Search

Akshay A Adhikari

from San Jose, CA
Age ~45

Akshay Adhikari Phones & Addresses

  • 330 Elan Village Ln, San Jose, CA 95134
  • 330 Elan Village Ln UNIT 228, San Jose, CA 95134
  • Santa Clara, CA
  • Basking Ridge, NJ
  • Bernardsville, NJ
  • 1625 Crest Rd, Raleigh, NC 27606
  • 1701 Crest Rd, Raleigh, NC 27606

Work

Company: Versa networks May 2014 Position: Software engineer

Education

Degree: Master of Science, Masters School / High School: North Carolina State University 2000 to 2002 Specialities: Computer Science

Skills

Tcp/Ip • Cisco Technologies • Distributed Systems • Linux • Linux Kernel • Embedded Systems • Enterprise Software • Algorithms • Cloud Computing • Device Drivers • C • Software Development • Ethernet • Object Oriented Design • Unix • Scalability • Ixia • Kernel Programming

Industries

Computer Software

Resumes

Resumes

Akshay Adhikari Photo 1

Software Engineer

View page
Location:
Santa Clara, CA
Industry:
Computer Software
Work:
Versa Networks
Software Engineer

Cisco Oct 2011 - Apr 2014
Technical Lead

Cisco 2007 - Oct 2011
Software Engineer

Avaya Dec 2002 - Feb 2007
Member of Technical Staff

Avaya Jul 2002 - Dec 2002
Intern
Education:
North Carolina State University 2000 - 2002
Master of Science, Masters, Computer Science
Department of Technology, Savitribai Phule Pune University 1996 - 2000
Bachelor of Engineering, Bachelors, Computer Engineering
Skills:
Tcp/Ip
Cisco Technologies
Distributed Systems
Linux
Linux Kernel
Embedded Systems
Enterprise Software
Algorithms
Cloud Computing
Device Drivers
C
Software Development
Ethernet
Object Oriented Design
Unix
Scalability
Ixia
Kernel Programming

Publications

Us Patents

Method And Apparatus For Determining Endpoints For Use As Testing Devices

View page
US Patent:
7352705, Apr 1, 2008
Filed:
Sep 3, 2004
Appl. No.:
10/933646
Inventors:
Akshay Arun Adhikari - Basking Ridge NJ, US
Karen Louise Barrett - Chatswood, AU
Lorraine Denby - Berkeley Heights NJ, US
Neil Hepworth - Artarmon, AU
Jean Meloche - Madison NJ, US
Assignee:
Avaya Technology Corp. - Basking Ridge NJ
International Classification:
G06F 11/00
US Classification:
370248, 370242
Abstract:
A method and apparatus for testing a digital network having a plurality of subnetworks by determining by one of a plurality of user endpoint devices assigned to one of the plurality of subnetworks upon the one of the plurality of user endpoint devices being idle that the one of the plurality of user endpoint devices should perform the functions of a testing user endpoint device for the one of the plurality of subnetworks; identifying the one of plurality of user endpoint devices to a server or a distributed system of servers as a testing user endpoint device; obtaining the identifies of other testing user endpoint devices in other ones of the plurality of subnetworks from the server; and testing the network by transmission of test packets to other ones of the testing user endpoint devices in the other ones of the plurality of subnetworks.

Automatic Determination Of Connectivity Problem Locations Or Other Network-Characterizing Information In A Network Utilizing An Encapsulation Protocol

View page
US Patent:
7583667, Sep 1, 2009
Filed:
Dec 16, 2004
Appl. No.:
11/014546
Inventors:
Akshay Adhikari - Basking Ridge NJ, US
Amit Agarwal - Milpitas CA, US
Lorraine Denby - Berkeley Heights NJ, US
Russell C. Jones - San Jose CA, US
Rod D. Livingood - Cupertino CA, US
Jean Meloche - Madison NJ, US
Anupam Rai - San Jose CA, US
Wayne Sam - Verona NJ, US
Assignee:
Avaya Inc. - Basking Ridge NJ
International Classification:
H04L 12/28
H04L 12/56
US Classification:
370389
Abstract:
Techniques for determining a problem location or otherwise characterizing a network comprising a plurality of processing elements, including at least one processing element associated with performance of a packet encapsulation operation of an encapsulation protocol. The packet encapsulation operation is performed on a test packet to generate an encapsulated packet, the test packet having a time to live (TTL) value and an identifier. In conjunction with performance of the packet encapsulation operation, the TTL value and the identifier of the test packet are copied to a header of the encapsulated packet. The encapsulated packet is transmitted, and a determination is made as to whether a reply packet has been received responsive to transmission of the encapsulated packet. The reply packet, if any, is processed to obtain information utilizable in determining the problem location or otherwise characterizing the network. By way of example, these operations may be repeated, for subsequent test packets with increasing TTL values, until an amount of router hop information sufficient to determine the problem location is obtained.

Method And Apparatus For Determination Of Network Topology

View page
US Patent:
7602728, Oct 13, 2009
Filed:
Jun 12, 2003
Appl. No.:
10/460700
Inventors:
Akshay Adhikari - Bernardsville NJ, US
Lorraine Denby - Berkeley Heights NJ, US
Jean Meloche - Madison NJ, US
Balaji Rao - Basking Ridge NJ, US
Assignee:
Avaya Inc. - Basking Ridge NJ
International Classification:
H04L 1/14
US Classification:
370248, 370252, 370392, 709224
Abstract:
Network topology information is determined in a network-based communication system by generating communications between, for example, selected pairs of endpoint devices each associated with a network. A given one of the communications is sent from a first one of the endpoint devices to a second one of the endpoint devices and returned from the second endpoint device to the first endpoint device. Information contained in the communication as received at the first endpoint device from the second endpoint device is processed to determine network topology information characterizing at least a portion of the network.

Root Cause Analysis Of Network Performance Based On Exculpation Or Inculpation Sets

View page
US Patent:
7924733, Apr 12, 2011
Filed:
Sep 28, 2006
Appl. No.:
11/536229
Inventors:
Akshay Adhikari - Bernardsville NJ, US
Lorraine Denby - Berkeley Heights NJ, US
Colin L. Mallows - Flemington NJ, US
Jean Meloche - Madison NJ, US
Balaji Rao - Somerville NJ, US
Assignee:
Avaya Inc. - Basking Ridge NJ
International Classification:
H04J 1/16
US Classification:
370252
Abstract:
Performance problems or other conditions are analyzed in a system comprising a plurality of endpoint devices and an associated centralized or distributed controller. End-to-end measurements are obtained for respective paths through the network, for example, using communications between the endpoint devices. For a given end-to-end measurement obtained for a particular one of the paths, a value of a performance indicator for the path is determined and the performance indicator value is assigned to each of a plurality of links of the path. The determining and assigning operations are repeated for additional ones of the end-to-end measurements, the links are grouped into one or more exculpation or inculpation sets based on how many times a particular performance indicator value has been assigned to each of the links, and the one or more sets are utilized to determine, for example, the location of a performance problem in the network.

Transmission Of A Digital Message Interspersed Throughout A Compressed Information Signal

View page
US Patent:
8054969, Nov 8, 2011
Filed:
Feb 15, 2007
Appl. No.:
11/675345
Inventors:
Akshay Adhikari - Basking Ridge NJ, US
Sachin Garg - Green Brook NJ, US
Anjur Sundaresan Krishnakumar - Rocky Hill NJ, US
Navjot Singh - Denville NJ, US
Assignee:
Avaya Inc. - Basking Ridge NJ
International Classification:
H04N 7/167
US Classification:
380205, 713181, 704201
Abstract:
A method is disclosed that enables the transmission of a digital message along with a corresponding media information signal, such as audio or video. A telecommunications device that is processing the information signal from its user, such as a speech signal, encodes the information signal by using a model-based compression coder. One such device is a telecommunications endpoint. Then, based on an evaluation of the perceptual significance of each encoded bit, or on some other meaningful characteristic of the signal, the endpoint's processor: (i) determines which encoded bits can be overwritten; and (ii) intersperses the digital message bits throughout the encoded signal in place of the overwritten bits. The endpoint then transmits those digital message bits as part of the encoded information signal. In this way, no additional bits are appended to the packet to be transmitted, thereby addressing the issue of compatibility with existing protocols and firewalls.

Signal Watermarking In The Presence Of Encryption

View page
US Patent:
8055903, Nov 8, 2011
Filed:
Feb 15, 2007
Appl. No.:
11/675352
Inventors:
Akshay Adhikari - Basking Ridge NJ, US
Sachin Garg - Green Brook NJ, US
Anjur Sundaresan Krishnakumar - Rocky Hill NJ, US
Navjot Singh - Denville NJ, US
Assignee:
Avaya Inc. - Basking Ridge NJ
International Classification:
H04N 7/167
US Classification:
713181, 380 37, 380 43, 380 44, 380205, 704201
Abstract:
A method is disclosed that enables the transmission of a digital message along with a corresponding information signal, such as audio or video. The supplemental information contained in digital messages can be used for a variety of purposes, such as enabling or enhancing packet authentication. In particular, a telecommunications device that is processing an information signal from its user, such as a speech signal, encrypts the information signal by performing a bitwise exclusive-or of an encryption key stream with the information signal stream. The device, such as a telecommunications endpoint, then intersperses the bits of the digital message throughout the encrypted signal in place of those bits overwritten, in a process referred to as “watermarking. ” The endpoint then transmits the interspersed digital message bits as part of a composite signal that also comprises the encrypted information bits. No additional bits are appended to the packet to be transmitted, thereby addressing compatibility issues.

Network Switch That Is Optimized For A Telephony-Capable Endpoint

View page
US Patent:
8144583, Mar 27, 2012
Filed:
Dec 13, 2006
Appl. No.:
11/610487
Inventors:
Akshay Adhikari - Basking Ridge NJ, US
Sachin Garg - Green Brook NJ, US
Anjur Sundaresan Krishnakumar - Rocky Hill NJ, US
Navjot Singh - Denville NJ, US
Assignee:
Avaya Inc. - Basking Ridge NJ
International Classification:
H04L 12/26
US Classification:
370232, 370391, 709232
Abstract:
A method is disclosed that enables the avoidance of a processor overload of a telecommunications endpoint device that is susceptible to traffic floods. An enhanced network switch sets the speed on one of its data ports as a specific function of the speeds of the devices that are connected to one or more of its other data ports. This behavior is different from that of network switches in the prior art, in which the data rate of a port in the prior art is auto-negotiated to the highest speed that can be supported by the network elements at either end of the port's connection, regardless of the other devices present. By considering the specific devices that are connected, the enhanced network switch is able to limit the amount of traffic that is directed by an upstream device, such as a router, towards a device with limited processor capability, such as a packet-based phone.

Embedded Firewall At A Telecommunications Endpoint

View page
US Patent:
8302179, Oct 30, 2012
Filed:
Dec 13, 2006
Appl. No.:
11/610485
Inventors:
Akshay Adhikari - Basking Ridge NJ, US
Sachin Garg - Green Brook NJ, US
Anjur Sundaresan Krishnakumar - Rocky Hill NJ, US
Navjot Singh - Denville NJ, US
Assignee:
Avaya Inc. - Basking Ridge NJ
International Classification:
G06F 21/00
US Classification:
726 13
Abstract:
A method is disclosed that enables the implementation of an embedded firewall at a telecommunications endpoint. In particular, the illustrative embodiment of the present invention addresses the relationship between the application, firewall engine, and packet-classification rules database that are all resident at the endpoint. In the variations of the illustrative embodiment that are described herein, the application: (i) directly communicates with the co-resident firewall engine such as through local message passing, (ii) shares memory with the firewall engine, and (iii) makes socket calls to the operating system that are intercepted by a middleware layer that subsequently modifies the rules database, depending on the socket call. The common thread to these techniques is that the application, firewall engine, and rules database are co-resident at the endpoint, which is advantageous in the implementation of the embedded firewall.
Akshay A Adhikari from San Jose, CA, age ~45 Get Report