Patents by Inventor Dinesh C. Verma
Dinesh C. Verma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140164328Abstract: The present disclosure relates generally to the field of proactive data object replication in named data networks. In various examples, proactive data object replication may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.Type: ApplicationFiled: February 21, 2013Publication date: June 12, 2014Applicant: International Business Machines CorporationInventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Dinesh C. Verma
-
Publication number: 20140156837Abstract: A system and method for monitoring liveliness includes a management device which has an application layer where applications are executed. A connection monitor is located other than on the application layer, and the connection monitor is configured to receive requests from clients and deliver the requests to components on the application layer. The components include a generic application monitor which responds to liveliness monitor requests from the clients for all applications monitored, and one or more applications which response to requests to that application.Type: ApplicationFiled: February 4, 2014Publication date: June 5, 2014Applicant: International Business Machines CorporationInventors: Michael E. Baskey, Chun-Shi Chang, Lap T. Huynh, Dinakaran Joseph, Sambit Sahu, Dinesh C. Verma, Michael D. Williams
-
Publication number: 20140143444Abstract: A method, system and computer program product for transmitting content across a link in a communications network. In an embodiment, the method comprises examining traffic in the network at a sender end of the link to determine if the traffic is carrying compressed content; when the traffic is carrying compressed content, decompressing at least one portion of the compressed content; and checking a cache to determine if the cache has content matching the at least one decompressed portion of the content. In an embodiment, the method further comprises when the cache has content matching the at least one decompressed portion of the content, determining an identifier associated with the at least one decompressed portion of the content; and using the identifier to reconstruct, at a receiving end of the link, the at least one decompressed portion of the content.Type: ApplicationFiled: November 16, 2012Publication date: May 22, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dakshi Agrawal, Vasileios Pappas, Ramya Raghavendra, Mudhakar Srivatsa, Dinesh C. Verma, Ho Y. Wong
-
Publication number: 20140126378Abstract: Methods and apparatus are provided for wireless network optimization. Wireless network traffic is optimized by receiving redirected traffic based on one or more configuration rules; and applying the redirected traffic to a protocol optimizer that optimizes the wireless network traffic based on one or more optimization rules. A management interface is optionally provided to manage the network optimization appliance. A process monitor is optionally provided to monitor one or more process threads to determine if the process threads have stalled. The process monitor can monitor other components and can be monitored by at least one other component.Type: ApplicationFiled: November 2, 2012Publication date: May 8, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Seraphin B. Calo, William Cornejo, Keith Grueneberg, Franck Le, Erich M. Nahum, Maroun Touma, Dinesh C. Verma, Ho Yin Starsky Wong
-
Publication number: 20140126379Abstract: Methods and apparatus are provided for wireless network optimization. Wireless network traffic is optimized by receiving redirected traffic based on one or more configuration rules; and applying the redirected traffic to a protocol optimizer that optimizes the wireless network traffic based on one or more optimization rules. A management interface is optionally provided to manage the network optimization appliance. A process monitor is optionally provided to monitor one or more process threads to determine if the process threads have stalled. The process monitor can monitor other components and can be monitored by at least one other component.Type: ApplicationFiled: November 27, 2012Publication date: May 8, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Seraphin B. Calo, William Cornejo, Keith Grueneberg, Franck Le, Erich M. Nahum, Maroun Touma, Dinesh C. Verma, Ho Yin Starsky Wong
-
Publication number: 20140105174Abstract: A system and method that externalizes mobile device state migration (i.e., checkpointing) without being dependent upon any particular Edge Application (EdgeApp) proxy server or cellular network base station. In this manner, the Edge Application (EdgeApp) proxy server does not have to be aware of a migration process, yet will enable state information to be provided to other EdgeApp proxy/server nodes at the edge of the network (cell tower).Type: ApplicationFiled: October 17, 2012Publication date: April 17, 2014Applicant: International Business Machines CorporationInventors: Dakshi Agrawal, Chatschik Bisdikian, Dinesh C. Verma, Petros Zerfos
-
Publication number: 20140108638Abstract: Techniques for managing network traffic in a virtual consolidated appliance so as to avoid interruptions in existing network connections during reconfiguration of the virtual consolidated appliance are provided. In one aspect, a method for operating a virtual consolidated appliance having a plurality of servers is provided. The method includes the following steps. An assignment for load balancing is computed based on a status of the virtual consolidated appliance. A reconfiguration of the virtual consolidated appliance is discovered. A new assignment is computed for load balancing based on a new status of the virtual consolidated appliance based on the reconfiguration of the virtual consolidated appliance. Existing network connections are redirected according to the assignment during the reconfiguration of the virtual consolidated appliance. New network connections are served according to the new assignment.Type: ApplicationFiled: October 11, 2012Publication date: April 17, 2014Applicant: International Business Machines CorporationInventors: Bong Jun Ko, Kang-Won Lee, Erich M. Nahum, Maroun Touma, Dinesh C. Verma, HoYin Starsky Wong
-
Publication number: 20140108626Abstract: Techniques for managing network traffic in a virtual consolidated appliance so as to avoid interruptions in existing network connections during reconfiguration of the virtual consolidated appliance are provided. In one aspect, a method for operating a virtual consolidated appliance having a plurality of servers is provided. The method includes the following steps. An assignment for load balancing is computed based on a status of the virtual consolidated appliance. A reconfiguration of the virtual consolidated appliance is discovered. A new assignment is computed for load balancing based on a new status of the virtual consolidated appliance based on the reconfiguration of the virtual consolidated appliance. Existing network connections are redirected according to the assignment during the reconfiguration of the virtual consolidated appliance. New network connections are served according to the new assignment.Type: ApplicationFiled: October 15, 2013Publication date: April 17, 2014Applicant: International Business Machines CorporationInventors: Bong Jun Ko, Kang-Won Lee, Erich M. Nahum, Maroun Touma, Dinesh C. Verma, Ho Yin Starsky Wong
-
Publication number: 20140080457Abstract: A method, system and computer program product are disclosed for providing content to a communications device. In an embodiment of the invention, a communications network receives a first content portion from a content provider and sends the first content portion to the communications device. The communications network also sends a second content portion to the communications device, and this second content portion is customized for the user of the communications device based on selected information about the user that the communications network has. In one embodiment, the communications network uses the selected information about the user to customize the second content portion for the user, and sends the customized second content portion to the communications device. In an embodiment, the communications network sends the selected information to the content provider, and the content provider uses the selected information to customize the second content portion.Type: ApplicationFiled: September 14, 2012Publication date: March 20, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dakshi Agrawal, Michael G. Hill, Sihyung Lee, Mudhakar Srivatsa, Dinesh C. Verma, Petros Zerfos, Joseph W. Ziskin
-
Publication number: 20140071803Abstract: Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet.Type: ApplicationFiled: September 13, 2012Publication date: March 13, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dakshi Agrawal, Bruce O. Anthony, JR., Franck Le, Robert B. Nicholson, Vasileios Pappas, Dinesh C. Verma
-
Publication number: 20140071833Abstract: Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet.Type: ApplicationFiled: October 4, 2012Publication date: March 13, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dakshi Agrawal, Bruce O. Anthony, Franck Le, Robert B. Nicholson, Vasileios Pappas, Dinesh C. Verma
-
Publication number: 20140057592Abstract: A method, program product and system for dynamically offering upgraded services in a network. The method comprising the steps of: selecting users for a possible offer of an upgrade to services within the network, based on user activity at user devices accessing the network; obtaining network context data information regarding the user activity and the network; sequentially ordering the selected users based on a likelihood that the users will purchase the upgrade to services; determining the upgrade to services to be offered based on a service prediction availability within the network; and offering the upgrade to services to the selected users for a specific time period.Type: ApplicationFiled: August 23, 2012Publication date: February 27, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Malolan Chetlur, Umamaheswari C. Devi, Partha Dutta, Shivkumar Kalyanaraman, Ravindranath Kokku, Dinesh C. Verma
-
Publication number: 20140059191Abstract: Dynamic middleboxes include a network monitor module configured to determine a quality-affective factor in a connection between a client and a server in a network; a processor configured to compare the quality-affective factor to a threshold to determine whether the connection would benefit from a network processing function; and a network control module configured to reconfigure the network to redirect the connection to a middlebox that performs the network processing function if the connection would benefit and further configured to reconfigure the network to exclude the middlebox from the connection if the connection would not benefit.Type: ApplicationFiled: September 11, 2012Publication date: February 27, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Seraphin B. Calo, William Cornejo, Thai F. Le, Erich M. Nahum, Maroun Touma, Dinesh C. Verma
-
Publication number: 20140059190Abstract: Traffic redirection methods include determining a quality-affective factor in a connection between a client and a server in a network; comparing the quality-affective factor to a threshold to determine whether the connection would benefit from a network processing function; reconfiguring the network to redirect the connection to or away from a middlebox that performs the network processing function in accordance with the determination of whether the connection would benefit from the network processing function.Type: ApplicationFiled: August 21, 2012Publication date: February 27, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: SERAPHIN B. CALO, WILLIAM CORNEJO, THAI F. LE, ERICH M. NAHUM, MAROUN TOUMA, DINESH C. VERMA
-
Publication number: 20140045475Abstract: Techniques for improving cache effectiveness in areas with low user population are provided. In one aspect, a computer-based method for managing user traffic in a cellular network using proxy caches is provided. The method includes the following steps. A group of the proxy caches that has correlated user traffic is identified. Cache requests for each of the proxy caches in the group are observed. One or more patterns are found in the cache requests. A prediction is made as to which items will be requested from the proxy caches in the group in the future based on the one or more patterns found in the cache requests. The proxy caches in the group are pre-populated with the items.Type: ApplicationFiled: August 8, 2012Publication date: February 13, 2014Applicant: International Business Machines CorporationInventors: Bruce O. Anthony, JR., Dinesh C. Verma
-
Publication number: 20140045476Abstract: Techniques for improving cache effectiveness in areas with low user population are provided. In one aspect, a computer-based method for managing user traffic in a cellular network using proxy caches is provided. The method includes the following steps. A group of the proxy caches that has correlated user traffic is identified. Cache requests for each of the proxy caches in the group are observed. One or more patterns are found in the cache requests. A prediction is made as to which items will be requested from the proxy caches in the group in the future based on the one or more patterns found in the cache requests. The proxy caches in the group are pre-populated with the items.Type: ApplicationFiled: August 22, 2012Publication date: February 13, 2014Applicant: International Business Machines CorporationInventors: Bruce O. Anthony, JR., Dinesh C. Verma
-
Patent number: 8625457Abstract: A method, system and computer-usable medium for discovering the topology of a network by using multiple discovery agents operating in parallel. A NodeList containing information about known nodes in a target network is received. The number (‘K’) of discovery agents to be used is determined, where 1<=K<=TotalNumberOfNodes). The nodes are partitioned into node groups, each of which has a group identifier respectively assigning it to a discovery agent ‘M’ where 1<=M<=K. A GraphList is created to hold information about known and discovered nodes. Each entry in the NodeList list is processed by its assigned discovery agent ‘M’, which sends probe messages to the target node to determine the node identifiers of discovered neighboring nodes.Type: GrantFiled: December 3, 2007Date of Patent: January 7, 2014Assignee: International Business Machines CorporationInventors: Daniel Joseph Martin, Dinesh C. Verma
-
Publication number: 20130318300Abstract: Methods and apparatus are provided for performing byte caching using a chunk size based on the object type of the object being cached. Byte caching is performed by receiving at least one data packet from at least one network node; extracting at least one data object from the at least one data packet; identifying an object type associated with the at least one data packet; determining a chunk size associated with the object type; and storing at least a portion of the at least one data packet in a byte cache based on the determined chunk size. The chunk size of the object type can be determined, for example, by evaluating one or more additional criteria, such as network conditions and object size. The object type may be, for example, an image object type; an audio object type; a video object type; and a text object type.Type: ApplicationFiled: May 24, 2012Publication date: November 28, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dakshi Agrawal, Franck Le, Vasileios Pappas, Mudhakar Srivatsa, Dinesh C. Verma
-
Publication number: 20130298175Abstract: A method, system and computer program product for creating a customized message in a video-on-demand service, in which a user accesses the service using a communications device. In an embodiment, the method comprises using a video-on-demand server to intercept the access by the user of the video-on-demand service, obtain information about video content of a local cache of the video-on-demand service, obtain a profile of the user, and identify a context of the user. A customized message is constructed for the communications device based on the information about the local cache, the profile of the user, and the context of the user. The video-on-demand server sends the customized message to the communications device. In one embodiment, the user accesses the video-on-demand service through an edge base station of a core network, and the video-on-demand server is in this base station of the core network.Type: ApplicationFiled: May 2, 2012Publication date: November 7, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dakshi Agrawal, Vasileios Pappas, Mudhakar Srivatsa, Dinesh C. Verma
-
Publication number: 20130254258Abstract: An apparatus and method for off-loading application components to edge servers are provided. An application is made edge-aware by defining which components of the application may be run from an edge server, and which components cannot be run from an edge server. When a request is received that is to be processed by an application on an origin server, a determination is made as to whether the application contains edgable components. If so, an edgified version of the application is created. When a request is received that is handled by a component that may be run on the edge server, the request is handled by that component on the edge server. When a request is received that is handled by a component that is not edgable, the request is passed to a proxy agent which then provides the request to a broker agent on the origin server.Type: ApplicationFiled: April 2, 2013Publication date: September 26, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rajesh S. Agarwalla, Khalil S. Amiri, Madhu K. Chetuparambil, James R. Giles, Manu M. Gugnani, Shih-pai Lee, Subbarao K. Meduri, Mahesh Patil, Dinesh C. Verma