Patents by Inventor Prashant Modi
Prashant Modi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9540937Abstract: A stator for use with a torque converter includes an inner annular shell, outer annular core, a plurality of stator blades and pressure-side fluid directing projections. The plurality stator blades are disposed around the inner shell in a spaced apart configuration and radially extend to the outer core. Each stator blade includes an inlet-side edge, an opposed outlet-side edge and opposed pressure-side and suction-side surfaces extending between the inlet-side and outlet-side edges. The pressure-side fluid directing projections outwardly project from the pressure-side surface in spaced relation to each other and each extend between the inlet-side and outlet-side edges. The fluid directing projections are configured to aid in redirecting torque converter fluid returning from a turbine and reducing fluid separation as the fluid interacts with the stator blades and associated fluid directing projections thereby increasing efficiency and performance of the torque converter.Type: GrantFiled: February 4, 2014Date of Patent: January 10, 2017Assignee: FCA US LLCInventors: Michael Fingerman, Darrin C Raley, Prashant Modi, Marvin G Schiemann
-
Patent number: 9127759Abstract: A thrust washer for a torque converter, the thrust washer having a curved front surface with a plurality of grooves for increasing fluid flow between the inner diameter and the outer diameter of the thrust washer. This increased fluid flow reduces the buildup of back pressure within the torque converter enabling better operation thereof.Type: GrantFiled: November 19, 2012Date of Patent: September 8, 2015Assignee: FCA US LLCInventors: Michael Fingerman, Daljit Singh, Tomasz K Kietlinski, John G Rasico, Prashant Modi , Marvin G Schiemann, Willem S Haven
-
Publication number: 20150218956Abstract: A stator for use with a torque converter includes an inner annular shell, outer annular core, a plurality of stator blades and pressure-side fluid directing projections. The plurality stator blades are disposed around the inner shell in a spaced apart configuration and radially extend to the outer core. Each stator blade includes an inlet-side edge, an opposed outlet-side edge and opposed pressure-side and suction-side surfaces extending between the inlet-side and outlet-side edges. The pressure-side fluid directing projections outwardly project from the pressure-side surface in spaced relation to each other and each extend between the inlet-side and outlet-side edges. The fluid directing projections are configured to aid in redirecting torque converter fluid returning from a turbine and reducing fluid separation as the fluid interacts with the stator blades and associated fluid directing projections thereby increasing efficiency and performance of the torque converter.Type: ApplicationFiled: February 4, 2014Publication date: August 6, 2015Inventors: Michael Fingerman, Darrin C. Raley, Prashant Modi, Marvin G. Schiemann
-
Patent number: 8984140Abstract: A computer system establishes offloaded connections over a network between requestor applications running on client nodes and server applications running on a server node. The connections are established through an aggregated plurality of network resources of the server node. Each of the aggregated plurality of server resources is operable to provide offloaded connections over the network and each is assigned to a unique private IP address. Connect queries are generated on behalf of requesting applications. Each of the connect queries specifies one of the server applications using a first endpoint tuple. The first endpoint tuple includes one of one or more IP addresses identifying the server node publicly on the network and a first port number uniquely identifying the server application. A valid set of bypass endpoint tuples are obtained that are translated from the first endpoint tuple specified in the query. Each tuple of the set includes a different one of the assigned private IP addresses.Type: GrantFiled: December 14, 2004Date of Patent: March 17, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: Prashant Modi, Amitabha Biswas, Yiu Yip, Doris Sayon, Kathryn Hampton, Mehrdad Khalili
-
Publication number: 20140137546Abstract: A thrust washer for a torque converter, the thrust washer having a curved front surface with a plurality of grooves for increasing fluid flow between the inner diameter and the outer diameter of the thrust washer. This increased fluid flow reduces the buildup of back pressure within the torque converter enabling better operation thereof.Type: ApplicationFiled: November 19, 2012Publication date: May 22, 2014Inventors: Michael Fingerman, Daljit Singh, Tomasz K. Kietlinski, John G. Rasico, Prashant Modi, Marvin G. Schiemann, Willem S. Haven
-
Publication number: 20120030574Abstract: Systems, methodologies, media, and other embodiments associated with key-configured topology connection management are described. One exemplary system embodiment includes a logic for mapping a resource to a port through which it can be accessed and a logic for determining whether a requestor will be granted a connection to the machine on which the resource resides based, at least in part, on membership in a key-configured topology. Membership in the key-configured topology may be determined by a connection management logic analyzing a key provided by the requestor in a request related to accessing the resource. The key may be internally generated by a key maintenance logic.Type: ApplicationFiled: October 5, 2011Publication date: February 2, 2012Inventors: Prashant Modi, Kathryn Hampton
-
Patent number: 8078705Abstract: Systems, methodologies, media, and other embodiments associated with key-configured topology connection management are described. One exemplary system embodiment includes a logic for mapping a resource to a port through which it can be accessed and a logic for determining whether a requestor will be granted a connection to the machine on which the resource resides based, at least in part, on membership in a key-configured topology. Membership in the key-configured topology may be determined by a connection management logic analyzing a key provided by the requestor in a request related to accessing the resource. The key may be internally generated by a key maintenance logic.Type: GrantFiled: April 5, 2004Date of Patent: December 13, 2011Assignee: Hewlett-Packard Development Company, L.P.Inventors: Prashant Modi, Kathryn Hampton
-
Patent number: 7895329Abstract: In a flow control method, operation flow is controlled on a per connection basis. The method comprises managing a sending peer to prevent overflow of a receiving peer's receiver credits and allocating a number of send buffers at the sending peer greater than or equal to the maximum number of receiver credits that can be indicated by the receiving peer. The technique prevents the sending peer from overflowing its set of send buffers, arising due to re-use, without taking completions on operations queued to a Send Queue.Type: GrantFiled: January 12, 2006Date of Patent: February 22, 2011Assignee: Hewlett-Packard Development Company, L.P.Inventors: Amitabha Biswas, Prashant Modi
-
Patent number: 7580415Abstract: A computer system has an aggregated plurality of hybrid network resources. The hybrid resources support both offloaded connections with a first set of clients and conventional connections with a second set of clients. The conventional and offloaded connections are established through a common physical connection to a network. A unique protocol address is assigned to each of two or more active ones of the resources. A virtual layer2 device is exported for each of the two or more active resources. The assigned protocol addresses are exposed to a protocol stack residing in the operating system of the computer system. Each of the assigned protocol addresses are exposed through and associated with the virtual device exported for the one of the active resources to which the protocol address is assigned. One or more of the conventional connections are established with the second set of clients through the active resources and their respective virtual devices.Type: GrantFiled: April 27, 2005Date of Patent: August 25, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventors: Charles L. Hudson, Prashant Modi, Daniel Nathan Cripe
-
Patent number: 7554993Abstract: The disclosed embodiments relate to a communication device for use in a node of a system having a plurality of nodes. Each of the plurality of nodes may include network interface controllers (“NICs”) and each of the NICs may have a public identifier and a private identifier associated therewith. A first protocol stack may operate according to a first protocol that is associated with the public identifier and a second protocol stack may operate according to a second protocol that is associated with the private identifier. A storage device may associate the public identifier of one or more of the NICs with the first protocol stack and the private identifier of one or more of the NICs with the second protocol stack. Received messages that incorporate the public identifier may be directed to the first protocol stack and messages that incorporate the private identifier may be directed to the second protocol stack.Type: GrantFiled: March 27, 2003Date of Patent: June 30, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventors: Prashant Modi, Ambitabha Biswas, Kathryn Hampton, Yiu Yip, Dwight L. Barron, Jeffrey R. Hilland
-
Patent number: 7502333Abstract: Systems, methodologies, media, and other embodiments associated with pre-configured topology connection management are described. One exemplary system embodiment includes an interface logic configured to acquire information about a set of client nodes, to pre-configure a subset of the client nodes into a pre-configured topology, and to make available information about the pre-configured topology. The exemplary system may also include a logic for mapping a resource to a port through which it can be accessed and a logic for determining whether a requestor will be granted a connection to the machine on which the resource resides based, at least in part, on membership in the pre-configured topology. Membership in the pre-configured topology may be determined by a connection management logic analyzing a node identifier provided by the requestor in a request related to accessing the resource.Type: GrantFiled: March 23, 2004Date of Patent: March 10, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventors: Prashant Modi, Kathryn Hampton
-
Aggregation of network resources providing offloaded connections between applications over a network
Patent number: 7403535Abstract: A computer system aggregates a plurality of network resources of a computer system. The plurality of network resources forms a bypass stack operable to provide offloaded connections to one or more applications available on the computer system. Each of the applications is associated with a first port number. The computer system itself is addressable on the network by a public IP address. The system assigns private IP addresses to uniquely identify each of the plurality of network resources. The system creates a socket for each application by which the application can communicate with the network. The socket is associated with a first endpoint tuple that includes the public IP address and the first port number associated with the application for which the socket is created. The socket is further associated with a set of bypass endpoint tuples that are translated from the first endpoint tuple, each of the set including a different one of the private IP addresses.Type: GrantFiled: December 14, 2004Date of Patent: July 22, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Prashant Modi, Amitabha Biswas, Yiu Yip, Doris Sayon, Kathryn Hampton, Mehrdad Khalili, Robert R. Teisberg, Daniel N. Cripe, Charles L. Hudson -
Publication number: 20070162559Abstract: In a flow control method, operation flow is controlled on a per connection basis. The method comprises managing a sending peer to prevent overflow of a receiving peer's receiver credits and allocating a number of send buffers at the sending peer greater than or equal to the maximum number of receiver credits that can be indicated by the receiving peer. The technique prevents the sending peer from overflowing its set of send buffers, arising due to re-use, without taking completions on operations queued to a Send Queue.Type: ApplicationFiled: January 12, 2006Publication date: July 12, 2007Inventors: Amitabha Biswas, Prashant Modi
-
Publication number: 20060248191Abstract: A computer system has an aggregated plurality of hybrid network resources. The hybrid resources support both offloaded connections with a first set of clients and conventional connections with a second set of clients. The conventional and offloaded connections are established through a common physical connection to a network. A unique protocol address is assigned to each of two or more active ones of the resources. A virtual layer2 device is exported for each of the two or more active resources. The assigned protocol addresses are exposed to a protocol stack residing in the operating system of the computer system. Each of the assigned protocol addresses are exposed through and associated with the virtual device exported for the one of the active resources to which the protocol address is assigned. One or more of the conventional connections are established with the second set of clients through the active resources and their respective virtual devices.Type: ApplicationFiled: April 27, 2005Publication date: November 2, 2006Inventors: Charles Hudson, Prashant Modi, Daniel Cripe
-
Aggregation of network resources providing offloaded connections between applications over a network
Publication number: 20060165074Abstract: A computer system aggregates a plurality of network resources of a computer system. The plurality of network resources forms a bypass stack operable to provide offloaded connections to one or more applications available on the computer system. Each of the applications is associated with a first port number. The computer system itself is addressable on the network by a public IP address. The system assigns private IP addresses to uniquely identify each of the plurality of network resources. The system creates a socket for each application by which the application can communicate with the network. The socket is associated with a first endpoint tuple that includes the public IP address and the first port number associated with the application for which the socket is created. The socket is further associated with a set of bypass endpoint tuples that are translated from the first endpoint tuple, each of the set including a different one of the private IP addresses.Type: ApplicationFiled: December 14, 2004Publication date: July 27, 2006Inventors: Prashant Modi, Amitabha Biswas, Yiu Yip, Doris Sayon, Kathryn Hampton, Mehrdad Khalili, Robert Teisberg, Daniel Cripe, Charles Hudson -
Publication number: 20060129676Abstract: A computer system establishes offloaded connections over a network between requester applications running on client nodes and server applications running on a server node. The connections are established through an aggregated plurality of network resources of the server node. Each of the aggregated plurality of server resources is operable to provide offloaded connections over the network and each is assigned to a unique private IP address. Connect queries are generated on behalf of requesting applications. Each of the connect queries specifies one of the server applications using a first endpoint tuple. The first endpoint tuple includes one of one or more IP addresses identifying the server node publicly on the network and a first port number uniquely identifying the server application. A valid set of bypass endpoint tuples are obtained that are translated from the first endpoint tuple specified in the query. Each tuple of the set includes a different one of the assigned private IP addresses.Type: ApplicationFiled: December 14, 2004Publication date: June 15, 2006Inventors: Prashant Modi, Amitabha Biswas, Yiu Yip, Doris Sayon, Kathryn Hampton, Mehrdad Khalili
-
Publication number: 20050226248Abstract: Systems, methodologies, media, and other embodiments associated with key-configured topology connection management are described. One exemplary system embodiment includes a logic for mapping a resource to a port through which it can be accessed and a logic for determining whether a requestor will be granted a connection to the machine on which the resource resides based, at least in part, on membership in a key-configured topology. Membership in the key-configured topology may be determined by a connection management logic analyzing a key provided by the requestor in a request related to accessing the resource. The key may be internally generated by a key maintenance logic.Type: ApplicationFiled: April 5, 2004Publication date: October 13, 2005Inventors: Prashant Modi, Kathryn Hampton
-
Publication number: 20050213608Abstract: Systems, methodologies, media, and other embodiments associated with pre-configured topology connection management are described. One exemplary system embodiment includes an interface logic configured to acquire information about a set of client nodes, to pre-configure a subset of the client nodes into a pre-configured topology, and to make available information about the pre-configured topology. The exemplary system may also include a logic for mapping a resource to a port through which it can be accessed and a logic for determining whether a requestor will be granted a connection to the machine on which the resource resides based, at least in part, on membership in the pre-configured topology. Membership in the pre-configured topology may be determined by a connection management logic analyzing a node identifier provided by the requestor in a request related to accessing the resource.Type: ApplicationFiled: March 23, 2004Publication date: September 29, 2005Inventors: Prashant Modi, Kathryn Hampton
-
Publication number: 20040190533Abstract: The disclosed embodiments relate to a communication device for use in a node of a system having a plurality of nodes. Each of the plurality of nodes may include network interface controllers (“NICs”) and each of the NICs may have a public identifier and a private identifier associated therewith. A first protocol stack may operate according to a first protocol that is associated with the public identifier and a second protocol stack may operate according to a second protocol that is associated with the private identifier. A storage device may associate the public identifier of one or more of the NICs with the first protocol stack and the private identifier of one or more of the NICs with the second protocol stack. Received messages that incorporate the public identifier may be directed to the first protocol stack and messages that incorporate the private identifier may be directed to the second protocol stack.Type: ApplicationFiled: March 27, 2003Publication date: September 30, 2004Inventors: Prashant Modi, Ambitabha Biswas, Kathryn Hampton, Yiu Yip, Dwight L. Barron, Jeffrey R. Hilland