Patents by Inventor Satish Chandra Jha

Satish Chandra Jha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220231964
    Abstract: A resource management framework may be used to improve performance of dominant and non-dominant resources for edge multi-tenant applications. The resource management framework may include an admission control mechanism, which may be used to balance disproportionate resource allocations by controlling allocation of unconstrained resources proportional to the requested dominant resources based on resource availability. The admission control mechanism may provide ongoing monitoring of dominant and non-dominant resource utilization, such as using a hybrid centralized-distributed telemetry collection approach. The resource management framework may also include a lightweight resource monitoring and policy enforcement mechanism on distributed networking elements to reduce or eliminate the exploitations of non-dominant resources.
    Type: Application
    Filed: April 1, 2022
    Publication date: July 21, 2022
    Inventors: S M Iftekharul Alam, Satish Chandra Jha, Ned M. Smith, Vesh Raj Sharma Banjade, Kshitij Arun Doshi, Francesc Guim Bernat, Arvind Merwaday, Kuilin Clark Chen, Christian Maciocco
  • Publication number: 20220225227
    Abstract: System and techniques for network slice resiliency are described herein. An indication of a fault-attack-failure-outage (FAFO) event for a network slice may be received. Here, the network slice is one of multiple network slices. A capacity in a slice segment may be estimated to determine whether there is enough capacity to meet a service level agreement (SLA) of the multiple network slices based on the FAFO event. In this case, the slice segment is a set of physical resources shared by the multiple network slices. Operation of the slice segment may then be modified based on results from estimating the capacity in the slice segment to address impacts from the FAFO event.
    Type: Application
    Filed: April 1, 2022
    Publication date: July 14, 2022
    Inventors: Satish Chandra Jha, S M Iftekharul Alam, Vesh Raj Sharma Banjade, Ned M. Smith, Arvind Merwaday, Kshitij Arun Doshi, Francesc Guim Bernat, Liuyang Lily Yang, Kuilin Clark Chen, Christian Maciocco, Marcio Rogerio Juliato, Maruti Gupta Hyde, Manoj R. Sastry
  • Publication number: 20220224121
    Abstract: Systems and techniques for power management for a roadside unit (RSU) are described herein. In an example, a system may include a processor and memory coupled to the processor with instructions that cause the processor to receive multiple input factors. The multiple input factors corresponding an environmental condition at a location at which the RSU is located and at least one of a power saving preference for the RSU, a green energy usage preference for the RSU, a type of energy source available to the RSU, a quality of service requirement for the RSU, and a capability of the RSU. The processor may transmit a control packet, including parameters to control a mixture of green energy use by the RSU from a green energy power source and traditional energy use by the RSU from a traditional energy power source to the RSU.
    Type: Application
    Filed: March 31, 2022
    Publication date: July 14, 2022
    Inventors: Satish Chandra Jha, Kathiravetpillai Sivanesan, Andradige Silva, Suman A. Sehra, Leonardo Gomes Baltar, S M Iftekharul Alam, Vesh Raj Sharma Banjade
  • Patent number: 11381636
    Abstract: To address technical problems facing managing multiple sources of information from multiple vehicles, vehicular computing power may be exploited to process such information before sharing with others, which may help reduce network traffic overhead. A technical solution to improve this information processing over vehicular networks by using a hybrid Named Function Network (NFN) and Information Centric Network (ICN), such as in a hybrid NFN/ICN. An NFN may be used to orchestrate computations in a highly dynamic environment after decomposing the computations into a number of small functions. A function may include a digitally signed binary supplied by a car vendor or other trusted authority and executed within a controlled environment, such as a virtual machine, container, Java runtime-environment, or other controlled environment.
    Type: Grant
    Filed: June 28, 2019
    Date of Patent: July 5, 2022
    Assignee: Intel Corporation
    Inventors: S M Iftekharul Alam, Stepan Karpenko, Satish Chandra Jha, Yi Zhang, Kuilin Clark Chen, Kathiravetpillai Sivanesan, Gabriel Arrobo Vidal, Srikathyayani Srikanteswara, Hassnaa Moustafa, Eve M. Schooler, Sebastian Schoenberg, Venkatesan Nallampatti Ekambaram, Ravikumar Balakrishnan
  • Publication number: 20220191648
    Abstract: Systems and techniques for digital twin framework for next generation networks are described herein. A digital twin model may be generated for physical nodes of an edge network. The digital twin model may include a digital twin for a physical node of the physical nodes. An error may be identified of the physical node or the digital twin for the physical node. The digital twin model may be updated to halt communication with the physical node or the digital twin of the physical node. A path may be created to another physical node or a digital twin of the another physical node in the digital twin model.
    Type: Application
    Filed: December 20, 2021
    Publication date: June 16, 2022
    Inventors: Ned M. Smith, S M Iftekharul Alam, Vesh Raj Sharma Banjade, Satish Chandra Jha, Liuyang Lily Yang, Christian Maciocco, Nageen Himayat, Arvind Merwaday, Francesc Guim Bernat, Kshitij Arun Doshi
  • Publication number: 20220116335
    Abstract: A computing node includes network interface circuitry and processing circuitry. The processing circuitry assigns available computing resources to a plurality of slice contexts. Each slice context of the plurality includes resource allocations of the available computing resources associated with multiple communication networks. A first portion of the resource allocations is designated as dedicated resources and a second, remaining portion is designated as shared resources. A FAFO event associated with a workload is detected. The workload executes on a network slice instance (NSI) associated with a slice context of a subset of slice contexts. The configuration of the NSI is restored to a pre-FAFO event state based on reconfiguring one or both of the dedicated resources or the shared resources of the slice context based on the resource allocations of at least a second slice context in the subset of slice contexts.
    Type: Application
    Filed: December 21, 2021
    Publication date: April 14, 2022
    Inventors: Vesh Raj Sharma Banjade, Satish Chandra Jha, Ned M. Smith, S M Iftekharul Alam, Christian Maciocco, Liuyang Lily Yang, Mona Vij, Kshitij Arun Doshi, Francesc Guim Bernat, Clark Chen
  • Publication number: 20220114055
    Abstract: Systems and techniques for transparent dynamic reassembly of computing resource compositions are described herein. An indication may be obtained of an error state of a component of a computing system. An offload command may be transmitted to component management software of the computing system. An indication may be received that workloads to be executed using the component have been suspended. An administrative mode command may be transmitted to the component. The administrative mode command may place the component in partial shutdown to prevent the component from receiving non-administrative workloads. Data of the component may be synchronized with a backup component. Workloads from the component may be transferred to the backup component. An offload release command may be transmitted to the software of the computing system.
    Type: Application
    Filed: December 22, 2021
    Publication date: April 14, 2022
    Inventors: Kshitij Arun Doshi, Francesc Guim Bernat, Christian Maciocco, Ned M. Smith, S M Iftekharul Alam, Satish Chandra Jha, Vesh Raj Sharma Banjade, Alexander Bachmutsky
  • Patent number: 11296993
    Abstract: Systems and techniques for information centric network (ICN) approximate computation caching are described herein. For example, an interest packet that includes a feature set of input data may be received. A node may then perform a search of a local data store using the feature set to determine an approximate computation result cached in the local data store. Here, the approximate computation result may be based on input data that differs from the input data named in the interest packet. The node may then return the approximate computation result to an author of the interest packet in response to the search.
    Type: Grant
    Filed: June 28, 2019
    Date of Patent: April 5, 2022
    Assignee: Intel Corporation
    Inventors: S M Iftekharul Alam, Maria Ramirez Loaiza, Stepan Karpenko, Gabriel Arrobo Vidal, Satish Chandra Jha, Yi Zhang, Ned M. Smith, Zongrui Ding, Kuilin Clark Chen, Kathiravetpillai Sivanesan
  • Publication number: 20220094620
    Abstract: Systems and techniques for quality-of-service (QoS) in cellular information centric network (ICN) are described herein. An example system includes processing circuitry, and a memory that includes instructions, the instructions, when executed by the processing circuitry, cause the processing circuitry to obtain QoS characteristics for an ICN packet, apply the QoS characteristics to the ICN packet, and transmit the ICN packet over the cellular ICN in accordance with the QoS characteristics.
    Type: Application
    Filed: April 30, 2021
    Publication date: March 24, 2022
    Inventors: Yi Zhang, Zongrui Ding, S. M. Iftekharul Alam, Satish Chandra Jha, Gabriel Arrobo Vidal, Kuilin Clark Chen
  • Publication number: 20220077994
    Abstract: Systems and methods of providing DMRS for a UE are generally described. The DMRS locations in a resource unit of a Physical Resource Allocation of a shared channel are randomly determined, and the DMRS sequences randomly generated before transmission from a master UE to a wearable UE. The DMRS locations are disposed on different subcarriers and symbols in the resource unit and are repeated every k subframes or m resource units within the same subframe. In situations in which the collision/contention probability is relatively small, DMRS in control channels may be used rather than in the shared data channel.
    Type: Application
    Filed: October 25, 2021
    Publication date: March 10, 2022
    Inventors: Joonbeom Kim, Vesh Raj Sharma Banjade, Guangjie Li, Qian Li, Satish Chandra Jha, Hassan Ghozlan, Dawei Ying, Yaser M. Fouad, Lu Lu
  • Publication number: 20220021608
    Abstract: Various aspects of methods, systems, and use cases include en-route computing coordination. A method may include receiving a packet including a compute task and context information, identifying a destination node for the packet, and determining a route for the packet to the destination node. The route may include an intermediary node determined based on the context information and available resources at the intermediary node to execute the compute task of the packet at the intermediary node. The method may include forwarding the packet to a next device along the route.
    Type: Application
    Filed: September 23, 2021
    Publication date: January 20, 2022
    Inventors: Kshitij Arun Doshi, S M Iftekharul Alam, Francesc Guim Bernat, Satish Chandra Jha, Vesh Raj Sharma Banjade
  • Publication number: 20220014566
    Abstract: Various aspects of methods, systems, and use cases include security-based orchestration. A method may include evaluating, within a secure environment of an untrusted device, a preamble to determine a set of security requirements. The method may include, providing, to an attestation server, an indication of security parameters for services of the untrusted device corresponding to security requirements of the set of security requirements, and in response to receiving a confirmation from the attestation server, providing a request to the untrusted device outside the secure environment to generate a trusted domain including the services.
    Type: Application
    Filed: September 24, 2021
    Publication date: January 13, 2022
    Inventors: Francesc Guim Bernat, Hassnaa Moustafa, Kshitij Arun Doshi, Christian Maciocco, Vesh Raj Sharma Banjade, Satish Chandra Jha, S M Iftekharul Alam
  • Publication number: 20220014462
    Abstract: System and techniques for geographic routing are described herein. A node receives a data packet that includes map data, a sequence of geographic areas to a requestor, and a target geographic area. The node may then determine that it is within the target geographic area and start a transmit timer based on a next-hop geographic area. Here, the next-hop geographic area is determined from the sequence of geographic areas in the data packet. The node may then counts how many other nodes from the geographic area sent data packets while the transmit timer is running. When the transmit timer expires, the node may transmit a modified data packet when the number of data packets is less than a predefined threshold. Here, the modified data packet is the data packet updated to include local map data and the next-hop geographic area.
    Type: Application
    Filed: September 24, 2021
    Publication date: January 13, 2022
    Inventors: Hao Feng, Srikathyayani Srikanteswara, Yi Zhang, Satish Chandra Jha, S M Iftekharul Alam, Marcin Spoczynski, Alexander Bachmutsky, Nageen Himayat, Ned M. Smith, Kshitij Arun Doshi, Francesc Guim Bernat
  • Publication number: 20220014947
    Abstract: A computing node includes network interface circuitry and processing circuitry. The processing circuitry assigns available computing resources to a plurality of network slice instances (NSIs). Each of the NSIs is associated with a slice sub-context indicative of a network location of the available computing resources assigned to the NSI. A first portion of the resources is assigned to the NSI as dedicated resources and a second, remaining portion is assigned to the NSI as shared resources. A service instance is assigned to each of the NSIs. NSI records are generated based on the assigned service instance, the dedicated resources, and the shared resources. An NSI configuration is restored to a pre-FAFO event state based on the plurality of NSI records, the restored configuration using one or both of the dedicated resources and the shared resources.
    Type: Application
    Filed: September 24, 2021
    Publication date: January 13, 2022
    Inventors: Ned M. Smith, Satish Chandra Jha, Vesh Raj Sharma Banjade, S M Iftekharul Alam, Christian Maciocco, Marcio Rogerio Juliato, Manoj R. Sastry, Francesc Guim Bernat, Kshitij Arun Doshi
  • Publication number: 20220014948
    Abstract: A system is disclosed for quarantining and recovery of a network after an outage or in advance of a potential outage. Unaffected network slices are isolated and recovery is initiated by quarantine physical and virtual network functions. An AI model is trained based on recent events detected by sensors disposed throughout the network to determine whether to quarantine network slices, move services to unaffected network slices, or initiate recovery. Once the network is stabilized, resources that are specifically allocated for recovery and services are released and the traffic moved back to the recovered network slices.
    Type: Application
    Filed: September 24, 2021
    Publication date: January 13, 2022
    Inventors: Ned M. Smith, Satish Chandra Jha, Vesh Raj Sharma Banjade, S M Iftekharul Alam, Christian Maciocco, Marcio Rogerio Juliato, Manoj R. Sastry, Kshitij Arun Doshi, Srikathyayani Srikanteswara, Francesc Guim Bernat
  • Publication number: 20220014422
    Abstract: Systems and techniques for cross-layer automated fault tracking and anomaly detection are described herein. Anomaly data may be obtained from a plurality of layers of a network. Elements of the anomaly data may be identified that correspond to a data flow of an application executing on the network. An artificial intelligence model may be trained using the elements of the anomaly data to generate an impact score for the application. The impact score may be generated for the application by evaluating current network metrics using the artificial intelligence model. An operational component of the network may be modified based on the impact score.
    Type: Application
    Filed: September 23, 2021
    Publication date: January 13, 2022
    Inventors: Maruti Gupta Hyde, Yi Zhang, Christian Maciocco, Alexander Bachmutsky, Satish Chandra Jha, S M Iftekharul Alam, Nageen Himayat, Ravikumar Balakrishnan, Vesh Raj Sharma Banjade, Kshitij Arun Doshi, Francesc Guim Bernat, Amar Srivastava, Srikathyayani Srikanteswara
  • Publication number: 20220014923
    Abstract: Various aspects of methods, systems, and use cases include region identification of a malicious device based on crowdsourced locations. A method may include generating a grid of bins of a local radio coverage region, receiving location data from a plurality of devices in the local radio coverage region, and classifying locations of the plurality of devices with respect to the bins. The method may include associating the classified locations of the plurality of devices to the received location data for corresponding devices of the plurality of devices, and generating a model, from the associated classified locations and the received location data.
    Type: Application
    Filed: September 24, 2021
    Publication date: January 13, 2022
    Inventors: Vesh Raj Sharma Banjade, Satish Chandra Jha, Kathiravetpillai Sivanesan, Liuyang Lily Yang, Ned M. Smith, S M Iftekharul Alam, Arvind Merwaday, Francesc Guim Bernat, Kshitij Arun Doshi, Kuilin Clark Chen
  • Publication number: 20220014450
    Abstract: System and techniques for storage node recruitment in an information centric network (ICN) are described herein. An ICN node receives a storage interest packet that includes an indication differentiating the storage interest from other ICN interests. The ICN node forwards the storage interest packet and receives a storage data packet in response. Here, the storage data packet includes an indication that the storage data packet is not to be cached along with node information for a node that created the storage data packet. The ICN node may then transmit the storage data packet in accordance with a pending interest table (PIT) entry corresponding to the storage interest packet.
    Type: Application
    Filed: September 24, 2021
    Publication date: January 13, 2022
    Inventors: Srikathyayani Srikanteswara, Marcin Spoczynski, Yi Zhang, Hao Feng, Kshitij Arun Doshi, Francesc Guim Bernat, Ned M. Smith, Satish Chandra Jha, S M Iftekharul Alam, Vesh Raj Sharma Banjade, Alexander Bachmutsky, Nageen Himayat
  • Patent number: 11184457
    Abstract: Systems and techniques for information-centric network data cache management are described herein. A demand metric may be calculated for a content item requested from an information-centric network (ICN). A resistance metric may be calculated for each cache node of a set of cache nodes in the ICN based on the demand metric. A topology of the set of cache nodes may be evaluated to identify a transmission cost for each cache node of the set of cache nodes. An influencer node may be selected from the set of cache nodes based on the resistance metric for the influencer node and the transmission cost for the influencer node. The content item may be cached in a data cache of the influencer node.
    Type: Grant
    Filed: June 27, 2019
    Date of Patent: November 23, 2021
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Srikathyayani Srikanteswara, Kathiravetpillai Sivanesan, Eve M. Schooler, Satish Chandra Jha, Stepan Karpenko, Zongrui Ding, S M Iftekharul Alam, Yi Zhang, Kuilin Clark Chen, Gabriel Arrobo Vidal, Qian Li, Maria Ramirez Loaiza
  • Patent number: 11159298
    Abstract: Systems and methods of providing DMRS for a UE are generally described. The DMRS locations in a resource unit of a Physical Resource Allocation of a shared channel are randomly determined, and the DMRS sequences randomly generated before transmission from a master UE to a wearable UE. The DMRS locations are disposed on different subcarriers and symbols in the resource unit and are repeated every k subframes or m resource units within the same subframe. In situations in which the collision/contention probability is relatively small, DMRS in control channels may be used rather than in the shared data channel.
    Type: Grant
    Filed: October 28, 2016
    Date of Patent: October 26, 2021
    Assignee: Apple Inc.
    Inventors: Joonbeom Kim, Vesh Raj Sharma Banjade, Guangjie Li, Qian Li, Satish Chandra Jha, Hassan Ghozlan, Dawei Ying, Yaser M. Fouad, Lu Lu