“I always look Prakash as great motivator and leader . He was so responsible and an eager learner. I admired his time management and zeal to keep himself updated with new technologies . Wish to work with you as a team again . All the best! ”
About
I currently work at Google and I lead Google Edge Cloud (GEC) platform team. GEC's main…
Activity
-
CSPs face a critical balancing act: maintaining stringent data security and privacy while embracing the benefits and agility of software-as-a-service…
CSPs face a critical balancing act: maintaining stringent data security and privacy while embracing the benefits and agility of software-as-a-service…
Liked by Prakash Suthar
-
The value of ecosystems has never been more important for the Telecom Industry. At Telenor, our AI-First and Cloud-First programs are driving great…
The value of ecosystems has never been more important for the Telecom Industry. At Telenor, our AI-First and Cloud-First programs are driving great…
Liked by Prakash Suthar
-
It's an incredible honor to be part of this dynamic organization during such an exciting time in the saudi tech industry. Our partnership with Google…
It's an incredible honor to be part of this dynamic organization during such an exciting time in the saudi tech industry. Our partnership with Google…
Liked by Prakash Suthar
Experience
Education
-
Northwestern University
-
MS Datascience (MSDSP) program with specialization artificial intelligence. The course is divided into 6 Quarters (10 week). Course includes Qtr-1 (Mathematics for Datascience, Applied Statistics), Qtr-2( Introduction to Data Science, Python for data Science), Qtr-3(Database systems and Data Preparations, Practical Machine Learning), Qtr-4( Decision Analytics, Data Governance, Ethics and Laws), Qtr-5( NLP, AL and Deep Learning), Qtr-6( Computer Vision, Capstone Project)
-
-
One year postgraduate program with hands on lab and projects covering 10 modules. The course start with statistical foundations, python foundation, supervised learning, unsupervised learning, ensemble techniques, recommended system, deep learning, computer vision, natural language processing(NLP), model deployments and Capstone project.
-
-
-
-
-
-
Licenses & Certifications
-
AWS Certified Solutions Architect – Associate
Amazon Web Services (AWS)
Issued ExpiresCredential ID 380365840
Volunteer Experience
-
Voluter Activities
Northern Illinois Food Bank
- Present 11 years 8 months
Poverty Alleviation
Leading and organizing volunteering for food supplies
Publications
-
Interworking and migration for 4G and 5G
IEEE
5G technology enables mobile operators globally to offer new capabilities not just to traditional mobiles subscriber but different segments such as enterprise services, industry verticals etc. 5G cab be deployed either as greenfield or brownfield by upgrading and interworking with existing 3G/4G etc . By leveraging interworking functions, operators can leverage or transform their existing infrastructures to optimize total cost of ownership. The main goal of this paper is to provide system…
5G technology enables mobile operators globally to offer new capabilities not just to traditional mobiles subscriber but different segments such as enterprise services, industry verticals etc. 5G cab be deployed either as greenfield or brownfield by upgrading and interworking with existing 3G/4G etc . By leveraging interworking functions, operators can leverage or transform their existing infrastructures to optimize total cost of ownership. The main goal of this paper is to provide system architecture and methods for interworking and migration between 4G and 5G mobile technologies.
Mobile providers are looking for strategies to introduce 5G seamlessly and enhance their overall service offering with new capabilities. Some key strategic considerations includes, their ability leverage existing packet core and integrate new 5G radio without overloading existing network, leverage network slicing for enterprise, industry verticals, heterogeneous network with indoor WiFi, Smallcell, outdoor macro cellular, enable 5G devices with new applications and enhanced quality of service etc.
This paper start with interworking strategy and goes deepdive into design considerations, and possible solutions. In summary, mobile provider should define their own transformation journey towards 5G because it start with existing 3G/4G network, subscribers, existing services, marketing plans with new business use cases they plan to offer. We have developed this paper based on our experience and industry best practices with practical tips.
Other authorsSee publication -
Manage Session 5G Mobile Core and Network Slicing
Linux Foundation - Open Source Summit Americas 2017
5G mobile technology will transform business models for service providers and contents providers. 5G core is built using open-source tools and end-to-end virtualization. One of unique feature is “networking slicing” which manages life cycle of 5G services ensuring end-to-end QoS and SLA. This session discusses about overall architecture for 5G architecture, open sources tools network slicing. The presentation will also cover use cases being deployed by service providers.
-
Native ICN Deployment in 4G, LTE Networks
IEEE Explorer
Mobile networks using LTE, 4G technologies are challenging. Managing mobility and content delivery using IP transport is complex and not optimized for content delivery. IP unicast routing from server to clients is used for delivery of multimedia content to User Equipment (UE), where each user gets separate stream. From bandwidth and routing perspective this approach is inefficient. Multicast and broadcast technologies have emerged recently for mobile networks, but their deploy- ments are very…
Mobile networks using LTE, 4G technologies are challenging. Managing mobility and content delivery using IP transport is complex and not optimized for content delivery. IP unicast routing from server to clients is used for delivery of multimedia content to User Equipment (UE), where each user gets separate stream. From bandwidth and routing perspective this approach is inefficient. Multicast and broadcast technologies have emerged recently for mobile networks, but their deploy- ments are very limited or at an experimental stage due to complex architecture and radio spectrum issues. ICN is a rapidly emerging technology with built in features for efficient multimedia content delivery, however majority of the work is focused either on fixed networks or unlicensed WiFi-based wireless networks. The main focus of this document is on native deployment of ICN in cellular mobile networks by embedding ICN into 3GPP protocol stack at IP datagram or replacing IP for non-IP datagrams. ICN has an inherent capability for mobility, security and it is optimized for content delivery using local caching at the edge. We believe that ICN native or dual stack (with IP) deployment will bring all inherent benefits and help in optimizing mobile networks.
Other authorsSee publication -
Native Deployment of ICN in LTE, 4G Mobile Networks
IETF
LTE, 4G mobile networks use IP transport which is not optimized for
data transport. IP unicast routing from server to clients is used for
delivery of multimedia content to User Equipment (UE), where each
user gets separate stream. From bandwidth and routing perspective
this approach is inefficient. Multicast and broadcast technologies
have emerged recently for mobile networks, but their deployments are
very limited or at an experimental stage due to complex…LTE, 4G mobile networks use IP transport which is not optimized for
data transport. IP unicast routing from server to clients is used for
delivery of multimedia content to User Equipment (UE), where each
user gets separate stream. From bandwidth and routing perspective
this approach is inefficient. Multicast and broadcast technologies
have emerged recently for mobile networks, but their deployments are
very limited or at an experimental stage due to complex architecture
and radio spectrum issues. ICN is a rapidly emerging technology with
built in features for efficient multimedia data delivery, however
majority of the work is focused on fixed networks. The main focus of
this draft is on native deployment of ICN in cellular mobile networks
by using ICN into 3GPP protocol stack. ICN has an inherent capability
for multicast, anchorless mobility, security and it is optimized for
data delivery using local caching at the edge. The native ICN or dual
stack (along with IP) deployment will bring all inherent benefits and
help in optimizing mobile networks.Other authorsSee publication -
5G Technology Updates
Ciscolive Berlin
Mobile industry saw major inflection point in 2008 when Long Term Evolution (LTE) was introduced. LTE served the need to radio and core harmonization using all IP architecture. Yet another biggest inflection will when 5G technology specification are released. Unlike LTE, 5G specifications are developed Internet of Things (IoT). Different standards bodies are working aggressively to propose architecture and framework, which will lay foundation for 5G. This session will demystify some of terms…
Mobile industry saw major inflection point in 2008 when Long Term Evolution (LTE) was introduced. LTE served the need to radio and core harmonization using all IP architecture. Yet another biggest inflection will when 5G technology specification are released. Unlike LTE, 5G specifications are developed Internet of Things (IoT). Different standards bodies are working aggressively to propose architecture and framework, which will lay foundation for 5G. This session will demystify some of terms and architecture proposal and discussions in layman language. Speaker has done extensive work in LTE design and deployment for many mobile providers and actively engaged with different standard bodies for 5G. We will share knowledge and framework for 5G architecture discussed at different standardization organizations. Such as ITU, 3GPP, NGMN, ETSI etc.
-
GiLAN Service Chaining
Ciscolive
The current practices for deploying mobile value added services are operational complex and practically inflexible. Mobile Services architecture using Network Function Virtualization (NFV) and Software Defined Networking (SDN) promise to change that. This session presents an approach for managing the complexity of the VAS services by using NfV and for supporting personalized and more easily monetizable services by introducing an SDN coupled to the 3GPP policy layer.
Other authorsSee publication -
Keynote on TelcoCloud for Mobile Operators
IEEE Latin America Mexico
Mobile service providers across the globe are building next-gen mobile broadband infrastructure based upon LTE, Wi-Fi and other access technologies. User will expect seamless access to content irrespective of location, network access types and also would like to pay less. Telco Cloud offer unique opportunity where all traditional purpose built hardware centric devices can be migrated to cloud architecture to reduce total cost of ownership (TCO). Many Telcos have been acquiring cloud service…
Mobile service providers across the globe are building next-gen mobile broadband infrastructure based upon LTE, Wi-Fi and other access technologies. User will expect seamless access to content irrespective of location, network access types and also would like to pay less. Telco Cloud offer unique opportunity where all traditional purpose built hardware centric devices can be migrated to cloud architecture to reduce total cost of ownership (TCO). Many Telcos have been acquiring cloud service providers to augment their cloud capabilities and are also expanding their existing cloud services in partnership with third-party vendors. What will be needed more is proper design for module scalable, standardized architecture which can meet strict SLA what Telcos are used to for their existing TDM based architecture.
This paper will discuss whole lifecycle for Telco Cloud starting from design, deployment, provisioning and management of Telco Cloud infrastructures. Simply put Telco Cloud will be next XaaS offering multitudes of services we will all consume. Let us think through and build elastic but robust network. Participants will be able to understand nuts and bolts of Telco Cloud which includes design and deployment strategies, case study for real TelcoCloud deployments.
-
LTE Roaming Design and Deployment
Ciscolive
Long Term Evolutions (LTE) is newest technology for mobile operators. Most of existing 2G, 3G mobile networks are migrating to LTE. Compared with 3G, LTE provides high throughput, much better QoS control and low latency. Subscribers have same expectation whether in home network or roaming. This is intermediate level session covering LTE along with 2G/3G roaming design and deployment. The session will focus on LTE roaming using IP exchange (IPX) network and how to inter-operate GRX and IPX…
Long Term Evolutions (LTE) is newest technology for mobile operators. Most of existing 2G, 3G mobile networks are migrating to LTE. Compared with 3G, LTE provides high throughput, much better QoS control and low latency. Subscribers have same expectation whether in home network or roaming. This is intermediate level session covering LTE along with 2G/3G roaming design and deployment. The session will focus on LTE roaming using IP exchange (IPX) network and how to inter-operate GRX and IPX simultaneously. I will also cover in depth about policy, QoS implementation, and different local breakout options during roaming. LTE security for home and roaming subscribers will be covered in detail. The participants are expected to learn LTE roaming and security design using best practices and case studies. The content of session will be based speakers hands on experience with tier-1/2 mobile networks.
-
Mobile Service Provider Smartphone Signaling Challenges
Ciscolive
Rapid insertion of smartphone with multiple operating system and uncontrolled application create signaling storm in mobile network. This is biggest challenge faced by all service providers. This session will discuss about signaling issues, industry best practices and Cisco's recommendations.
Other authors -
LTE Design and Deployment Strategies
Ciscolive
LTE as technology has received wider acceptance from vendors, operators. The promise of technology can be realized only if network is designed carefully keeping long-term view. This session focus on LTE design focusing eNodeB bandwidth, IP Backhaul, MPLS Core, Mobile datacenters, MME, SGW, PGW, HSS, PCRF, Billing and mediation, DNS, Large scale NAT etc. The session also covers methodologies for integration, test and validations, field trials and services introductions for LTE network. The…
LTE as technology has received wider acceptance from vendors, operators. The promise of technology can be realized only if network is designed carefully keeping long-term view. This session focus on LTE design focusing eNodeB bandwidth, IP Backhaul, MPLS Core, Mobile datacenters, MME, SGW, PGW, HSS, PCRF, Billing and mediation, DNS, Large scale NAT etc. The session also covers methodologies for integration, test and validations, field trials and services introductions for LTE network. The content is based upon practical experience of speakers with different mobile networks transitioning from 3G to LTE including multivendor scenarios.
The session provides LTE design and deployment insights for network engineers and managers involved in design, deployment and operations of LTE network for mobile service providers. Pre-requisites for this session are good understanding of network architecture 3GPP. Professional level routing knowledge will be helpful. -
Next Gen Datacenter for Mobile Operators
Ciscolive
Majority of mobile operators across the globe have legacy architecture consisting of circuit switched voice, hybrid backhaul (leased, ATM, FR, IP etc.) and centralized datacenter hosting mobile gateways and other applications. This breakout session is geared toward retrofitting or fork lifting existing architecture to next-generations distributed architecture which is simple, secure, resilient and scalable.
Speaker will present the design methodologies and architectures for Datacenters…Majority of mobile operators across the globe have legacy architecture consisting of circuit switched voice, hybrid backhaul (leased, ATM, FR, IP etc.) and centralized datacenter hosting mobile gateways and other applications. This breakout session is geared toward retrofitting or fork lifting existing architecture to next-generations distributed architecture which is simple, secure, resilient and scalable.
Speaker will present the design methodologies and architectures for Datacenters geared towards maximizing the investments and improving design and operational efficiencies. The session will go in details about zone & pod architecture, virtualized services hosting using new technologies such as Nexus, large scale NAT, optimized video delivery etc.
The session is targeted for network engineers and managers involved in design and operations of datacenter for mobile service providers. Pre-requisites for this session is good understanding of network architecture at CCNP, CCIP level and mobility standards for 3GPP, Femto, WiMAX etc. -
LTE Design using IPv6
Rocky Mountain IPv6 Forum
Majority of mobile network are in transition from CDMA, GSM, and UMTS to LTE/EPC technologies. At the same mobile industry is focusing on integrating IPv6 into their network. All 3GPP standards pertaining to LTE/EPC outlines support for IPv6 in all the interfaces. There is an opportunity for mobile network designers to build LTE/EPC architecture using IPv6, so that industry can benefits from IPv6 capabilities and we lay right foundations for End-to-end Intelligent Mobile…
Majority of mobile network are in transition from CDMA, GSM, and UMTS to LTE/EPC technologies. At the same mobile industry is focusing on integrating IPv6 into their network. All 3GPP standards pertaining to LTE/EPC outlines support for IPv6 in all the interfaces. There is an opportunity for mobile network designers to build LTE/EPC architecture using IPv6, so that industry can benefits from IPv6 capabilities and we lay right foundations for End-to-end Intelligent Mobile Architectures.
Cisco is making significant contributions in the industry focusing on LTE/EPC, IPv6 and next-gen mobile network. This session will focus on designing end-to-end IPv6 architecture in Radio Access networks (IP-RAN), MPLS Core, Mobile Packet Core involving Mobility Management Entity (MME), Serving Gateway (SGW), Packet Gateway (PGW), Policy Control & Charging Functions (PCRF, PCEF), DNS64, and NAT64. Materials covered the session will be based upon practical experience designing mobile networks for tier-1/2 service providers and the emphasis will be on overall architecture.
Patents
-
Securing communication for roaming user equipment (UE) using a native blockchain platform
Issued US 10,742,396
A network function (NF) entity in a communication network receives authentication data associated with a User Equipment (UE), determines the UE supports a blockchain registration procedure based on the authentication data, exchanges authentication messages with a Blockchain Roaming Broker (BRB) entity over a blockchain network interface, receives a blockchain authentication confirmation from the BRB entity, and registers the UE with the core network based on the blockchain authentication…
A network function (NF) entity in a communication network receives authentication data associated with a User Equipment (UE), determines the UE supports a blockchain registration procedure based on the authentication data, exchanges authentication messages with a Blockchain Roaming Broker (BRB) entity over a blockchain network interface, receives a blockchain authentication confirmation from the BRB entity, and registers the UE with the core network based on the blockchain authentication confirmation
Other inventorsSee patent -
Provisioning network resources in a wireless network using a native blockchain platform
Issued US 10,673,618
A Network Function (NF) entity in a telecommunication network receives blockchain credentials associated with UE and selects a Blockchain Charging Function (BCF). The NF entity further generates a Charging Data Record (CDR) corresponding to network resources, and sends a charging request based on the CDR (and policy rules) to the BCF entity over a blockchain network interface. The BCF entity sends a confirmation of the charging request, and the NF entity, based on the confirmation, provisions…
A Network Function (NF) entity in a telecommunication network receives blockchain credentials associated with UE and selects a Blockchain Charging Function (BCF). The NF entity further generates a Charging Data Record (CDR) corresponding to network resources, and sends a charging request based on the CDR (and policy rules) to the BCF entity over a blockchain network interface. The BCF entity sends a confirmation of the charging request, and the NF entity, based on the confirmation, provisions the network resources to the UE.
Other inventorsSee patent -
Providing user equipment location information indication on user plane
Issued US 10,660,061
Aspects of the disclosed technology provide ways to report User Equipment (UE) device locations in a 5G network for the purpose of redirecting application traffic from proximately located Data Networks (DNs). In one aspect, the disclosed technology encompasses a process for conveying User Equipment (UE) information to an Application Function (AF), the process includes steps for receiving, at an intermediate-User Plane Function (I-UPF) entity, User Equipment (UE) uplink data from a Radio Access…
Aspects of the disclosed technology provide ways to report User Equipment (UE) device locations in a 5G network for the purpose of redirecting application traffic from proximately located Data Networks (DNs). In one aspect, the disclosed technology encompasses a process for conveying User Equipment (UE) information to an Application Function (AF), the process includes steps for receiving, at an intermediate-User Plane Function (I-UPF) entity, User Equipment (UE) uplink data from a Radio Access Network (RAN), determining if sharing of location information or application information associated with the UE is restricted, and encapsulating first location metadata or application metadata in an SRv6 packet if the sharing of location information or application information is not restricted. Systems and machine-readable media are also provided.
Other inventorsSee patent -
SYSTEMS, DEVICES, AND TECHNIQUES FOR REGISTERING USER EQUIPMENT (UE) IN WIRELESS NETWORKS USING A NATIVE BLOCKCHAIN PLATFORM
Issued US 10,505,718
A network function (NF) entity in a communication network determines a User Equipment (UE) supports a blockchain authentication procedure, exchanges authentication messages with a Blockchain Authentication Function (BAF) entity over a blockchain network interface (e.g., based on the blockchain authentication procedure), receives a blockchain authentication confirmation from the BAF entity, and registers the UE based on the blockchain authentication confirmation
Other inventorsSee patent -
Systems, devices, and techniques for managing data sessions in a wireless network using a native blockchain platform
Issued US 10,299,128
A network function (NF) entity in a communication network receives session request data associated with a User Equipment (UE), which includes blockchain authentication data. The NF entity selects a Blockchain Authentication Function (BAF) entity based on the session request data, and exchanges at least a portion of the blockchain authentication data with the BAF entity over a blockchain network interface. The NF entity further receives authentication confirmation data from the BAF entity over…
A network function (NF) entity in a communication network receives session request data associated with a User Equipment (UE), which includes blockchain authentication data. The NF entity selects a Blockchain Authentication Function (BAF) entity based on the session request data, and exchanges at least a portion of the blockchain authentication data with the BAF entity over a blockchain network interface. The NF entity further receives authentication confirmation data from the BAF entity over the blockchain network interface, and establishes a data session associated with the UE based on the authentication confirmation data
Other inventorsSee patent -
Method and device for multicast content delivery
Issued US 10,469,278
In accordance with various implementations, a method is performed at a multicast gateway node within an operator network, where the multicast gateway node includes one or more processors, non-transitory memory, an ingress interface, and one or more egress interfaces. The method includes determining a multicast identifier for a user device in response to obtaining a registration request associated with the user device. The method also includes generating a header for a multicast data stream…
In accordance with various implementations, a method is performed at a multicast gateway node within an operator network, where the multicast gateway node includes one or more processors, non-transitory memory, an ingress interface, and one or more egress interfaces. The method includes determining a multicast identifier for a user device in response to obtaining a registration request associated with the user device. The method also includes generating a header for a multicast data stream based at least in part on the multicast identifier in response to obtaining a multicast flow join request. The method further includes populating a packet associated with the multicast data stream with the header. The method further includes forwarding the packet to the user device via a portion of the one or more egress interfaces, where the portion of the one or more egress interfaces is associated with the user device.
Other inventorsSee patent -
Information Centric Networking for Long Term Evolution (LTE)
Filed US 10,447,824
A method for improving content delivery for a user equipment (UE) implemented on a computing device and includes receiving a request from an application layer on the UE, determining whether said request is an ICN-based request using information Centric Networking (ICN) transport protocol or an IP-based request using Internet Protocol (IP) transport protocol, and for each ICN-based request according to the determining: forwarding the ICN-based request to an ICN function on the UE, and…
A method for improving content delivery for a user equipment (UE) implemented on a computing device and includes receiving a request from an application layer on the UE, determining whether said request is an ICN-based request using information Centric Networking (ICN) transport protocol or an IP-based request using Internet Protocol (IP) transport protocol, and for each ICN-based request according to the determining: forwarding the ICN-based request to an ICN function on the UE, and compressing ICN headers in the ICN-based request using robust header (RoHC) compression.
A method for improving content delivery is performed on a mobile base station and includes: configuring the mobile base station to support ICN transport protocol, and storing content for delivery over the ICN transport protocol in an ICN content cache on the mobile base station.
A method for supporting ICN on a long term evolution (LTE) evolved packet core (EPC) device includes: receiving an initial attach request from a user equipment (UE), where the initial attach request includes an indication of support for ICN transport protocol on the UE, authenticating the UE, creating a session for the UE, where a Packet Data Network (PDN) type is assigned for the session is ICN.Other inventorsSee patent -
Closed-loop optimization of a wireless network using an autonomous vehicle
Issued US 10419903
The invention use a real-time closed-loop system to optimize a wireless network. The system includes a drone controlled by a self-organizing network (SON) to retrieve RF data corresponding to the wireless network. In one embodiment, the SON provides the drone with a predetermined path through the coverage area of the wireless network. As the drone traverses the path, a RF scanner mounted on the drone collects RF data. The drone transmits this data to the SON which processes the RF data to…
The invention use a real-time closed-loop system to optimize a wireless network. The system includes a drone controlled by a self-organizing network (SON) to retrieve RF data corresponding to the wireless network. In one embodiment, the SON provides the drone with a predetermined path through the coverage area of the wireless network. As the drone traverses the path, a RF scanner mounted on the drone collects RF data. The drone transmits this data to the SON which processes the RF data to identify problems in the wireless network (e.g., cell tower interference). The SON generates one or more actions for correcting the identified problem and transmits these actions to a wireless network controller. Once the wireless network controller performs the action, the SON instructs the drone to re-traverse the portion of the path to determine if the problem has been resolved.
Other inventorsSee patent -
Securing communications for roaming user equipment (UE) using a native blockchain platform
Issued US 10,299,128
A network function (NF) entity in a communication network receives authentication data associated with a User Equipment (UE), determines the UE supports a blockchain registration procedure based on the authentication data, exchanges authentication messages with a Blockchain Roaming Broker (BRB) entity over a blockchain network interface, receives a blockchain authentication confirmation from the BRB entity, and registers the UE with the core network based on the blockchain authentication…
A network function (NF) entity in a communication network receives authentication data associated with a User Equipment (UE), determines the UE supports a blockchain registration procedure based on the authentication data, exchanges authentication messages with a Blockchain Roaming Broker (BRB) entity over a blockchain network interface, receives a blockchain authentication confirmation from the BRB entity, and registers the UE with the core network based on the blockchain authentication confirmation.
Other inventorsSee patent -
Providing user equipment location information indication on user plane
Issued US https://patents.justia.com/patent/10285155
Aspects of the disclosed technology provide ways to report User Equipment (UE) device locations in a 5G network for the purpose of redirecting application traffic from proximately located Data Networks (DNs). In one aspect, the disclosed technology encompasses a process for conveying User Equipment (UE) information to an Application Function (AF), the process includes steps for receiving, at an intermediate-User Plane Function (I-UPF) entity, User Equipment (UE) uplink data from a Radio Access…
Aspects of the disclosed technology provide ways to report User Equipment (UE) device locations in a 5G network for the purpose of redirecting application traffic from proximately located Data Networks (DNs). In one aspect, the disclosed technology encompasses a process for conveying User Equipment (UE) information to an Application Function (AF), the process includes steps for receiving, at an intermediate-User Plane Function (I-UPF) entity, User Equipment (UE) uplink data from a Radio Access Network (RAN), determining if sharing of location information or application information associated with the UE is restricted, and encapsulating first location metadata or application metadata in an SRv6 packet if the sharing of location information or application information is not restricted. Systems and machine-readable media are also provided.
Other inventorsSee patent -
SYSTEM AND METHOD TO FACILITATE DEPLOYING INFORMATION CENTRIC NETWORKING (ICN) IN LONG TERM EVOLUTION (LTE) MOBILE NETWORKS
Issued US 10,257,327
This patent covers methods and system to deploy Information centric Networking (ICN) natively for efficient delivery of video contents in Long Term Evolution (LTE)/ 4G technology. This patent covers modifications in 3GPP protocols to implement ICN natively between users (consumer) and application provider (publisher)
-
Operating unmanned aerial vehicles to maintain or create wireless networks
Issued US 9,913,102
Memethod, comprising: instructing an unmanned aerial vehicle (UAV) to travel a line of sight (LOS) path between a first location and a second location; instructing the UAV to determine a Fresnel radius at one or more defined locations along the LOS path between the first location and the second location; determining a Fresnel zone between the first location and second location based in part on the determined Fresnel radius for each of the defined locations along the LOS path; receiving…
Memethod, comprising: instructing an unmanned aerial vehicle (UAV) to travel a line of sight (LOS) path between a first location and a second location; instructing the UAV to determine a Fresnel radius at one or more defined locations along the LOS path between the first location and the second location; determining a Fresnel zone between the first location and second location based in part on the determined Fresnel radius for each of the defined locations along the LOS path; receiving information regarding one or more obstacles detected, by the UAV, within the Fresnel radius at one or more of the defined locations along the LOS path; generating a three dimensional cylindrical visual representation of the LOS path and Fresnel zone based in part on the received information and the determined Fresnel radius for each of the defined locations; and evaluating the Fresnel zone to determine if the LOS path can support a LOS wireless communication link.
-
DEPLOYING CELL ON DRONE OR DRONEAP TO MITIGATE RADIO CAPACITY AND COVERAGE ISSUES
Issued US 9,854,408
This invention provides system and methods to deploy cell on drone or DroneAP to mitigate radio capacity and coverage issues. DroneAP is automatically deployed using close-loop SON system.
-
Closed-loop optimization of a wireless network using an autonomous vehicle
Issued US 9,363,690
A method comprising: transmitting a path to a drone; receiving, at a self-organizing network (SON), RF data measured by the drone while traversing the path; upon determining a problem in a wireless network based on the received RF data, transmitting an action to change a parameter of a wireless network; after transmitting the action to change the parameter, instructing the drone via the SON to measure updated RF data at a location on the path corresponding to the problem; evaluating the updated…
A method comprising: transmitting a path to a drone; receiving, at a self-organizing network (SON), RF data measured by the drone while traversing the path; upon determining a problem in a wireless network based on the received RF data, transmitting an action to change a parameter of a wireless network; after transmitting the action to change the parameter, instructing the drone via the SON to measure updated RF data at a location on the path corresponding to the problem; evaluating the updated RF data at the SON to determine whether the problem was resolved; transmitting a scanner profile from the SON to the drone, the scanner profile identifying one or more frequencies to be scanned by the drone to generate the RF data; and transmitting an attenuation profile from the SON to the drone, the attenuation profile providing parameters for processing the RF data based on environmental conditions along the path.
Other inventorsSee patent -
Interactive Dynamic Ordering of Deep Packet Inspection Rules
Issued US US Patent No. 9,288,290
A network device processes packets transiting the device using successive deep packet inspection (DPI) rules. For each rule, the device attempts to apply the DPI rule to each packet, applies the DPI rule to each packet for which the attempt is successful, determines a probability that the attempt is successful across a plurality of packets, determines an average computational cost of applying the rule across a plurality of packets, and determines a merit of the DPI rule based on the average…
A network device processes packets transiting the device using successive deep packet inspection (DPI) rules. For each rule, the device attempts to apply the DPI rule to each packet, applies the DPI rule to each packet for which the attempt is successful, determines a probability that the attempt is successful across a plurality of packets, determines an average computational cost of applying the rule across a plurality of packets, and determines a merit of the DPI rule based on the average computational cost and the probability. The device reorders the successive DPI rules in an order of decreasing merit (computational cost), and processes new packets using the optimized DPI rules. The method of re-arranging DPI rules provides significant saving for network devices including mobile gateways in terms of computational cost.
Other inventorsSee patent
Courses
-
CCIE- Service Provider
26373
-
PMP
506403
-
VMware VCP
128476
Honors & Awards
-
VMware Certified Profesional (VCP550-DCV)
VMware
VMware Certified Professional (VCP550-DCV) is professional level expertise in software defined datacenter design and deployments
Languages
-
Hindi
Full professional proficiency
-
English
Full professional proficiency
Organizations
-
IEEE
Senior Member and Chicago IEEE Symposium Organizing Committee
- Present -
http://www.mychinmaya.org/index.php
Volunteer
- Present
Recommendations received
18 people have recommended Prakash
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Prakash Suthar in United States
-
Prakash Suthar
President, Windsor Housing USA, Inc.
-
Prakash Suthar
Sales Development
-
Om Prakash Suthar
Senior Software Engineer at Microsoft
-
Prakash Suthar
Compounding pharmacist
15 others named Prakash Suthar in United States are on LinkedIn
See others named Prakash Suthar