Patents by Inventor Baiju D. Mandalia

Baiju D. Mandalia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9923784
    Abstract: Data transfer using flexible dynamic elastic network service provider relationships is provided. A relationship is dynamically established with an elastic network service provider of multiple available elastic network service providers to transfer a portion of the set of data to the target. Peering policies for each of the multiple elastic network service providers are checked, where a respective peering policy for each elastic network service provider includes respective bandwidth pricing information. Based on the bandwidth pricing information for each of the plurality of elastic network service providers, an elastic network service provider and a schedule are selected to use in transferring the portion to the target. The elastic network service provider is used in transferring the portion to the target, which includes dynamically configuring elastic network bandwidth allocation from the elastic network service provider and initiating transfer of the portion to the target according to the selected schedule.
    Type: Grant
    Filed: November 25, 2015
    Date of Patent: March 20, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia
  • Patent number: 9923965
    Abstract: An approach is provided for managing an allocation of a bandwidth of a dedicated channel in a network being utilized by an application performing a replication of data from a first to a second storage resource. Checks of parameters specified by the application are determined. The parameters include, but are not limited to, average compression ratio, compression ratio trend, throughput, throughput trend, and round trip time. Respective high and low threshold values for the parameters are determined. At least one of the checks of the parameters is executed, which determines a violation of a threshold value for one of the parameters. If the violation of the high threshold value is determined, an increase in the bandwidth is triggered. If the violation of the low threshold value is determined, a decrease in the bandwidth is triggered.
    Type: Grant
    Filed: June 5, 2015
    Date of Patent: March 20, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia
  • Patent number: 9923839
    Abstract: Resource configuration to exploit elastic network capability is provided by establishing an elastic network bandwidth allocation level to provide for an application for transfer of data between the application and an elastic network, the application hosted at a data center, then dynamically configuring, for the application, elastic network bandwidth allocation from the network service provider in accordance with the established elastic network bandwidth allocation level, and allocating storage resources of the data center for the application and processing resources of the data center for the application, the allocating being based on the established elastic network bandwidth allocation level and providing storage resources and processing resources to operate at a level commensurate with the established elastic network bandwidth allocation level.
    Type: Grant
    Filed: November 25, 2015
    Date of Patent: March 20, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia
  • Publication number: 20180069833
    Abstract: An approach for regional firewall clustering for optimal state-sharing of different sites in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, each firewall in a given region is informed of its peer firewalls via a registration process with a centralized server. Each firewall opens up an Internet protocol (IP)-based communication channel to each of its peers in the region to share state table information. This allows for asymmetrical firewall flows through the network and allows routing protocols to ascertain the best path to a given destination without having to take firewall placement into consideration.
    Type: Application
    Filed: November 9, 2017
    Publication date: March 8, 2018
    Inventors: Robert K. Floyd, III, Baiju D. Mandalia, Robert P. Monaco, Mahesh Viswanathan
  • Patent number: 9882875
    Abstract: An approach for regional firewall clustering for optimal state-sharing of different sites in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, each firewall in a given region is informed of its peer firewalls via a registration process with a centralized server. Each firewall opens up an Internet protocol (IP)-based communication channel to each of its peers in the region to share state table information. This allows for asymmetrical firewall flows through the network and allows routing protocols to ascertain the best path to a given destination without having to take firewall placement into consideration.
    Type: Grant
    Filed: September 2, 2016
    Date of Patent: January 30, 2018
    Assignee: International Business Machines Corporation
    Inventors: Robert K. Floyd, III, Baiju D. Mandalia, Robert P. Monaco, Mahesh Viswanathan
  • Publication number: 20170353348
    Abstract: An approach is provided for managing resiliency of an application. Based on information specifying services provided by service providers (SPs) which is stored in a configuration management database, a topology mapping a first service provided by a first SP to a second service provided by a second SP is generated. Each of the first and second services provides a functionality of the application. A fail condition of the first SP is detected. Based on the topology, a first API provided by the first SP is determined to have provided the first service prior to the fail condition, and a second API provided by the second SP is determined to provide the second service. The first API provided by the first SP is disabled and the second API is activated, thereby continuing to provide the functionality of the application even though the first SP is experiencing the fail condition.
    Type: Application
    Filed: June 2, 2016
    Publication date: December 7, 2017
    Inventors: Richard D. Gunjal, Dilip V. Hardikar, Baiju D. Mandalia, Madhusudan Ramakrishna, Joseph D. Robinson
  • Patent number: 9787531
    Abstract: A method and associated systems of automatic notification of isolation of a first networked device. In response to detecting that it is not being properly managed by a network-management means, the first networked device creates a notification message that identifies the problem and requests proper network management. The device then transmits this message to any other device or networked node that it can communicate with, along with a request that recipients try to forward the message to the network-management means. If a device that receives the message is able to forward the message successfully, the network-management means takes appropriate steps to begin properly managing the first networked device.
    Type: Grant
    Filed: October 11, 2013
    Date of Patent: October 10, 2017
    Assignee: International Business Machines Corporation
    Inventors: Robert K. Floyd, III, Baiju D. Mandalia, Robert P. Monaco, Mahesh Viswanathan
  • Publication number: 20170149608
    Abstract: Dynamic configuration of network features is provided by performing real-time traffic analysis on network traffic flowing between an elastic cloud computing network and an edge appliance, evaluating effects of modifying elastic network bandwidth allocation and applying network traffic optimizations in routing traffic flowing between the elastic cloud computing network and the edge appliance, and dynamically configuring, based on the real-time traffic analysis and on the evaluating, one or more of (i) elastic network bandwidth allocation from the network service provider or (ii) at least one of the network traffic optimizations for performance by the edge appliance in routing traffic flowing between the elastic cloud computing network and the edge appliance.
    Type: Application
    Filed: November 25, 2015
    Publication date: May 25, 2017
    Inventors: Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA
  • Publication number: 20170149688
    Abstract: Resource configuration to exploit elastic network capability is provided by establishing an elastic network bandwidth allocation level to provide for an application for transfer of data between the application and an elastic network, the application hosted at a data center, then dynamically configuring, for the application, elastic network bandwidth allocation from the network service provider in accordance with the established elastic network bandwidth allocation level, and allocating storage resources of the data center for the application and processing resources of the data center for the application, the allocating being based on the established elastic network bandwidth allocation level and providing storage resources and processing resources to operate at a level commensurate with the established elastic network bandwidth allocation level.
    Type: Application
    Filed: November 25, 2015
    Publication date: May 25, 2017
    Inventors: Mark V. CHITTI, Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA
  • Publication number: 20170149625
    Abstract: Data transfer using flexible dynamic elastic network service provider relationships is provided. A relationship is dynamically established with an elastic network service provider of multiple available elastic network service providers to transfer a portion of the set of data to the target. Peering policies for each of the multiple elastic network service providers are checked, where a respective peering policy for each elastic network service provider includes respective bandwidth pricing information. Based on the bandwidth pricing information for each of the plurality of elastic network service providers, an elastic network service provider and a schedule are selected to use in transferring the portion to the target. The elastic network service provider is used in transferring the portion to the target, which includes dynamically configuring elastic network bandwidth allocation from the elastic network service provider and initiating transfer of the portion to the target according to the selected schedule.
    Type: Application
    Filed: November 25, 2015
    Publication date: May 25, 2017
    Inventors: Mark V. CHITTI, Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA
  • Publication number: 20170149624
    Abstract: Event-based data transfer scheduling using elastic network optimization criteria is provided. Bandwidth optimization criteria corresponding to different types of data transfer event scenarios are maintained, and based on recognizing a data transfer event scenario, a bandwidth optimization criteria is selected based on a type of the data transfer event scenario. A schedule for transferring data from a source to a target across the elastic network is determined according to the selected bandwidth optimization criteria, and the elastic network is used in transferring the data to the target storage location, where the using includes dynamically configuring elastic network bandwidth allocation from an elastic network service provider and initiating transfer of the data to the target storage location according to the schedule.
    Type: Application
    Filed: November 25, 2015
    Publication date: May 25, 2017
    Inventors: Mark V. CHITTI, Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA
  • Publication number: 20170149863
    Abstract: Controlled transfer of data over an elastic network is provided and includes analyzing properties of a set of data for transfer from a source storage location to a target storage location across an elastic cloud computing network as part of a staged transfer of the set of data, assigning transfer queue weightings to data subsets of the set of data based on weighting parameters, the transfer queue weightings dictating order of transfer of the data subsets from the source storage location to the target storage location, and controlling transfer of the data subsets from the source storage location to the target storage location consistent with the transfer queue weightings assigned to the data subsets, the controlling transfer including controlling, based on costs to transfer the data subsets, bandwidth allocation of the elastic cloud computing network and a transfer schedule for the data subsets.
    Type: Application
    Filed: November 25, 2015
    Publication date: May 25, 2017
    Inventors: Mark V. CHITTI, Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA
  • Publication number: 20170147248
    Abstract: Dynamic quality of service for storage I/O port allocation is provided by obtaining indications of anticipated demand on a plurality of storage ports of a storage device of a data center, the anticipated demand being at least in part for storage input/output supporting transfer of data to or from a network, and dynamically adjusting storage port allocations based on the indications of anticipated demand and on real-time evaluation of workloads being serviced by the plurality of storage ports.
    Type: Application
    Filed: November 25, 2015
    Publication date: May 25, 2017
    Inventors: Mark V. CHITTI, Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA
  • Publication number: 20170126500
    Abstract: A method and associated systems for automatic redistribution of virtual machines. A cloud-optimization module selects parameters, such as bandwidth requirements, that characterize an efficiency of a virtual network. It assigns weightings to these parameters based on relative importance of each parameter to the proper operation of the network, where the weightings may be determined as functions of captured network-performance statistics. The module translates the network's topology into a graph in which each node represents a network entity, such as a virtual machine or an application, and each edge represents a connection between two such entities. The module then uses a growing neural gas algorithm to revise the graph and the weightings, and translates the revised graph to a more optimal topology that has redistributed the network entities to operate more efficiently, as measured by the weighted parameters.
    Type: Application
    Filed: November 2, 2015
    Publication date: May 4, 2017
    Inventors: Bertus Eggen, John F. Hollingsworth, Baiju D. Mandalia, Philip D. Tetlow
  • Publication number: 20170090840
    Abstract: A determination is made that an instruction has to be sent for processing in the IoT environment. A set of devices is located in the IoT environment. The set of devices includes the device and each device in the set of devices can execute the instruction for a similar outcome. For each device in a subset of the set of devices, a set of factors is collected, including an image of a portion of each device. For the device, a first weight is assigned to a feature of the device extracted from an image of a portion of the device, and a second weight is assigned to a feature of another device extracted from another image of a portion of the other device. When the first weight is greater than the second weight, the device is selected from the subset as a target for sending the instruction.
    Type: Application
    Filed: September 24, 2015
    Publication date: March 30, 2017
    Applicant: International Business Machines Corporation
    Inventors: Dilip V. Hardikar, Baiju D. Mandalia
  • Publication number: 20170064086
    Abstract: Automatically transferring transmissions of a data network in which one or more processors receive metrics of active concurrent transmission sessions on a LAN that includes a data network, connected to a WAN, and a threshold level of concurrent transmission sessions of the data network of the LAN. Receiving a request for an additional transmission session, and responsive to determining that the threshold level of concurrent transmission sessions is exceeded, accessing data that maps a communication connection of the data network for a targeted recipient, to a communication connection of an alternate network corresponding to the targeted recipient, and performing a transfer of the additional transmission session from the communication connection of the data network for the targeted recipient, to the alternate network corresponding to the targeted recipient.
    Type: Application
    Filed: September 1, 2015
    Publication date: March 2, 2017
    Inventors: Baiju D. Mandalia, Trung V. Nguyen, Aleksas J. Vitenas
  • Publication number: 20170041345
    Abstract: A computing device detects that another computing device has connected to a network. The computing device determines whether the other computing device is valid and whether the computing device is being utilized for one or more suspicious activities. Based on determining that the other computing device is being utilized for one or more suspicious activities, the computing device determines a location of the other computing device, determines whether a user associated with the other computing device can be identified, and based on determining that the user associated with the other computing device cannot be identified, disables the other computing device, and transmits an alert to security personnel.
    Type: Application
    Filed: August 5, 2015
    Publication date: February 9, 2017
    Inventors: Baiju D. Mandalia, Tung OuYang
  • Publication number: 20170032300
    Abstract: A method, and an associated system, of dynamic resource selection for performing an action A on the selected resources. At each time tj equal to jT1 for j=1, 2, . . . , J such that J is a positive integer of at least TM/T1: (i) a current time tj=jT1 is computed, wherein T1 is a first heartbeat of heartbeats T1, T2, . . . TM; (ii) TK is determined as a largest heartbeat T satisfying tj mod T=0; (iii) a probability vector P corresponding to TK is determined; (iv) resources whose associated probability in vector P exceeds a predetermined threshold is ascertained; (v) actions are performed on the ascertained resources; and (vi) j is incremented by 1 if j<J.
    Type: Application
    Filed: July 31, 2015
    Publication date: February 2, 2017
    Inventors: Bertus Eggen, John F. Hollingsworth, Baiju D. Mandalia
  • Publication number: 20160373407
    Abstract: An approach for regional firewall clustering for optimal state-sharing of different sites in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, each firewall in a given region is informed of its peer firewalls via a registration process with a centralized server. Each firewall opens up an Internet protocol (IP)-based communication channel to each of its peers in the region to share state table information. This allows for asymmetrical firewall flows through the network and allows routing protocols to ascertain the best path to a given destination without having to take firewall placement into consideration.
    Type: Application
    Filed: September 2, 2016
    Publication date: December 22, 2016
    Inventors: Robert K. Floyd, III, Baiju D. Mandalia, Robert P. Monaco, Mahesh Viswanathan
  • Publication number: 20160359968
    Abstract: An approach is provided for managing an allocation of a bandwidth of a dedicated channel in a network being utilized by an application performing a replication of data from a first to a second storage resource. Checks of parameters specified by the application are determined. The parameters include, but are not limited to, average compression ratio, compression ratio trend, throughput, throughput trend, and round trip time. Respective high and low threshold values for the parameters are determined. At least one of the checks of the parameters is executed, which determines a violation of a threshold value for one of the parameters. If the violation of the high threshold value is determined, an increase in the bandwidth is triggered. If the violation of the low threshold value is determined, a decrease in the bandwidth is triggered.
    Type: Application
    Filed: June 5, 2015
    Publication date: December 8, 2016
    Inventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia