Moncef Elaoud - Lake Hopatcong NJ, US Abhrajit Ghosh - Scotch Plains NJ, US Ravichander Vaidyanathan - Edison NJ, US Prathima Agrawal - New Providence NJ, US Toshikazu Kodama - Morristown NJ, US Yasuhiro Katsube - Franklin Lakes NJ, US
Assignee:
Toshiba America Research, Inc. - Morristown NJ Telcordia Technologies - Morristown NJ
International Classification:
H04Q 7/24 H04L 12/43 H04J 3/16
US Classification:
370338, 370459, 370468
Abstract:
Aspects of the invention provide a method and system for managing or coordinating data transmission in a Local Area Network (LAN) such that Quality of Service (QoS) concerns are met. A LAN resource manager (LRM) is provided for managing the LAN resources by providing solutions for providing users with several levels of QoS. Once the LRM admits a user at a certain QoS level, the level is assured within the LAN for as long as the user is in the LAN. A user may submit a request to transmit data to the LRM. The LRM may determine if time allocation is possible and allocate the time slots for data transmission. The LRM may send time slot allocation information to an Access Server in a LAN, which may inform the user of the time slot allocation and prepare a queue according to the slot allocation information.
Ashutosh Dutta - Bridgewater NJ, US Abhrajit Ghosh - Edison NJ, US Subir Das - Kendall Park NJ, US Dana Chee - Maplewood NJ, US Kyriakos Manousakis - New Brunswick NJ, US Funchun Joseph Lin - Morris Plains NJ, US Shih-wei Li - Germantown MD, US Tsunehiko Chiba - Saitama, JP Hidetoshi Yokota - Minuma, JP Akira Idoue - Toda, JP
Assignee:
Telcordia Technologies, Inc. - Piscataway NJ KDDI Corporation
International Classification:
H04W 4/00
US Classification:
370331, 370332
Abstract:
A mechanism by which handoff delay can be minimized while not compromising the IMS/MMD security and also protecting the media if required by certain applications is presented. One proactive method includes proactive authentication. Another proactive method includes proactive security association, such as transferring SA keys from old proxy to new proxy, or transferring keys through serving signal entities. Reactive methods include transferring SA keys from old proxy to new proxy, using either push or pull technology. Other reactive methods include transferring keys through serving signal entities using either push or pull technology.
Approach To Secure Localization In Wireless Networks
Embodiments of the present invention disclose a secure localization infrastructure using transmitters that can transmit messages at multiple distinct power levels throughout a community of reference points. Transmitters send messages at different power levels in a manner that every location in the system corresponds to a unique set of messages. Received messages are reported back to the localization infrastructure, which then determines location by comparing the messages reported.
Method And Apparatus For Detecting Spoofed Network Traffic
Ravichander Vaidyanathan - Belle Mead NJ, US Abhrajit Ghosh - Edison NJ, US Akira Yamada - Tokyo, JP Yutaka Miyake - Saitama, JP
Assignee:
Telcordia Technologies, Inc. - Piscataway NJ
International Classification:
H04L 29/06
US Classification:
726 22, 726 23, 709223, 709224, 709225
Abstract:
A method and apparatus for detecting spoofed IP network traffic is presented. A mapping table is created to indicate correlations between IP address prefixes and AS numbers, based on routing information collected from a plurality of data sources. At each interface of a target network, IP address prefixes from a training traffic flow are acquired and further converted into AS numbers based on the mapping table. An EAS (Expected Autonomous System) table is populated by the AS numbers collected for each interface. The EAS table is used to determine if an operation traffic flow is allowed to enter the network.
Last Hop Topology Sensitive Multicasting Key Management
Farooq Anjum - Somerset NJ, US Abhrajit Ghosh - Edison NJ, US
Assignee:
Toshiba America Research, Inc. - Washington DC Telcordia Technologies, Inc. - Piscataway NJ
International Classification:
H04L 12/28
US Classification:
370390, 370432, 713163
Abstract:
A system and method of managing multicast key distribution that includes associating a multicast address with each internal node of the key tree, wherein the key tree is created based on the last hop topology.
Methods Of Mitigation Of Trombone Routing In An Ims/Mmd Network
Ashutosh Dutta - Bridgewater NJ, US Abhrajit Ghosh - Edison NJ, US John Lee - Howell NJ, US Subir Das - South Brunswick NJ, US Joe Lin - Morris Plains NJ, US Kyriakos Manousakis - New Brunswick NJ, US Tsunehiko Chiba - Saitama, JP Hidetoshi Yokota - Minuma, JP Akira Idoue - Toda, JP
Assignee:
Telcordia Technologies, Inc. - Piscataway NJ KDDI Corporation - Tokyo
International Classification:
H04W 4/00
US Classification:
370331, 370328, 370329, 370338, 4554351, 4554221
Abstract:
The present invention advantageously provides several systems and methods for solving the trombone routing issues within an IMS/MMD network. These approaches avoid trombone routing, speed up handoff, and increase the efficiency of signaling and overall performance of an IMS/MMD network. These solutions can broadly be divided into the following categories. Piggy-backing SIP registration over MIP (Split at FA); Selective Reverse Tunneling and Tunneling between FA and P-CSCF; the SIP-based mobility protocol; use of CoA during SIP registration and call up in MIPv6; Piggy-backing SIP registration when HA and S-CSCF Co-exist; Using Dynamic Home Agents in MIPv4 FA-CoA; and the Interceptor-Caching Approach.
Detecting Errant Conditions Affecting Home Networks
David Marples - Mansfield, GB Christopher Brightman - Leicestershire, GB Abhrajit Ghosh - Scotch Plains NJ, US Stanley Moyer - Mendham NJ, US Simon Tsang - Jersey City NJ, US
International Classification:
G06F011/30
US Classification:
714/043000
Abstract:
Errant conditions, including configuration issues, device/application failures, and performance problems, affecting a home network are detected by considering end-to-end information flows within the home network and between the home network and an external network. Specifically, errant conditions are detected by analyzing monitored network information flows, by analyzing responses resulting from the active stimuli of hardware/software components within the home and external network, and by considering in this analysis configuration information obtained from network devices. Gathered information and detected errant conditions are reported to an administrative management system for further analysis and for use by a help-desk administrator or home user in resolving the reported conditions.
Ashutosh Dutta - Bridgewater NJ, US Abhrajit Ghosh - Edison NJ, US Subir Das - Kendall Park NJ, US Joesph Lin - Morris Plains NJ, US Kyriakos Manousakis - New Brunswick NJ, US Dana Chee - Maplewood NJ, US Tsunehiko Chiba - Saitama-city, JP Hidetoshi Yokota - Minuma, JP Akira Idoue - Toda, JP
International Classification:
H04L 9/00
US Classification:
726014000
Abstract:
A mechanism by which handoff delay can be minimized while not compromising the IMS/MMD security and also protecting the media if required by certain applications is presented. Methods for mitigating delay during SA re-association and mitigating the IPSec tunnel overhead for signaling and media at the Mobile Node are given. In one embodiment, SA keys can be transferred from the old P-CSCF to new P-CSCF, enabling the establishment of SAs before Mobile Node physically moves to the new subnet in a network. Proactive handover is used. In another embodiment, SA keys are transferred from S-CSCF to new P-CSCF. In this case, the SA keys are transferred to the new P-CSCF by S-CSCF through a context transfer mechanism well in advance so that SAs may be established before Mobile Node physically moves to new subnet. In another embodiment, methods for mitigating IPSec tunnel overhead are presented.
Telcordia Technologies Jun 1998 - Apr 2008
Systems Engineer and Researcher
Perspecta Labs Jun 1998 - Apr 2008
Systems Engineering and Research Manager
Binghamton University Sep 1995 - May 1998
Research Assistant
Education:
Binghamton University 2006 - 2006
Master of Science, Masters, Computer Science
Binghamton University 1993 - 1998
Delhi University 1993 - 1993
St. Stephen's College, Delhi 1990 - 1990
Bachelors, Bachelor of Arts, Mathematics
Skills:
Software Engineering Unix Linux Algorithms Telecommunications Software Development Computer Security Ip C++ Mobile Devices Cloud Computing Systems Engineering Tcp/Ip Distributed Systems Java C Perl System Architecture Network Administration Internet Protocol Suite Network Security Architecture Networking Program Management Cyber Security Network Management Software Information Assurance
Languages:
English
Youtube
Shesh Rakshya featuring Abhrajit Chakraborty ...
Bengali weekly serial Sahityer Sera...Tagore's Shesh Rakshya directed ...