress on the active client-side interface and traffic ingressing on the active client-side interface may egress on the active network-side interface.Type: ApplicationFiled: July 19, 2011Publication date: January 24, 2013Applicant: FUJITSU NETWORK COMMUNICATIONS, INC.Inventors: Muhammad Sakhi Sarwar, Zigmunds Andis Putnins, Jaya Sarup, Zanjun Lu, Nitin Gogate, Michael Charles Green
-
Publication number: 20120327768Abstract: A method may include monitoring available aggregate bandwidth of a network element and determining if the available aggregate bandwidth is sufficient to communicate traffic at a rate equal to an aggregate sum of committed information rates for a plurality of classes of traffic. If the available aggregate bandwidth is sufficient to communicate traffic at the rate equal to the aggregate sum of committed information rates for a plurality of classes of traffic, traffic may be communicated for each of the plurality of classes in accordance with the respective committed information rate for each class. Otherwise, traffic may be communicated for each of the plurality of classes in an amount proportional to the respective committed information rate for a particular class and the available aggregate bandwidth.Type: ApplicationFiled: June 27, 2011Publication date: December 27, 2012Applicant: FUJITSU NETWORK COMMUNICATIONS, INC.Inventors: Muhammad Sakhi Sarwar, Zigmunds Andis Putnins, Jaya Sarup, Zanjun Lu, Nitin Gogate
-
Publication number: 20120069970Abstract: According to one embodiment, a method may include detecting existence of an alarm-triggering event associated with a service at a maintenance level. The method may also include analyzing one or more parameters associated with carrier traffic for the service. The method may additionally include determining whether a data path for carrier traffic associated with the service is operational based on the analysis of the one or more parameters. The method may further include masking or downgrading an alarm triggered by the alarm-triggering event in response to a determination that the data path is operational.Type: ApplicationFiled: September 22, 2010Publication date: March 22, 2012Inventors: Stephen John Unger, Nimer Ibrahim Yaseen, Nitin Gogate
-
Patent number: 7957284Abstract: A method of optimizing bandwidth usage in a link aggregated network includes identifying available bandwidth on a plurality of data links in a link aggregation group, selecting the data link with the least available bandwidth, and determining whether the available bandwidth of the selected data link is less than a guaranteed bandwidth of an incoming data flow. If the available bandwidth of the selected data link is less than the guaranteed bandwidth of the incoming data flow, the method includes selecting the data link with the next least available bandwidth and repeating the previous steps until the available bandwidth of the selected data link is greater than the guaranteed bandwidth of the incoming data flow. The method further includes assigning the data flow to the data link determined to have an available bandwidth greater than the guaranteed bandwidth of the incoming data flow.Type: GrantFiled: April 1, 2009Date of Patent: June 7, 2011Assignee: Fujitsu LimitedInventors: Zanjun Lu, Sanjay Sharma, Nitin Gogate, David Solomon
-
Publication number: 20100254409Abstract: A method of optimizing bandwidth usage in a link aggregated network includes identifying available bandwidth on a plurality of data links in a link aggregation group, selecting the data link with the least available bandwidth, and determining whether the available bandwidth of the selected data link is less than a guaranteed bandwidth of an incoming data flow. If the available bandwidth of the selected data link is less than the guaranteed bandwidth of the incoming data flow, the method includes selecting the data link with the next least available bandwidth and repeating the previous steps until the available bandwidth of the selected data link is greater than the guaranteed bandwidth of the incoming data flow. The method further includes assigning the data flow to the data link determined to have an available bandwidth greater than the guaranteed bandwidth of the incoming data flow.Type: ApplicationFiled: April 1, 2009Publication date: October 7, 2010Applicant: Fujitsu Network Communications, Inc.Inventors: Zanjun Lu, Sanjay Sharma, Nitin Gogate, David Solomon
-
Patent number: 7652992Abstract: RPR traffic management concepts are extended to individual client flows while adhering to the station level traffic management functions by using a two tiered shaper approach. The first tier manages the client level SLAs and feeds the second tier which provides the aggregate station level traffic management functions. This approach allows sharing of a single RPR station without the compromises and side affects associated with the other techniques. Apparatus for Resilient Packet Ring traffic management comprises a stage queue selection block operable to hold client and control traffic for transmission, a queue level traffic shaper operable to control an add rate of client data add traffic and to provide queue specific send indications to the stage queue selection block, and a ringlet level traffic shaper operable to control traffic flow for a Resilient Packet Ring ringlet and to provide aggregate send indications to the stage queue selection block.Type: GrantFiled: December 22, 2005Date of Patent: January 26, 2010Assignee: Fujitsu LimitedInventors: Michael P. Bottiglieri, Wendy Lao, Sanjay Kumar Sharma, Nitin Gogate
-
Publication number: 20060274770Abstract: RPR traffic management concepts are extended to individual client flows while adhering to the station level traffic management functions by using a two tiered shaper approach. The first tier manages the client level SLAs and feeds the second tier which provides the aggregate station level traffic management functions. This approach allows sharing of a single RPR station without the compromises and side affects associated with the other techniques. Apparatus for Resilient Packet Ring traffic management comprises a stage queue selection block operable to hold client and control traffic for transmission, a queue level traffic shaper operable to control an add rate of client data add traffic and to provide queue specific send indications to the stage queue selection block, and a ringlet level traffic shaper operable to control traffic flow for a Resilient Packet Ring ringlet and to provide aggregate send indications to the stage queue selection block.Type: ApplicationFiled: December 22, 2005Publication date: December 7, 2006Inventors: Michael Bottiglieri, Wendy Lao, Sanjay Sharma, Nitin Gogate