Patents by Inventor Bipin Tomar
Bipin Tomar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230031741Abstract: Methods and systems for providing Quality of Service (QoS) in a cloud-based system are provided. One method includes assigning, by a micro-service, a workload identifier to a cloud volume created by a storage operating system in a cloud-based system; mapping, by the micro-service, the workload identifier to a volume identifier, the volume identifier generated by the storage operating system to identify the cloud volume; associating, by the micro-service, a policy with the cloud volume for providing QoS for the cloud volume; determining, by the micro-service, the workload identifier for the cloud volume from the volume identifier included in a request to store or retrieve data using the cloud volume; and assigning, by the micro-service, the workload identifier to a processing thread deployed by the storage operating system to process the request.Type: ApplicationFiled: July 30, 2021Publication date: February 2, 2023Applicant: NETAPP, INC.Inventors: Bipin Tomar, Jawahar Tadipatri, Ranjit Baradwaj Nandagopal
-
Publication number: 20220405220Abstract: Systems and methods for an interconnect layer send queue reservation system are provided. In one example, a method involves performing a transfer of data (e.g., an NVLog) from a storage system to a secondary storage system. A send queue having a fixed number of slots is maintained within an interconnect layer interposed between a file system and a Remote Direct Memory Access (RDMA) layer of the storage system. The interconnect layer implements an application programming interface (API) for the reservation system. A deadlock situation is avoided by, during a suspendable phase of a write transaction, making a reservation for slots within the send queue via the reservation system for the transfer of data. When the reservation is successful, the write transaction proceeds with a modify phase, during which the reservation is consumed and the interconnect layer is caused to perform an RDMA operation to carry out the transfer of data.Type: ApplicationFiled: October 15, 2021Publication date: December 22, 2022Inventors: Ping Zhou, Joseph Brown, JR., Peter Brown, Bipin Tomar
-
Publication number: 20220404980Abstract: Systems and methods are described for a cross-site high availability distributed storage system. According to one embodiment, a computer implemented method includes providing a remote direct memory access (RDMA) request for a RDMA stream, and generating, with an interconnect (IC) layer of the first storage node, multiple IC channels and associated IC requests for the RDMA request. The method further includes mapping an IC channel to a group of multiple transport layer sessions to split data traffic of the IC channel into multiple packets for the group of multiple transport layer sessions using an IC transport layer of the first storage node and assigning, with the IC transport layer, a unique transaction identification (ID) to each IC request and assigning a different data offset to each packet of a transport layer session.Type: ApplicationFiled: March 11, 2022Publication date: December 22, 2022Inventors: Peter Brown, Houze Xu, Bipin Tomar, Joseph Brown, JR.
-
Patent number: 10210056Abstract: A method, non-transitory computer readable medium, and device that assists with caching filesystem metadata to a partner non-volatile random-access memory (NVRAM) includes caching metadata related to an incoming data modifying operation generated by a client computing device to at least one storage controller device in a cluster. A service interruption event that makes a data block present in the storage device of a hosting storage node inaccessible to the client computing device is determined for during the caching. The requested metadata block from the at least one NVRAM is retrieved when the service interruption event is determined. The cache is warmed using the retrieved metadata block from the at least one NVRAM.Type: GrantFiled: March 31, 2016Date of Patent: February 19, 2019Assignee: NetApp, Inc.Inventors: Ram Kesavan, Ananthan Subramanian, Aziz Gulbeden, Christian Compton, Jawahar Tadipatri, Bipin Tomar, Joseph Allen Brown, Jr.
-
Publication number: 20170286238Abstract: A method, non-transitory computer readable medium, and device that assists with caching filesystem metadata to a partner non-volatile random-access memory (NVRAM) includes caching metadata related to an incoming data modifying operation generated by a client computing device to at least one storage controller device in a cluster. A service interruption event that makes a data block present in the storage device of a hosting storage node inaccessible to the client computing device is determined for during the caching. The requested metadata block from the at least one NVRAM is retrieved when the service interruption event is determined. The cache is warmed using the retrieved metadata block from the at least one NVRAM.Type: ApplicationFiled: March 31, 2016Publication date: October 5, 2017Inventors: Ram Kesavan, Ananthan Subramanian, Aziz Gulbeden, Christian Compton, Jawahar Tadipatri, Bipin Tomar, Joseph Allen Brown, JR.
-
Patent number: 9171161Abstract: A trusted device having virtualized registers provides an extensible amount of storage for hash values and other information stored within a trusted device. The trusted device includes a buffer to which registers are virtualized to and from external storage, by encrypting the register values using a private device key. The registers may be platform control registers (PCRs) or other storage of the trusted device, which may be a trusted platform module (TPM). The registers are accessed in accordance with a register number. When the externally stored values are retrieved, they are decrypted and placed in the buffer. The buffer may implement a cache mechanism, such as a most recently used algorithm, so that encryption/decryption and fetch overhead is reduced. A register shadowing technique may be employed at boot time, to ensure that the trusted device is not compromised by tampering with the externally stored virtualized registers.Type: GrantFiled: November 9, 2006Date of Patent: October 27, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Arun P. Anbalagan, Pruthvi P. Nataraj, Bipin Tomar
-
Patent number: 8612773Abstract: A network based installation management system that dynamically manages secure software installation on a client. The server is configured to determine the software required and prepare an appropriated response containing the list of software and an information file containing the respective attributes of the list of software. The server encoded this response and the encoded response is transmitted to the client. The client on receiving the response is configured to authenticate the response and install the encoded response after authentication. Highly accurate and reliable software installation using the network based installation management system may be achieved using a respective hardware element on the client and the server, which is configured to encode and decode a request and/or response suitably thereby providing a high level of security and trust in an un-trusted network environment.Type: GrantFiled: May 3, 2007Date of Patent: December 17, 2013Assignee: International Business Machines CorporationInventors: Pruthvi Panyam Nataraj, Bipin Tomar, Arun Prasath Anbalagan, Eduardo Lazaro Reyes
-
Publication number: 20080276301Abstract: A network based installation management system that dynamically manages secure software installation on a client. The server is configured to determine the software required and prepare an appropriated response containing the list of software and an information file containing the respective attributes of the list of software. The server encoded this response and the encoded response is transmitted to the client. The client on receiving the response is configured to authenticate the response and install the encoded response after authentication. Highly accurate and reliable software installation using the network based installation management system may be achieved using a respective hardware element on the client and the server, which is configured to encode and decode a request and/or response suitably thereby providing a high level of security and trust in an un-trusted network environment.Type: ApplicationFiled: May 3, 2007Publication date: November 6, 2008Inventors: Pruthvi Panyam Nataraj, Bipin Tomar, Arun Prasath Anbalagan, Eduardo Lazaro Reyes
-
Publication number: 20080114989Abstract: A trusted device having virtualized registers provides an extensible amount of storage for hash values and other information stored within a trusted device. The trusted device includes a buffer to which registers are virtualized to and from external storage, by encrypting the register values using a private device key. The registers may be platform control registers (PCRs) or other storage of the trusted device, which may be a trusted platform module (TPM). The registers are accessed in accordance with a register number. When the externally stored values are retrieved, they are decrypted and placed in the buffer. The buffer may implement a cache mechanism, such as a most recently used algorithm, so that encryption/decryption and fetch overhead is reduced. A register shadowing technique may be employed at boot time, to ensure that the trusted device is not compromised by tampering with the externally stored virtualized registers.Type: ApplicationFiled: November 9, 2006Publication date: May 15, 2008Inventors: Arun P. Anbalagan, Pruthvi P. Nataraj, Bipin Tomar