Patents by Inventor Sumeet Singh
Sumeet Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8639793Abstract: Techniques are provided to move the services performed on one device to another device in a cloud computing system for a variety of reasons including failure, maintenance or upgrade of the device. A notification is received that services performed by an impacted device in a domain of a plurality of hierarchical domains need to be moved. A determination is made as to whether there are replacement resources available in the domain to perform the services, and if so, the replacement resources are automatically rendered to perform the services. The process continues to higher level domains that have a view into the capabilities of subordinate domains in order to determine where to move the services within the cloud computing system.Type: GrantFiled: March 4, 2011Date of Patent: January 28, 2014Assignee: Cisco Technology, Inc.Inventors: Sukhdev S. Kapur, Ethan M. Spiegel, Subrata Banerjee, Sumeet Singh, Ashok Ganesan
-
Publication number: 20130338833Abstract: Embodiments of the invention provide a pipeline analysis system for analyzing a pipeline dataset to determine compliance with desired maximum allowable pipeline operating pressures. In some embodiments, pipeline component data can correspond to an existing or planned physical pipeline. In some embodiments, the pipeline analysis system can enable revision of the pipeline component data to specify at least one pipeline component having at least one different characteristic than was originally specified in the dataset or specify pipeline components that are in compliance with desired maximum allowable pipeline operating pressures. In some embodiments, the pipeline analysis system comprises a processor, and at least one non-transitory computer-readable storage medium for tangibly storing thereon program logic for execution by the processor.Type: ApplicationFiled: June 18, 2013Publication date: December 19, 2013Inventors: Jose A. Medina, Sumeet Singh, Thomas R. Ford, Jeffrey D. Allen
-
Publication number: 20130337769Abstract: A system and method are described that enable policy-implementing modules in a mobile wireless network to identify the location of a user and render policy-based (e.g., quality of service, accounting, throttling, etc.) decisions based upon a variety of additional information such as: home network availability in a market, user class, time of day, network congestion, application type, etc. The system renders policy decisions, based upon geo-spatial location information, by receiving a mobile wireless data message including a geospatial identifier. Thereafter, a policy engine renders a data service policy decision by applying a policy to the geospatial identifier. The potential classifications identified by the data service policy decision include an in-market roaming mode wherein a data usage is treated as non-roaming, even though associated with a roaming data session, based upon an in-market location specified by the geospatial location information.Type: ApplicationFiled: June 14, 2012Publication date: December 19, 2013Applicant: United State Cellular CorporationInventors: Sumeet Singh Bhatia, Claudio Taglienti, Narayanan Haran, Narothum Saxena, Michael Irizarry
-
Publication number: 20130171964Abstract: A way for managing use of a mobile wireless device in a tethering configuration is described. The disclosed mobile wireless system is configured to receive a message packet issued from a device tethered to the mobile wireless device. The system determines whether the mobile wireless device is permitted to pass messages on behalf of tethered devices by referencing a profile with which the mobile device is associated. The mobile wireless system discards the received message packet in response to determining from the profile that the mobile wireless device is not permitted to pass messages on behalf of tethered devices. Moreover, a number of ways for monetizing the supported tethering mode are described such that a service provider is adequately compensated for the increased demand on the mobile wireless network resources arising from support for the tethering mode of operation for a mobile wireless device.Type: ApplicationFiled: December 29, 2011Publication date: July 4, 2013Applicant: United States Cellular CorporationInventors: Sumeet Singh Bhatia, Mankesh S. Ahluwalia, Narothum Saxena, Michael Shannon Irizarry
-
Publication number: 20130171959Abstract: Managing data resource utilization in a wireless network environment comprising a first data network and a second data network is described herein. The described management infrastructure and method incorporates monitoring data usage of a wireless network subscriber over the first data network, determining that the data usage over the first data network meets a specified threshold, and, in response to the determination that usage has reached the specified threshold, administratively disconnecting the wireless network subscriber from the first data network so as to cause a data session of the wireless network subscriber to be reassigned to the second data network.Type: ApplicationFiled: December 28, 2011Publication date: July 4, 2013Applicant: United States Cellular CorporationInventors: Mankesh Ahluwalia, Sumeet Singh Bhatia, Jaideep Abichandani, Narothum Saxena, Michael Shannon Irizarry
-
Publication number: 20130128948Abstract: This disclosure relates to techniques for performing display mode based video encoding to reduce power consumption in a source device of a Wireless Display (WD) system. More specifically, the techniques enable the source device to select an encoding process based on whether the video data to be encoded is in a static display mode or a dynamic display mode. For example, when the video data is in the static display mode, the source device selects a static encoding process that reduces an amount of video data processing and compression, which in turn reduces power consumption at the source device. When the video data is in the dynamic mode, the source device may select a conventional dynamic encoding process. The source device encodes the video data according to the selected encoding process, and transmits the encoded video data to one or more sink devices in the WD system for display.Type: ApplicationFiled: November 23, 2011Publication date: May 23, 2013Applicant: QUALCOMM INCORPORATEDInventors: Khosro M. Rabii, Sumeet Singh Sethi
-
Publication number: 20130074181Abstract: Techniques are provided herein for detecting that virtual data center services provided to one of at least two customers are being subjected to an attack, wherein the virtual data center services are provided to the least two customers using a same first set of physical servers via a first network element such as a physical access switch, and responsive to detecting that virtual data center services provided to the one of the at least two customers are being subjected to an attack (e.g., a virus or denial of service attack), the technique causes the virtual data center services provided to the one of the at least two customers to be migrated to, e.g., instantiated on, a second set of physical servers that is not accessible via the first network element.Type: ApplicationFiled: September 19, 2011Publication date: March 21, 2013Applicant: CISCO TECHNOLOGY, INC.Inventor: Sumeet Singh
-
Publication number: 20130055091Abstract: Graph-based virtual data center requests are described. In some implementations, a method includes displaying a graph having graphical elements representing network resources. A user can select one of the graphical elements and provide input specifying requirements for a network resource corresponding to the selected graphical element. A virtual data center request can be generated based on the graph and the specified requirements. The virtual data center request can be transmitted to a data center device for processing. In some implementations, the virtual data center request can be an extensible markup language (XML) representation of the graph that includes the specified service requirements. In some implementations, a data center server can receive a graph-based virtual data center request and allocate data center resources based on the virtual data center request.Type: ApplicationFiled: August 23, 2011Publication date: February 28, 2013Applicant: CISCO TECHNOLOGY, INC.Inventors: Debojyoti Dutta, Subrata Banerjee, Ethan Spiegel, Sumeet Singh
-
Patent number: 8379639Abstract: Apparatuses, methods, and other embodiments associated with packet identification are described. One example apparatus includes a packet selection logic to identify packets associated with a data stream. The example apparatus may also include a set of packet classification logics. A packet classification logic may generate a signal as a function of whether an attribute associated with the packet matches an attribute associated with packets generated by a tested application.Type: GrantFiled: July 22, 2009Date of Patent: February 19, 2013Assignee: Cisco Technology, Inc.Inventors: Debojyoti Dutta, Sumeet Singh, Pradeep Sudame, Sundar Rajan
-
Publication number: 20130003741Abstract: In one embodiment, at a packet-forwarding engine for receiving packet flows and conditionally routing packets in the packet flows to one or more applications, a method includes receiving from a particular one of the applications a request that requests the packet-forwarding engine not to route the particular one of the packet flows to the particular one of the applications and identifies one or more conditions for routing particular ones of the packets in the particular one of the packet flows to the particular one of the applications. The method further includes, receiving a particular packet in the particular one of the packet flows, determining whether one or more of the conditions for routing the particular packet to the particular one of the applications are met, and routing or not routing the particular packet to the particular one of the applications based on the determination.Type: ApplicationFiled: September 14, 2012Publication date: January 3, 2013Applicant: Cisco Technology, Inc.Inventors: Sumeet Singh, Muninder Singh Sambi
-
Patent number: 8345743Abstract: Techniques for video encoding and decoding channel switch frames (CSF) to enable acquisition and re/synchronization of the video stream while preserving compression efficiency is provided. Systems and methods to process multimedia data enabling channel switching are presented. The systems generate a CSF with one or more network adaptation layer (NAL) units as a random access point (RAP) frame. Back-to-back frames are transmitted which include the CSF and a non-RAP frame, each having the same frame ID number.Type: GrantFiled: November 14, 2007Date of Patent: January 1, 2013Assignee: QUALCOMM IncorporatedInventors: Fang Shi, Christopher John Bennett, Serafim S. Loukas, Jr., Brian William Orr, Vijayalakshmi R. Raveendran, Scott T. Swazey, Amnon Silberger, Thadi M. Nagaraj, Gordon Kent Walker, David Brackman, Fang Liu, Sumeet Singh Sethi, Ramkumar Sampathkumar
-
Publication number: 20120303790Abstract: At a data switching device in a data center, it is detected whether a host has connected to a cloud computing network of which the data switching device and the data center are components. The detection is performed without directly communicating with the host. The data switching device determines properties of the host and generates a message comprising data representative of the properties of the host. The message is sent from the data switching device to a node in the cloud computing network that is configured to manage components of the cloud computing network associated with the host.Type: ApplicationFiled: May 23, 2011Publication date: November 29, 2012Applicant: CISCO TECHNOLOGY, INC.Inventors: Sumeet Singh, Sanjay Thyamagundalu, Sanjay Kumar Hooda, Muninder Singh Sambi, Ashok Ganesan
-
Patent number: 8296842Abstract: Network worms or viruses are a growing threat to the security of public and private networks and the individual computers that make up those networks. A content sifting method if provided that automatically generates a precise signature for a worm or virus that can then be used to significantly reduce the propagation of the worm elsewhere in the network or eradicate the worm altogether. The content sifting method is complemented by a value sampling method that increases the throughput of network traffic that can be monitored. Together, the methods track the number of times invariant strings appear in packets and the network address dispersion of those packets including variant strings. When an invariant string reaches a particular threshold of appearances and address dispersion, the string is reported as a signature for suspected worm.Type: GrantFiled: December 1, 2004Date of Patent: October 23, 2012Assignee: The Regents of the University of CaliforniaInventors: Sumeet Singh, George Varghese, Cristi Estan, Stefan Savage
-
Patent number: 8295284Abstract: In one embodiment, at a packet-forwarding engine for receiving packet flows and conditionally routing packets in the packet flows to one or more applications, a method includes receiving from a particular one of the applications a request that requests the packet-forwarding engine not to route the particular one of the packet flows to the particular one of the applications and identifies one or more conditions for routing particular ones of the packets in the particular one of the packet flows to the particular one of the applications. The method further includes, receiving a particular packet in the particular one of the packet flows, determining whether one or more of the conditions for routing the particular packet to the particular one of the applications are met, and routing or not routing the particular packet to the particular one of the applications based on the determination.Type: GrantFiled: February 2, 2010Date of Patent: October 23, 2012Assignee: Cisco Technology, Inc.Inventors: Sumeet Singh, Muninder Singh Sambi
-
Publication number: 20120226790Abstract: In one embodiment a method includes at first a network device, identifying an attribute of the first network device, selecting a function that defines how the attribute is to be summarized together with a same attribute of a second network device, generating a message that comprises a set of information comprising an identification of the attribute and the function, and sending the message to, e.g., a next higher node in a network hierarchy of which the network device is a part. Multiple such messages may be received at an aggregation node that then summarizes the attributes according to respective functions, and sends or publishes a summarized version of the attributes to a still next higher node in the network hierarchy.Type: ApplicationFiled: March 3, 2011Publication date: September 6, 2012Applicant: CISCO TECHNOLOGY, INC.Inventors: Sumeet Singh, Ashok Ganesan, Erik David Ludvigson, Subrata Banerjee, Ethan M. Spiegel, Sukhdev S. Kapur
-
Publication number: 20120226797Abstract: Techniques are provided herein for a device in a network to receive information configured to indicate a control plane traffic load level for one or more server devices that are configured to manage traffic for messaging and presence clients communicating via a messaging and presence protocol. The control plane traffic is associated with the messaging and presence protocol. A determination is made as to when the control plane traffic load level has become unbalanced among the two or more server devices and in response to determining that the control plane traffic load level has become unbalanced, sending a transfer message to one or more clients comprising information configured to initiate migration of one or more clients from a server device that is relatively overloaded to a server device that is relatively underloaded in order to balance the control plane traffic load level among the two or more server devices.Type: ApplicationFiled: March 1, 2011Publication date: September 6, 2012Applicant: CISCO TECHNOLOGY, INC.Inventors: Arpan K. Ghosh, Sumeet Singh, Sukhdev S. Kapur, Subrata Banerjee
-
Publication number: 20120226799Abstract: Systems and methods are provided for receiving at a provider edge routing device capabilities data representative of capabilities of computing devices disposed in a data center, the capabilities data having been published by an associated local data center edge device, and advertising, by the provider edge routing device, the capabilities data to other provider edge routing devices in communication with one another in a network of provider edge routing devices. The provider edge routing device also receives respective capabilities data from each of the other provider edge routing devices, wherein each of the other provider edge routing devices is associated with a respective local data center via a corresponding data center edge device, and stores all the capabilities data in a directory of capabilities.Type: ApplicationFiled: March 3, 2011Publication date: September 6, 2012Applicant: CISCO TECHNOLOGY, INC.Inventors: Sukhdev S. Kapur, Subrata Banerjee, Ethan Spiegel, Ashok Ganesan, Joshua Merrill, Sumeet Singh
-
Publication number: 20120226789Abstract: A cloud computing system is provided comprising a plurality of data centers, each data center comprising a plurality of pods each of which comprises network, compute, storage and service node devices. At a designated device of a data center, data center level capabilities summary data is generated that summarizes the capabilities of the data center. Messages advertising the data center level capabilities summary data is sent from a designated device of each data center to a designated device at a provider edge network level of the computing system. At the designated device at the provider edge network level, provider edge network level capabilities summary data is generated that summarizes capabilities of compute, storage and network devices for each data center as a whole and without exposing individual compute, storage and service node devices in each data center.Type: ApplicationFiled: March 3, 2011Publication date: September 6, 2012Applicant: CISCO TECHNOLOGY, INC.Inventors: Ashok Ganesan, Subrata Banerjee, Ethan M. Spiegel, Sumeet Singh, Sukhdev S. Kapur, Arpan K. Ghosh
-
Publication number: 20120179802Abstract: A cloud extension agent can be provided on a customer premise for interfacing, via an outbound secure connection, cloud based services. The cloud extension agent can reach the cloud based services through existing firewall infrastructure, thereby providing simple, secure deployment. Furthermore, the secure connection can enable substantially real-time communication with a cloud service to provide web-based, substantially real time control or management of resources on the customer premises via the cloud extension agent.Type: ApplicationFiled: January 10, 2012Publication date: July 12, 2012Applicant: Fiberlink Communications CorporationInventors: Vineeth NARASIMHAN, Joshua Lambert, Thomas Herchek, Ryan Elliot Hope, Nitish Jha, Rahul Jain, Sumeet Singh
-
Patent number: 8218451Abstract: An efficient streaming method and apparatus for detecting hierarchical heavy hitters from massive data streams is disclosed. In one embodiment, the method enables near real time detection of anomaly behavior in networks.Type: GrantFiled: February 1, 2011Date of Patent: July 10, 2012Assignee: AT&T Intellectual Property II, L.P.Inventors: Nicholas Duffield, Carsten Lund, Subhabrata Sen, Yin Zhang, Sumeet Singh