- San Jose CA, US Om Prakash Suthar - Bolingbrook IL, US Ianik Semco - Gatineau, CA
International Classification:
H04L 67/14 H04W 12/08 H04L 9/40
Abstract:
A network function (NF) entity in a communication network receives User Plane Function (UPF) registration information for a plurality of UPFs, the registration information including a respective network attribute for each UPF. The NF entity associates each UPF with a corresponding network based on the respective network attribute, and map one or more User Equipment (UE) to the corresponding network based on a security policy to create a UE-to-network table. The NF further receives a request to establish a session for a subsequent UE, the request including a subsequent UE identifier, and determine an access permission for the subsequent UE to access the corresponding network based on the subsequent UE identifier and the UE-to-network table. The NF selects one UPF from the plurality of UPF to service the session for the subsequent UE based on the access permission, and an association between the one UPF and the corresponding network.
Integrity Verification For Managing Network Configurations
- San Jose CA, US Arun Gunasekaran - Bangalore, IN Padmaraj Ramanoudjam - Puducherry, IN Om Prakash Suthar - Bolingbrook IL, US
International Classification:
H04L 12/24 H04L 29/08
Abstract:
In one embodiment, a method includes determining a first configuration information for configuring a user plane device of the first network slice associated with the control plane device, generating a first configuration identifier based on the first configuration information, sending, to the user plane device of the first network slice, the first configuration identifier and the first configuration information, receiving, from the user plane device of the first network slice, a second configuration identifier, wherein the second configuration identifier is generated by the user plane device of the first network slice based on the first configuration information received from the control plane device, and verifying, by comparing the first configuration identifier and the second configuration identifier, that the user plane device of the first network slice is configured using the first configuration information.
Optimized Serving Gateway Node Selection For Interworking Networks
- San Jose CA, US Om Prakash Suthar - Bolingbrook IL, US Raghavendra Suryanarayanarao Vidyashankar - Bangalore South, IN Vivek Agarwal - Chelmsford MA, US
In one example, a first connectivity request for a first network connection between a user equipment and a first network is obtained. A control plane serving gateway node for the first network connection is selected. The control plane serving gateway node is co-located with a control plane packet data network gateway node configured to support a second network connection between the user equipment and a second network that is different from the first network. A second connectivity request for the second network connection is obtained. The second network connection is established with the control plane serving gateway node and the control plane packet data network gateway node.
Centralized Management, Provisioning And Monitoring Of Cloud Infrastructure
- San Jose CA, US Om Prakash Suthar - Bolingbrook IL, US Alec Hothan - San Rafael CA, US Vivek Agarwal - Chelmsford MA, US John Wei-I Wu - San Jose CA, US Ajay Kalambur - Campbell CA, US Devendra Kumar Vishwakarma - North Chelmsford MA, US
International Classification:
G06F 9/455 H04L 29/08 H04L 12/24
Abstract:
A first virtual machine executing on a centralized management node provides a first image file to a first computing entity arranged within a first point of delivery. The first image file includes a first boot configuration file or a first ramdisk file. A second virtual machine provides a second image file to a second computing entity arranged within a second point of delivery different from the first point of delivery. The second image file includes a second boot configuration file or a second ramdisk file. The first virtual machine provides a third image file to the first computing entity. The third image file comprises a first operating system installation file. The second virtual machine provides a fourth image file to the second computing entity. The fourth image file comprises a second operating system installation file.
Integrity Verification For Managing Network Configurations
- San Jose CA, US Arun Gunasekaran - Bangalore, IN Padmaraj Ramanoudjam - Puducherry, IN Om Prakash Suthar - Bolingbrook IL, US
International Classification:
H04L 12/24
Abstract:
In one embodiment, a method includes determining a first configuration information for configuring a user plane device of the first network slice associated with the control plane device, generating a first configuration identifier based on the first configuration information, sending, to the user plane device of the first network slice, the first configuration identifier and the first configuration information, receiving, from the user plane device of the first network slice, a second configuration identifier, wherein the second configuration identifier is generated by the user plane device of the first network slice based on the first configuration information received from the control plane device, and verifying, by comparing the first configuration identifier and the second configuration identifier, that the user plane device of the first network slice is configured using the first configuration information.
In-Situ Best Path Selection For Mobile Core Network
Techniques are provided that leverage inband metadata techniques for use in a mobile core network in order to create relevant third generation 3rd Generation Partnership Project (3GPP) control plane interfaces between virtual control plane and virtual user plane elements that can be used to instruct the virtual entities to perform various functions, collect telemetry and other data from the virtual entities and signal maintenance messages between control plane and user plane entities. One control plane interface can be used to perform holistic performance analysis functionalities and identify the better performing path and accordingly use primary path and warm paths for control plane exchanges.
Methods To Preemptively Autoconfigure A Mobile Network To Respond To External Emergencies
- San Jose CA, US Om Prakash Suthar - Bolingbrook IL, US Vivek Agarwal - Chelmsford MA, US Amarnath Sury Arvind - Hinsdale IL, US Rajiv Asati - Morrisville NC, US Aeneas Sean Dodd-Noble - Andover MA, US
Methods are provided to preemptively reconfigure a mobile network to respond to external emergencies. The method is performed at a network device of a service provider which provides access to a mobile network for wireless device. The method includes obtaining a message indicating an occurrence of a disaster. The message includes at least an emergency type and location information. The method further includes determining, based on the emergency type, a reconfiguration policy for reconfiguring the mobile network in an area indicated by the location information and reconfiguring the mobile network based on the reconfiguration policy. The method further includes authenticating a disaster application function and a notification message informing about an occurrence of a disaster.
Facilitating Reservation And Use Of Remote Radio Units (Rrus) Of Radio Providers For Mobile Service Providers In Virtualized Radio Access Network (Vran) Environments
- San Jose CA, US Om Prakash Suthar - Bolingbrook IL, US Yoshitaka Nagami - Tokyo, JP Fei Gao - Kanagawa-Ken, JP Santanu Dasgupta - Fremont CA, US
International Classification:
H04W 48/16 H04W 4/029
Abstract:
A broker network may be configured to serve as an intermediary between one or more radio providers and one or more mobile service providers for reservation of remote radio units (RRUs) for use in a virtualized radio access network (vRAN) environment. The broker network may receive, from a mobile network, a message indicating a request for identification of RRUs of at least one radio provider. The broker network may send, to the mobile network, one or more messages including a plurality of identifiers which identify a plurality of RRUs, and a geographic location and capabilities associated with each RRU. After receiving a selection of an RRU, the broker network may send to the RRU a message which triggers communication with a virtualized Distributed Unit (vDU) for a remote configuration of parameters in the selected RRU, so that it may be used to facilitate communication with UEs in the mobile network.
Aug 2014 to 2000 Sr. Information ArchitectTata Consulting Services
Mar 2014 to 2000 Senior User Experience DesignerAccenture Chicago, IL Aug 2013 to Mar 2014 User Experience DesignerMicrosystems Downers Grove, IL Mar 2013 to Jul 2013 User Experience DesignerChamberlain Elmhurst, IL Jun 2010 to Mar 2013 Industrial Designer / User Experience Designer
Education:
Coventry University 2007 BA in Automotive DesignHarry A Burke High School 2002 Diploma
Skills:
Industrial Design, User Experience Design, Mobile App Development, Wireframing, Rhino, Adobe Creative Suite, Microsoft Office