Vinay K.
Vinay K. Bannai, Mountain View, CA US
Patent application number | Description | Published |
---|---|---|
20090092064 | ROUTING SWITCH DETECTING CHANGE IN SESSION IDENTIFIER BEFORE RECONFIGURING ROUTING TABLE - An automatic network topology identification technique is described herein. Each node in the network periodically or constantly transmits its unique address to its neighboring node. Once a node receives a different message from its neighbor, the node identifies a topology change in the network. In one embodiment, a current topology is associated with a session number. When a change in the topology is detected, the detecting node increments the session number and broadcasts the change in topology. The other nodes, detecting the changed session number, now know that there has been a change in the network. In response, the nodes in the network modify routing tables and other information stored at the node related to the topology. In one embodiment, the technique is used to reassign shortened addresses to each device on the network to support a dual-addressing mode of the network. The dual addressing mode substitutes reduced-length addresses (referred to as short addresses) for standard addresses (referred to as long addresses) for traffic whose source or destination is internal to a given virtual network topology. The required length of short addresses used for a given virtual topology is dependent on the number of devices reachable within the topology. | 04-09-2009 |
20090141621 | BANDWIDTH RESERVATION REUSE IN DYNAMICALLY ALLOCATED RING PROTECTION AND RESTORATION TECHNIQUE - The disclosed network includes two rings, wherein a first ring transmits data in a clockwise direction, and the other ring transmits data in a counterclockwise direction. The traffic is removed from the ring by the destination node. During normal operations (i.e., all spans operational), data between nodes can flow on either ring. Thus, both rings are fully utilized during normal operations. The nodes periodically test the bit error rate of the links (or the error rate is constantly calculated) to detect a fault in one of the links. The detection of such a fault sends a broadcast signal to all nodes to reconfigure a routing table within the node so as to identify the optimum routing of source traffic to the destination node after the fault. | 06-04-2009 |
20090141656 | BANDWIDTH RESERVATION REUSE IN DYNAMICALLY ALLOCATED RING PROTECTION AND RESTORATION TECHNIQUE - The disclosed network includes two rings, wherein a first ring transmits data in a clockwise direction, and the other ring transmits data in a counterclockwise direction. The traffic is removed from the ring by the destination node. During normal operations (i.e., all spans operational), data between nodes can flow on either ring. Thus, both rings are fully utilized during normal operations. The nodes periodically test the bit error rate of the links (or the error rate is constantly calculated) to detect a fault in one of the links. The detection of such a fault sends a broadcast signal to all nodes to reconfigure a routing table within the node so as to identify the optimum routing of source traffic to the destination node after the fault. | 06-04-2009 |
20100124176 | AUTOMATIC NETWORK TOPOLOGY IDENTIFICATION BY NODES IN THE NETWORK - An automatic network topology identification technique is described herein. Each node in the network periodically or constantly transmits its unique address to its neighboring node. Once a node receives a different message from its neighbor, the node identifies a topology change in the network. In one embodiment, a current topology is associated with a session number. When a change in the topology is detected, the detecting node increments the session number and broadcasts the change in topology. The other nodes, detecting the changed session number, now know that there has been a change in the network. In response, the nodes in the network modify routing tables and other information stored at the node related to the topology. In one embodiment, the technique is used to reassign shortened addresses to each device on the network to support a dual-addressing mode of the network. The dual addressing mode substitutes reduced-length addresses (referred to as short addresses) for standard addresses (referred to as long addresses) for traffic whose source or destination is internal to a given virtual network topology. The required length of short addresses used for a given virtual topology is dependent on the number of devices reachable within the topology. | 05-20-2010 |
Vinay K. Dhodda, Madison, WI US
Patent application number | Description | Published |
---|---|---|
20080268498 | Thermostable Viral Polymerases and Methods of Use - Thermostable viral polymerases exhibiting a combination of activities selected from, proofreading (3′-5′) exonuclease activity, nick translating (5′-3′) nuclease activity, synthetic primer-initiated polymerase activity, nick-initiated polymerase activity, reverse transcriptase activity, strand displacement activity, and/or decreased discrimination against incorporation of nucleotide analogs. Also provided are compositions including the polymerases, polynucleotides encoding the polymerases and methods of using the polymerases. | 10-30-2008 |
Vinay K. Mishra, Katy, TX US
Patent application number | Description | Published |
---|---|---|
20150226063 | Fluid Analysis Methods and Apparatus for Determining Gas-Oil Ratio - The present disclosure relates to methods and apparatus for determining a gas-oil ratio based on downhole fluid analysis measurements and calibrated gas-oil ratio parameters. According to certain embodiments, the parameters for calculating the gas-oil ratio may be calibrated using historical data from the reservoir. For example, previously determined gas-oil ratios may be employed to calibrate the parameters to the reservoir. The calibrated parameters may then be employed during sampling operations to determine the gas-oil ratio. | 08-13-2015 |
20160091389 | Systems and Methods for Sample Characterization - The present disclosure relates to systems and methods for determining an integrity of a sample chamber. In certain embodiments, formation fluid is collected from a subterranean formation within a sample chamber disposed in a downhole tool, the downhole tool is withdrawn from a wellbore, an estimated surface pressure of the collected formation fluid is determined, the estimated surface pressure of the collected formation fluid is compared with an actual surface pressure of the sample chamber, and the integrity of the sample chamber is determined based on the comparison of the estimated surface pressure and the actual surface pressure. | 03-31-2016 |
Vinay K. Pidathala, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20150096024 | ADVANCED PERSISTENT THREAT (APT) DETECTION CENTER - A computerized method is described in which one or more received objects are analyzed by an advanced persistent threat (APT) detection center to determine if the objects are APTs. The analysis may include the extraction of features describing and characterizing features of the received objects. The extracted features may be compared with features of known APT malware objects and known non-APT malware objects to determine a classification or probability of the received objects being APT malware. Upon determination that the received objects are APT malware, warning messages may be transmitted to a user of associated client devices. Classified objects may also be used to generate analytic data for the prediction and prevention of future APT attacks. | 04-02-2015 |
Vinay K. Singh, Gorakhpur IN
Patent application number | Description | Published |
---|---|---|
20160070845 | CRITICAL REGION IDENTIFICATION - A method and system to identify a region of a design block of an integrated circuit for redesign are described. The method includes dividing the design block into grids, each of the grids including a corresponding number of logic elements. The method also includes filtering each of the grids based on a specified criteria, the filtering including determining a number (B) of the corresponding logic elements among a total number (A) of the logic elements in each grid that meet the specified criteria. The region is a set of two or more of the grids based on a result of the filtering. | 03-10-2016 |
20160070849 | CRITICAL REGION IDENTIFICATION - A method and system to identify a region of a design block of an integrated circuit for redesign are described. The method includes dividing the design block into grids, each of the grids including a corresponding number of logic elements. The method also includes filtering each of the grids based on a specified criteria, the filtering including determining a number (B) of the corresponding logic elements among a total number (A) of the logic elements in each grid that meet the specified criteria. The region is a set of two or more of the grids based on a result of the filtering. | 03-10-2016 |
Vinay K. Sudke, Kothirud IN
Patent application number | Description | Published |
---|---|---|
20150203002 | LOCKING DEVICE FOR A VEHICLE SEAT, AND VEHICLE SEAT - A locking device ( | 07-23-2015 |