Patents by Inventor Sumanta SAHA

Sumanta SAHA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160344640
    Abstract: A method is disclosed for downscaling a deep packet inspection service in a network apparatus. The method comprises receiving data flow in a gateway virtual machine via a software defined networking switch, and keeping track of data flow and control flow and their state per subscriber. If needed, a new deep packet inspection virtual machine is selected for the data flow. The software defined networking switch is informed on the selection of the new deep packet inspection virtual machine. The new deep packet inspection virtual machine is instructed to re-create a flow identification for the data flow to ensure deep packet inspection service continuity.
    Type: Application
    Filed: February 4, 2014
    Publication date: November 24, 2016
    Inventors: Jani Olavi SÖDERLUND, Erkki Juhani HIETALA, Sumanta SAHA, Niko Markus SAVOLAINEN, Tommy Johannes LINDGREN
  • Publication number: 20160330136
    Abstract: There is provided allocating cloud computing resources to process a user session by a gateway in a mobile communications network, and allocating the cloud computing resources in pairs to user sessions. Rules for the pair of allocated resources are determined such that incoming control plane traffic associated with the session is forwarded to the both cloud computing resources forming the pair.
    Type: Application
    Filed: January 9, 2014
    Publication date: November 10, 2016
    Inventors: Sumanta SAHA, Tommy Johannes LINDGREN, Jani Olavi SODERLUND, Niko Markus SAVOLAINEN
  • Publication number: 20160219082
    Abstract: In accordance with an example embodiment of the present invention, a method is provided for receiving (414) from a gateway apparatus an intercept request regarding user equipment in the communication system; creating or modifying a processing rule regarding the user equipment by including interception in the rule; transmitting (502) to a network switch processing user equipment connections a command to clone and encrypt each signalling or data packet of the user equipment connection and to transmit the encrypted signalling and data packets to a given network apparatus.
    Type: Application
    Filed: September 9, 2013
    Publication date: July 28, 2016
    Inventors: Tommy Johannes LINDGREN, Sumanta SAHA, Jani Olavi SODERLUND, Niko Markus SAVOLAINEN
  • Publication number: 20160212021
    Abstract: Methods, systems, and apparatus for network monitoring and analytics are disclosed. The methods, systems, and apparatus for network monitoring and analytics perform highly probable identification of related messages using one or more sparse hash function sets. Highly probable identification of related messages enables a network monitoring and analytics system to trace the trajectory of a message traversing the network and measure the delay for the message between observation points. The sparse hash function value, or identity, enables a network monitoring and analytics system to identify the transit path, transit time, entry point, exit point, and/or other information about individual packets and to identify bottlenecks, broken paths, lost data, and other network analytics by aggregating individual message data.
    Type: Application
    Filed: September 17, 2014
    Publication date: July 21, 2016
    Inventors: Charles F. Barry, Sumanta Saha
  • Publication number: 20160204996
    Abstract: A method is disclosed for subscriber tracing in a communications system. The method comprises receiving, in a gateway apparatus (GGSN, PGW) from an O&M unit, a command message for triggering a subscriber tracing functionality. The gateway apparatus (GGSN, PGW) instructs a network node to clone each packet having a certain IP address or TEID value, in order the network node to replicate each user plane packet belonging to a session to be monitored and to send the replicated packets directly to the O&M unit for further analysis. The gateway apparatus (GGSN, PGW) collects control plane data related to the session to be monitored, and transmits the collected control plane data directly to the O&M unit in order the collected control plane data to be correlated in the O&M unit to user plane data.
    Type: Application
    Filed: August 13, 2014
    Publication date: July 14, 2016
    Inventors: Tommy Johannes LINDGREN, Jani Olavi SODERLUND, Sumanta SAHA, Niko Markus SAVOLAINEN
  • Publication number: 20160197832
    Abstract: Methods, systems, and apparatus for network monitoring and analytics are disclosed. The methods, systems, and apparatus for network monitoring and analytics perform highly probable identification of related messages using one or more sparse hash function sets. Highly probable identification of related messages enables a network monitoring and analytics system to trace the trajectory of a message traversing the network and measure the delay for the message between observation points. The sparse hash function value, or identity, enables a network monitoring and analytics system to identify the transit path, transit time, entry point, exit point, and/or other information about individual packets and to identify bottlenecks, broken paths, lost data, and other network analytics by aggregating individual message data.
    Type: Application
    Filed: March 17, 2016
    Publication date: July 7, 2016
    Inventors: Charles F. Barry, Sumanta Saha
  • Publication number: 20150358248
    Abstract: A method including obtaining a plurality of data sets each describing a specific virtualized network function, acquiring and processing control information related to at least one of a communication traffic situation in a communication network for which at least one virtualized network function is implementable and a resource usage situation in a virtualization infrastructure in which at least one virtualized network function can be instantiated, and adjusting an amount and type of at least one virtualized network function instantiated in the virtualization infrastructure for usage in the communication network by, based on the processed control information, selecting at least one virtualized network function from the obtained data sets, instantiating the selected at least one virtualized network function.
    Type: Application
    Filed: June 2, 2015
    Publication date: December 10, 2015
    Inventors: Sumanta SAHA, Wolfgang HAHN