Patents by Inventor Hideaki Kimura
Hideaki Kimura has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220141123Abstract: An object is to provide a network device and the like that enable a first network that determines a traffic communication route using the Ethernet ring protocol and a second network that determines a traffic communication route by transmitting/receiving a control frame related to the traffic communication route within the network to be connected in a redundant configuration. When the network device according to the present invention has transitioned to a state in which there is no interface that can communicate with the first network and there is an interface that can communicate with the second network, it transitions to a standby state and further transmits information indicating that communication is impossible to the second network, and when there is an interface that can communicate with the first network and there is no interface that can communicate with the second network, it transitions to the standby state and further transmits communication route change information to the first network.Type: ApplicationFiled: February 4, 2020Publication date: May 5, 2022Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Hideaki KIMURA, Erina TAKESHITA
-
Patent number: 11323370Abstract: An object is to provide a communication device, a communication method, and a program that make it possible to suppress an increase in the communication band due to communication via a GWR when Dual Connectivity is implemented, without making an additional setting on base stations. A communication device according to the present invention enables a communication packet to be transferred through a path that is shorter than conventional paths, and can therefore suppress an increase in the communication band. Also, this short cut of the communication path need only be set on the communication device, and need not be additionally set on the base stations.Type: GrantFiled: February 28, 2019Date of Patent: May 3, 2022Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Go Yazawa, Tatsuya Fukui, Chunhsiang Huang, Hideaki Kimura
-
Publication number: 20220114153Abstract: A shared-nothing database system is provided in which parallelism and workload balancing are increased by assigning the rows of each table to “slices”, and storing multiple copies (“duplicas”) of each slice across the persistent storage of multiple nodes of the shared-nothing database system. When the data for a table is distributed among the nodes of a shared-nothing system in this manner, requests to read data from a particular row of the table may be handled by any node that stores a duplica of the slice to which the row is assigned. For each slice, a single duplica of the slice is designated as the “primary duplica”. All DML operations (e.g. inserts, deletes, updates, etc.) that target a particular row of the table are performed by the node that has the primary duplica of the slice to which the particular row is assigned. The changes made by the DML operations are then propagated from the primary duplica to the other duplicas (“secondary duplicas”) of the same slice.Type: ApplicationFiled: October 14, 2020Publication date: April 14, 2022Inventors: Jesse Kamp, Allison L. Holloway, Meichun Hsu, Hideaki Kimura, Boris Klots, Vasudha Krishnaswamy, Kartik Kulkarni, Teck Hua Lee, Yunrui Li, Aurosish Mishra, Ajit Mylavarapu, Sukhada Pendse, Garret F. Swart, Shasank K. Chavan, Tirthankar Lahiri, Juan R. Loaiza
-
Patent number: 11288252Abstract: Example implementations disclosed herein can be used to build, maintain, and access databases built database in multi-core computing systems with large VRAM and huge NVRAM. The database with optimistic concurrency control can be built on a transactional key-value data store that includes logically equivalent data pages stored in both VRAM and VRAM. Data records in volatile data pages in the VRAM represent the most recent version of the data. Data records in the NVRAM immutable and are organized in a stratified composite snapshot. A distributed log gleaner process is used to process log entries corresponding to transactions on the volatile data pages and construct the snapshot. The log gleaner sorts the log entries by epoch, key range, and most recent use to partition the snapshot across multiple nodes.Type: GrantFiled: October 26, 2020Date of Patent: March 29, 2022Assignee: Hewlett Packard Enterprise Development LPInventor: Hideaki Kimura
-
Publication number: 20210390075Abstract: Systems and methods for reducing latency of probing operations of remotely located linear hash tables are described herein. In an embodiment, a system receives a request to perform a probing operation on a remotely located linear hash table based on a key value. Prior to performing the probing operation, the system dynamically predicts a number of slots for a single read of the linear hash table to minimize total cost for an average probing operation. The system determines a hash value based on the key value and determines a slot of the linear hash table to which the hash value corresponds. After predicting the number of slots, the system issues an RDMA request to perform a read of the predicted number of slots from the linear hash table starting at the slot to which the hash value corresponds.Type: ApplicationFiled: February 16, 2021Publication date: December 16, 2021Inventors: Tinggang Wang, Shuo Yang, Hideaki Kimura, Garret F. Swart, Spyros Blanas
-
Publication number: 20210351955Abstract: An object is to provide a means for causing wirings and device setting configurations to conform between communication devices and then establishing communication by generating a device setting configuration in accordance with wirings between the communication devices and reflecting the device setting configuration in interfaces of the communication devices. A device setting configuration for establishing communication between communication devices is generated based on information regarding an adjacent device acquired from each communication device, using a network setting information database configured to hold, in an associated manner, information regarding the communication device, information regarding the adjacent device connected directly to the communication device via a communication cable, and information regarding a device setting configuration to be set for an interface of the communication device used to connect to the adjacent device.Type: ApplicationFiled: October 2, 2019Publication date: November 11, 2021Inventors: Hideaki Kimura, Erina Takeshita
-
Patent number: 11156667Abstract: Provided is a diagnostic device for a coil including a voltage application unit applying an impulse voltage to the coil; a response voltage detection unit detecting a response voltage from the coil with respect to the impulse voltage; an index calculation unit calculating a determination index indicating an electrical feature of the coil based on the response voltage; and a determination unit determining whether there is an abnormality in a target coil to be diagnosed by comparing the determination index of a reference coil that is the coil that is normal and the determination index of the target coil. At least one of a zero cross point at which the response voltage intersects with a reference voltage and a peak voltage on a positive side and a negative side of the response voltage is used as the determination index, in addition to a circuit constant of the coil.Type: GrantFiled: August 31, 2018Date of Patent: October 26, 2021Assignee: AISIN AW CO., LTD.Inventor: Hideaki Kimura
-
Patent number: 11100083Abstract: Example implementations disclosed herein include techniques for a ready only bufferpool for use in local nodes of a multi-node computing system. Read only transactions executed by a processor can reference a ready only bufferpool resident in a VRAM on the same node. If the desired data page is in the bufferpool the transaction can immediately read data records from the cached data pages. If the desired data page is not in the bufferpool, then the transaction can cause a copy of a corresponding data page in a secondary memory to be installed in the bufferpool. The bufferpool can include more than one copy of a data page simultaneously to handle and prevent cache line misses. Data page are dropped from the bufferpool based on an incrementing per data page counter.Type: GrantFiled: January 29, 2015Date of Patent: August 24, 2021Assignee: Hewlett Packard Enterprise Development LPInventor: Hideaki Kimura
-
Patent number: 11080261Abstract: Hybrid concurrency control in a database transaction is disclosed. A contention value associated with a database object is read. The contention value is dynamically updated based on access patterns of the database object. If the contention value indicates the database object is under high contention, a pessimistic concurrency control mechanism is applied to the database object. An optimistic concurrency control mechanism is applied to the database object if the contention value does not indicate the database object is under high contention.Type: GrantFiled: January 29, 2016Date of Patent: August 3, 2021Assignee: Hewlett Packard Enterprise Development LPInventors: Tianzheng Wang, Hideaki Kimura
-
Publication number: 20210216473Abstract: Techniques are described for offloading remote direct memory operations (RDMOs) to “execution candidates”. The execution candidates may be any hardware capable of performing the offloaded operation. Thus, the execution candidates may be network interface controllers, specialized co-processors, FPGAs, etc. The execution candidates may be on a machine that is remote from the processor that is offloading the operation, or may be on the same machine as the processor that is offloading the operation. Details for certain specific RDMOs, which are particularly useful in online transaction processing (OLTP) and hybrid transactional/analytical (HTAP) workloads, are provided.Type: ApplicationFiled: March 26, 2021Publication date: July 15, 2021Inventors: Hideaki Kimura, Garret F. Swart, Spyros Blanas, Tirthankar Lahiri, Juan R. Loaiza, Jesse Kamp, Avneesh Pant
-
Publication number: 20210203585Abstract: Provided are a control apparatus, a control method, and a program capable of designing efficient end-to-end monitoring in a VPN infrastructure. The control apparatus according to the present invention controls end-to-end monitoring in a VPN infrastructure in which communications of a plurality of users are superimposed. The control apparatus includes a user end database 11 that stores information about customer edge apparatuses (CEs) for each of the users, each of the CEs serving as a monitoring end of end-to-end monitoring, an end-to-end path database 12 that stores information about all links included in a path between the CEs, and an end-to-end monitoring management unit 13 that sets a monitoring path for end-to-end monitoring to between the CEs so that combinations of the monitoring path passing through each of the links are coprime.Type: ApplicationFiled: August 13, 2019Publication date: July 1, 2021Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Erina TAKESHITA, Akihiro MORITA, Hideaki KIMURA, Go YAZAWA
-
Patent number: 11023453Abstract: Example implementations disclosed herein can be used to build, maintain, and use a hash table distributed across the plurality multiple nodes in a multi-node computing system. The hash table can include data pages associated by corresponding pointers according to a tree data structure. The data pages include leaf data pages. Each leaf data page can be associated with a corresponding hash value and include a tag bitmap. When a transaction associated with a key is executed, a hash value and a tag value are generated based on the key. The leaf data pages can be searched using the hash value. A probability that a leaf data page includes the key can be determined based on a comparison tag value with the tag bitmap.Type: GrantFiled: January 29, 2015Date of Patent: June 1, 2021Assignee: Hewlett Packard Enterprise Development LPInventor: Hideaki Kimura
-
Patent number: 10977193Abstract: Techniques are described for offloading remote direct memory operations (RDMOs) to “execution candidates”. The execution candidates may be any hardware capable of performing the offloaded operation. Thus, the execution candidates may be network interface controllers, specialized co-processors, FPGAs, etc. The execution candidates may be on a machine that is remote from the processor that is offloading the operation, or may be on the same machine as the processor that is offloading the operation. Details for certain specific RDMOs, which are particularly useful in online transaction processing (OLTP) and hybrid transactional/analytical (HTAP) workloads, are provided.Type: GrantFiled: August 15, 2019Date of Patent: April 13, 2021Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Hideaki Kimura, Garret F. Swart, Spyros Blanas
-
Publication number: 20210098225Abstract: A sample attachment device includes a mount, a mounted depression, and a pressure release depression. Liquid and air bubbles can pass the pressure release depression. The mounted depression is on the mount. A cartridge is mounted on the mounted depression. The pressure release depression is in the mounted depression. The pressure release depression is vertically under the cartridge when the cartridge is mounted on the mounted depression.Type: ApplicationFiled: September 25, 2020Publication date: April 1, 2021Inventors: Takahisa Kawamura, Hideaki Kimura
-
Publication number: 20210099323Abstract: An object of the present invention is to provide an edge device, a control method, and a program with which the effects of loop generation can be minimized from the NW operator side while ensuring connection normality with the device of an NW user. An edge device according to the present invention physically closes an access port upon confirmation that the access port has been connected to an external device while the access port is in a physically released state and a DF state is undefined, notifies other edge devices within an EVPN MH configuration that the host device has entered a state in which the host device may become the DF and causes an EVPN function unit to calculate the DF state to be set, physically opens the access port when the calculation result indicates DF, and physically closes the access port when the calculation result indicates BDF.Type: ApplicationFiled: February 18, 2019Publication date: April 1, 2021Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Gou YAZAWA, Hideaki KIMURA, Erina TAKESHITA, Akihiro MORITA
-
Publication number: 20210049123Abstract: Techniques are provided to allow more sophisticated operations to be performed remotely by machines that are not fully functional. Operations that can be performed reliably by a machine that has experienced a hardware and/or software error are referred to herein as Remote Direct Memory Operations or “RDMOs”. Unlike RDMAs, which typically involve trivially simple operations such as the retrieval of a single value from the memory of a remote machine, RDMOs may be arbitrarily complex. The techniques described herein can help applications run without interruption when there are software faults or glitches on a remote system with which they interact.Type: ApplicationFiled: October 15, 2020Publication date: February 18, 2021Inventors: Tirthankar Lahiri, Juan R. Loaiza, Garret F. Swart, Jesse Kamp, Avneesh Pant, Hideaki Kimura
-
Publication number: 20210042286Abstract: Example implementations disclosed herein can be used to build, maintain, and access databases built database in multi-core computing systems with large VRAM and huge NVRAM. The database with optimistic concurrency control can be built on a transactional key-value data store that includes logically equivalent data pages stored in both VRAM and VRAM. Data records in volatile data pages in the VRAM represent the most recent version of the data. Data records in the NVRAM immutable and are organized in a stratified composite snapshot. A distributed log gleaner process is used to process log entries corresponding to transactions on the volatile data pages and construct the snapshot. The log gleaner sorts the log entries by epoch, key range, and most recent use to partition the snapshot across multiple nodes.Type: ApplicationFiled: October 26, 2020Publication date: February 11, 2021Inventor: Hideaki Kimura
-
Publication number: 20210042169Abstract: In example implementations, a method include receiving a request for a lock in a Mellor-Crummey Scott (MCS) lock protocol from a guest user that is context free (e.g., a process that does not bring a queue node). The lock determines that it contains a null value. The lock is granted to the guest user. A pi value is received from the guest user to store in the lock. The pi value notifies subsequent users that the guest user has the lock.Type: ApplicationFiled: October 22, 2020Publication date: February 11, 2021Inventors: Hideaki Kimura, Tianzheng Wang, Milind M. Chabbi
-
Publication number: 20210036954Abstract: An object of the present disclosure is to provide a provider network device, a network system, and a program that shorten a communication disconnection time during redundancy switching in a Single-Active redundant configuration. The provider network device according to the present disclosure notifies a CE that a VLAN, which has been communicating with traffic, is disabled due to setting of a block point or that new traffic communication is enabled due to releasing of the block point. This allows the CE to quickly delete a previously used transfer database and build up a new transfer database, and thus it is possible to shorten a communication disconnection time during redundancy switching.Type: ApplicationFiled: February 7, 2019Publication date: February 4, 2021Inventors: Hideaki Kimura, Gou Yazawa, Akihiro Morita, Erina Takeshita
-
Publication number: 20210026798Abstract: Techniques are provided to allow more sophisticated operations to be performed remotely by machines that are not fully functional. Operations that can be performed reliably by a machine that has experienced a hardware and/or software error are referred to herein as Remote Direct Memory Operations or “RDMOs”. Unlike RDMAs, which typically involve trivially simple operations such as the retrieval of a single value from the memory of a remote machine, RDMOs may be arbitrarily complex. The techniques described herein can help applications run without interruption when there are software faults or glitches on a remote system with which they interact.Type: ApplicationFiled: October 15, 2020Publication date: January 28, 2021Inventors: Tirthankar Lahiri, Juan R. Loaiza, Garret F. Swart, Jesse Kamp, Avneesh Pant, Hideaki Kimura