Patents by Inventor Sourav Chakraborty

Sourav Chakraborty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200412620
    Abstract: Wireless configuration diagnosis framework may be provided. A label for a choreography comprising a sequence of frames to be exchanged between a first access point and a first client device may be created by a controller. A reference footprint for the choreography may be created. The reference footprint may comprise, for each frame of the sequence of frames, a frame type, an information element for the frame type, and a bit value for the information element. The reference footprint may be sent to the first access point. A plurality of frames exchanged between the first access point and the first client device associated with the choreography and an outcome for the choreography may be received from the first access point in response to the choreography being triggered.
    Type: Application
    Filed: June 27, 2019
    Publication date: December 31, 2020
    Applicant: Cisco Technology, Inc.
    Inventors: Manoj GUPTA, Sourav CHAKRABORTY, Venkata Prathyusha KUNTUPALLI, Rajesh S. PAZHYANNUR, Jerome HENRY
  • Publication number: 20200296016
    Abstract: Methods and apparatus for controlling monitoring operations performed by various devices, e.g., access points, in a communications network and for using information obtained by the devices which perform the monitoring are described. The methods are well suited for use in a system with a variety of access points, e.g., wireless and/or wired access points, which can be used to obtain access to the Internet or another network. An access point, which has been configured to monitor in accordance with received monitoring configuration information, e.g. on a per access point interface basis, captures packets, stores captured packets, and monitors to detect communications failures corresponding to communications devices using said access point. In response to detecting a communications failure, the access point generates, an event failure notification indicating the type of detected failure and sends the event failure notification to the network monitoring node along with corresponding captured packets.
    Type: Application
    Filed: May 28, 2020
    Publication date: September 17, 2020
    Inventors: Sourav Chakraborty, Deanna S. Hong
  • Patent number: 10715408
    Abstract: Methods and apparatus for controlling monitoring operations performed by various devices, e.g., access points, in a communications network and for using information obtained by the devices which perform the monitoring are described. The methods are well suited for use in a system with a variety of access points, e.g., wireless and/or wired access points, which can be used to obtain access to the Internet or another network. An access point, which has been configured to monitor in accordance with received monitoring configuration information, e.g. on a per access point interface basis, captures packets, stores captured packets, and monitors to detect communications failures corresponding to communications devices using said access point. In response to detecting a communications failure, the access point generates, an event failure notification indicating the type of detected failure and sends the event failure notification to the network monitoring node along with corresponding captured packets.
    Type: Grant
    Filed: January 31, 2019
    Date of Patent: July 14, 2020
    Assignee: Mist Systems, Inc.
    Inventors: Sourav Chakraborty, Deanna S. Hong
  • Publication number: 20200186477
    Abstract: Systems, methods, and devices are disclosed for providing a quality of service between nodes. A service provider can receive, from a first node of a customer network to an ingress node of a service provider network, packets bound for a second node on the customer network that is remote from the first node. The packets are mapped to a network segment according to a traffic type based on an identifier associated with the packets that identifies the traffic type of the packets. The packets are sent via their mapped network segment to an egress node with connectivity to the second node of the customer network according to a quality of service associated with the traffic type identified by the identifier.
    Type: Application
    Filed: February 12, 2020
    Publication date: June 11, 2020
    Inventors: Gangadharan Byju Pularikkal, Santosh Ramrao Patil, Mark Grayson, Swaminathan Anantha, Sourav Chakraborty
  • Publication number: 20200145402
    Abstract: A method is performed at a gateway device including one or more processors and a non-transitory memory. The method includes, receiving, from a first wireless network, a first get authentication token request, where the first get authentication token request includes network information of a second wireless network and information of a first user equipment (UE). The method further includes forwarding the first get authentication token request to the second wireless network in response to receiving the first get authentication token request. The method additionally includes receiving a first authentication token from the second wireless network. The method also includes forwarding the first authentication token to the first UE via the first wireless network in order to associate the first UE with the second wireless network.
    Type: Application
    Filed: November 1, 2018
    Publication date: May 7, 2020
    Inventors: Swaminathan ANANTHA, Santosh Ramrao PATIL, Gangadharan Byju PULARIKKAL, Mark GRAYSON, Sourav CHAKRABORTY
  • Publication number: 20200067844
    Abstract: Systems, methods, and devices are disclosed for providing a quality of service between nodes. A service provider can receive, from a first node of a customer network to an ingress node of a service provider network, packets bound for a second node on the customer network that is remote from the first node. The packets are mapped to a network segment according to a traffic type based on an identifier associated with the packets that identifies the traffic type of the packets. The packets are sent via their mapped network segment to an egress node with connectivity to the second node of the customer network according to a quality of service associated with the traffic type identified by the identifier.
    Type: Application
    Filed: August 23, 2018
    Publication date: February 27, 2020
    Inventors: Gangadharan Byju Pularikkal, Santosh Ramrao Patil, Mark Grayson, Swaminathan Anantha, Sourav Chakraborty
  • Patent number: 10567293
    Abstract: Systems, methods, and devices are disclosed for providing a quality of service between nodes. A service provider can receive, from a first node of a customer network to an ingress node of a service provider network, packets bound for a second node on the customer network that is remote from the first node. The packets are mapped to a network segment according to a traffic type based on an identifier associated with the packets that identifies the traffic type of the packets. The packets are sent via their mapped network segment to an egress node with connectivity to the second node of the customer network according to a quality of service associated with the traffic type identified by the identifier.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: February 18, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Gangadharan Byju Pularikkal, Santosh Ramrao Patil, Mark Grayson, Swaminathan Anantha, Sourav Chakraborty
  • Publication number: 20190387049
    Abstract: The disclosed technology relates to systems and methods for automatically scaling down network resources, such as servers or gateway instances, based on predetermined thresholds. A system is configured to detect a reduction in one or more network metrics related to a first server, and instruct the first server to issue a rekey request to a plurality of devices connected to the first server. The system is further configured to instruct a load balancer to route to at least one other server responses from the plurality of devices to the rekey request, and determine a number of connections remaining between the first server and the plurality of devices. The system may be further configured to instruct the load balancer to terminate the first server based on the detected number of connections remaining between the first server and the plurality of devices.
    Type: Application
    Filed: June 15, 2018
    Publication date: December 19, 2019
    Inventors: Santosh Ramrao Patil, Swaminathan Anantha, Sourav Chakraborty, Shyam Sundar Vaidyanathan, Gangadharan Byju Pularikkal
  • Publication number: 20190268338
    Abstract: In one embodiment, an IoT server includes: processing circuitry, an I/O module operative to communicate with at least an IoT device and a vendor network server, and an onboarding application and operative to at least: receive an onboarding request from the IoT device via the I/O module, send a confirmation request to the vendor network server via the I/O module, where the confirmation request indicates a request to confirm an identity of the IoT device according to a connection to a network device authenticated by the vendor network server, receive a confirmation response from the vendor network server via the I/O module, where the confirmation response indicates whether the IoT device is connected to the network device, and if the confirmation response is a positive confirmation response that indicates that the IoT device is connected to the network device, onboard the IoT device for participation in an IoT-based system.
    Type: Application
    Filed: February 28, 2018
    Publication date: August 29, 2019
    Inventors: Santosh Ramrao PATIL, Gangadharan Byju PULARIKKAL, Sourav CHAKRABORTY, Madhusudan NANJANAGUD
  • Publication number: 20190166522
    Abstract: Methods and apparatus for controlling monitoring operations performed by various devices, e.g., access points, in a communications network and for using information obtained by the devices which perform the monitoring are described. The methods are well suited for use in a system with a variety of access points, e.g., wireless and/or wired access points, which can be used to obtain access to the Internet or another network. An access point, which has been configured to monitor in accordance with received monitoring configuration information, e.g. on a per access point interface basis, captures packets, stores captured packets, and monitors to detect communications failures corresponding to communications devices using said access point. In response to detecting a communications failure, the access point generates, an event failure notification indicating the type of detected failure and sends the event failure notification to the network monitoring node along with corresponding captured packets.
    Type: Application
    Filed: January 31, 2019
    Publication date: May 30, 2019
    Inventors: Sourav Chakraborty, Deanna S. Hong
  • Patent number: 10257750
    Abstract: Methods and apparatus for controlling monitoring operations performed by various devices, e.g., access points, in a communications network and for using information obtained by the devices which perform the monitoring are described. The methods are well suited for use in a system with a variety of access points, e.g., wireless and/or wired access points, which can be used to obtain access to the Internet or another network. An access point, which has been configured to monitor in accordance with received monitoring configuration information, e.g. on a per access point interface basis, captures packets, stores captured packets, and monitors to detect communications failures corresponding to communications devices using said access point. In response to detecting a communications failure, the access point generates, an event failure notification indicating the type of detected failure and sends the event failure notification to the network monitoring node along with corresponding captured packets.
    Type: Grant
    Filed: November 15, 2016
    Date of Patent: April 9, 2019
    Assignee: MIST SYSTEMS, INC.
    Inventors: Sourav Chakraborty, Deanna S. Hong
  • Patent number: 10057341
    Abstract: Techniques are provided for a peer-to-peer web traffic management. A first mapping between identifiers and peers in a network is established. Upon receiving a first request associated with a first identifier and classifiers, based, at least in part, on the first identifier, a first peer retrieves a first global counter snapshot and a first local increment counter, and uses them to determine whether the first peer can service the first request. If the determination is positive, then the first peer services the first request, and updates the first local increment counter. If the first local increment counter exceeded a threshold value, then the first local increment counter is transmitted to a second peer, and then reset to zero. In response to the first peer receiving a first global counter associated with the first global counter snapshot, the first global counter snapshot is updated with the first global counter.
    Type: Grant
    Filed: March 17, 2017
    Date of Patent: August 21, 2018
    Assignee: Excalibur IP, LLC
    Inventors: Aman Teja, Vineeth Chandran, Prashant R. Kumar, Sourav Chakraborty
  • Publication number: 20180139086
    Abstract: Methods and apparatus for controlling monitoring operations performed by various devices, e.g., access points, in a communications network and for using information obtained by the devices which perform the monitoring are described. The methods are well suited for use in a system with a variety of access points, e.g., wireless and/or wired access points, which can be used to obtain access to the Internet or another network. An access point, which has been configured to monitor in accordance with received monitoring configuration information, e.g. on a per access point interface basis, captures packets, stores captured packets, and monitors to detect communications failures corresponding to communications devices using said access point. In response to detecting a communications failure, the access point generates, an event failure notification indicating the type of detected failure and sends the event failure notification to the network monitoring node along with corresponding captured packets.
    Type: Application
    Filed: November 15, 2016
    Publication date: May 17, 2018
    Inventors: Sourav Chakraborty, Deanna S. Hong
  • Publication number: 20170195413
    Abstract: Techniques are provided for a peer-to-peer web traffic management. A first mapping between identifiers and peers in a network is established. Upon receiving a first request associated with a first identifier and classifiers, based, at least in part, on the first identifier, a first peer retrieves a first global counter snapshot and a first local increment counter, and uses them to determine whether the first peer can service the first request. If the determination is positive, then the first peer services the first request, and updates the first local increment counter. If the first local increment counter exceeded a threshold value, then the first local increment counter is transmitted to a second peer, and then reset to zero. In response to the first peer receiving a first global counter associated with the first global counter snapshot, the first global counter snapshot is updated with the first global counter.
    Type: Application
    Filed: March 17, 2017
    Publication date: July 6, 2017
    Inventors: AMAN TEJA, VINEETH CHANDRAN, PRASHANT R. KUMAR, SOURAV CHAKRABORTY
  • Patent number: 9621648
    Abstract: Techniques are provided for a peer-to-peer web traffic management. A first mapping between identifiers and peers in a network is established. Upon receiving a first request associated with a first identifier and classifiers, based, at least in part, on the first identifier, a first peer retrieves a first global counter snapshot and a first local increment counter, and uses them to determine whether the first peer can service the first request. If the determination is positive, then the first peer services the first request, and updates the first local increment counter. If the first local increment counter exceeded a threshold value, then the first local increment counter is transmitted to a second peer, and then reset to zero. In response to the first peer receiving a first global counter associated with the first global counter snapshot, the first global counter snapshot is updated with the first global counter.
    Type: Grant
    Filed: August 3, 2015
    Date of Patent: April 11, 2017
    Assignee: Yahoo! Inc.
    Inventors: Aman Teja, Vineeth Chandran, Prashant R. Kumar, Sourav Chakraborty
  • Publication number: 20150341433
    Abstract: Techniques are provided for a peer-to-peer web traffic management. A first mapping between identifiers and peers in a network is established. Upon receiving a first request associated with a first identifier and classifiers, based, at least in part, on the first identifier, a first peer retrieves a first global counter snapshot and a first local increment counter, and uses them to determine whether the first peer can service the first request. If the determination is positive, then the first peer services the first request, and updates the first local increment counter. If the first local increment counter exceeded a threshold value, then the first local increment counter is transmitted to a second peer, and then reset to zero. In response to the first peer receiving a first global counter associated with the first global counter snapshot, the first global counter snapshot is updated with the first global counter.
    Type: Application
    Filed: August 3, 2015
    Publication date: November 26, 2015
    Inventors: AMAN TEJA, VINEETH CHANDRAN, PRASHANT R. KUMAR, SOURAV CHAKRABORTY
  • Patent number: 9100362
    Abstract: Techniques are provided for a peer-to-peer web traffic management. A first mapping between identifiers and peers in a network is established. Upon receiving a first request associated with a first identifier and classifiers, based, at least in part, on the first identifier, a first peer retrieves a first global counter snapshot and a first local increment counter, and uses them to determine whether the first peer can service the first request. If the determination is positive, then the first peer services the first request, and updates the first local increment counter. If the first local increment counter exceeded a threshold value, then the first local increment counter is transmitted to a second peer, and then reset to zero. In response to the first peer receiving a first global counter associated with the first global counter snapshot, the first global counter snapshot is updated with the first global counter.
    Type: Grant
    Filed: July 6, 2012
    Date of Patent: August 4, 2015
    Assignee: Yahoo! Inc.
    Inventors: Aman Teja, Vineeth Chandran, Prashant R Kumar, Sourav Chakraborty
  • Publication number: 20140012906
    Abstract: Techniques are provided for a peer-to-peer web traffic management. A first mapping between identifiers and peers in a network is established. Upon receiving a first request associated with a first identifier and classifiers, based, at least in part, on the first identifier, a first peer retrieves a first global counter snapshot and a first local increment counter, and uses them to determine whether the first peer can service the first request. If the determination is positive, then the first peer services the first request, and updates the first local increment counter. If the first local increment counter exceeded a threshold value, then the first local increment counter is transmitted to a second peer, and then reset to zero. In response to the first peer receiving a first global counter associated with the first global counter snapshot, the first global counter snapshot is updated with the first global counter.
    Type: Application
    Filed: July 6, 2012
    Publication date: January 9, 2014
    Inventors: Aman Teja, Vineeth Chandran, Prashant R. Kumar, Sourav Chakraborty