Patents by Inventor Darrin P. Johnson

Darrin P. Johnson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080117824
    Abstract: One embodiment of the present invention provides a system that facilitates improved resource allocation in a network. During operation, the system determines one or more metrics value for a node based on a characteristic of the node and assigns nodes within the network to access groups based on each node's characteristic-metric value and a grouping policy. The system further constructs a logical hierarchy of access groups based on the characteristic-metric values of the nodes within each access group. Additionally, the system allows a node to forward traffic to a next-hop node identified within an access group on a logical hierarchy level, thereby facilitating better resource allocation in the network.
    Type: Application
    Filed: November 21, 2006
    Publication date: May 22, 2008
    Inventors: Samita Chakrabarti, Darrin P. Johnson, Eric C. Saxe
  • Publication number: 20080109790
    Abstract: Techniques for isolating software regressions are provided. In one approach, QTrace is used to generate DTrace scripts to gather timing information of one or more portions of source code during a test of particular version of a program. Based on results of one or more tests of multiple versions of a program, a regression is identified with respect to a particular portion of source code. It is determined that the particular portion of source code was changed during an intermediate version of the program (i.e., between two tests). The intermediate version and/or the particular portion of source code are identified as being a potential source of the regression.
    Type: Application
    Filed: November 8, 2006
    Publication date: May 8, 2008
    Inventors: Damien Farnham, Darrin P. Johnson, Sean McGrath, Bart Smaalders
  • Publication number: 20080104150
    Abstract: A method for priority-based allocation in a storage pool involves receiving a request to write a data item in the storage pool, where the storage pool includes multiple metaslabs, and where each of the metaslabs includes a contiguous region of data. The method further involves determining a target metaslab selected from the multiple metaslabs by comparing multiple allocation priorities, where each of the allocation priorities is associated with one of the metaslabs, allocating a block to the target metaslab, and writing the block to the target metaslab, where the block includes a portion of the data item.
    Type: Application
    Filed: October 31, 2006
    Publication date: May 1, 2008
    Applicant: Sun Microsystems, Inc.
    Inventors: William H. Moore, Darrin P. Johnson, Jeffrey S. Bonwick, Tabriz I. Holtz
  • Publication number: 20080104355
    Abstract: A method for reallocating blocks in a storage pool involves copying multiple source blocks to multiple replacement blocks, where the source blocks are stored on a source disk in the storage pool, and where the replacement blocks are stored on one or more replacement disks in the storage pool, and generating an indirection object, where the indirection object includes a mapping of locations of the source blocks to locations of the replacement blocks.
    Type: Application
    Filed: October 31, 2006
    Publication date: May 1, 2008
    Applicant: Sun Microsystems, Inc.
    Inventors: William H. Moore, Darrin P. Johnson, Jeffrey S. Bonwick, Tabriz I. Holtz
  • Publication number: 20080104204
    Abstract: A method for power-managing storage devices in a storage pool involves monitoring the storage pool to determine whether a storage management policy is satisfied, where the storage pool comprises a first storage device that is powered up and a second storage device that is powered down, powering up the second storage device after the storage management policy is satisfied, and making the second storage device available for use in the storage pool after the second storage device is powered up.
    Type: Application
    Filed: October 31, 2006
    Publication date: May 1, 2008
    Applicant: Sun Microsystems, Inc.
    Inventors: William H. Moore, Darrin P. Johnson, Tabriz I. Holtz
  • Publication number: 20080098215
    Abstract: A computer system that communicates cryptographic resource utilization information while processing data packets is described. During operation, the system receives a first data packet and generates a second data packet by performing a cryptographic transformation on the first data packet. Next, the system appends auxiliary information to the second data packet. This auxiliary information includes information associated with cryptographic resource utilization during the cryptographic transformation. Then, the system provides the second data packet including the auxiliary information.
    Type: Application
    Filed: October 20, 2006
    Publication date: April 24, 2008
    Inventors: Kais Belgaied, Mark C. Powers, Bhargava K. Yenduri, Darrin P. Johnson
  • Publication number: 20080084866
    Abstract: A computer system that forwards data packets is described. During operation, the system receives a data packet on a first interface and classifies the data packet to determine a corresponding destination. This classification is based on dynamically configured classification rules that include multiple attributes corresponding to multiple layers in an Open System Interconnect (OSI) Reference model. Then, the system provides the data packet on a second interface corresponding to the destination.
    Type: Application
    Filed: October 10, 2006
    Publication date: April 10, 2008
    Inventors: Darrin P. Johnson, Kais Belgaied
  • Publication number: 20080021985
    Abstract: A method for changing network configuration parameters that includes generating a request to change a network configuration parameter by a user, determining whether the user is allowed to change the network configuration parameter using a network configuration database, if the user is allowed to change the network configuration parameter, updating the network configuration database to reflect the change in the network configuration parameter, updating a container associated with the network configuration parameter to reflect the change in the configuration parameter, and if the user is not allowed to change the network configuration parameter, dropping the request.
    Type: Application
    Filed: July 20, 2006
    Publication date: January 24, 2008
    Applicant: Sun Microsystems, Inc.
    Inventors: Kais Belgaied, Erik Nordmark, Nicolas G. Droux, Sunay Tripathi, Darrin P. Johnson