Patents by Inventor Dinesh C. Verma

Dinesh C. Verma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140164328
    Abstract: The present disclosure relates generally to the field of proactive data object replication in named data networks. In various examples, proactive data object replication may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
    Type: Application
    Filed: February 21, 2013
    Publication date: June 12, 2014
    Applicant: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Dinesh C. Verma
  • Publication number: 20140156837
    Abstract: A system and method for monitoring liveliness includes a management device which has an application layer where applications are executed. A connection monitor is located other than on the application layer, and the connection monitor is configured to receive requests from clients and deliver the requests to components on the application layer. The components include a generic application monitor which responds to liveliness monitor requests from the clients for all applications monitored, and one or more applications which response to requests to that application.
    Type: Application
    Filed: February 4, 2014
    Publication date: June 5, 2014
    Applicant: International Business Machines Corporation
    Inventors: Michael E. Baskey, Chun-Shi Chang, Lap T. Huynh, Dinakaran Joseph, Sambit Sahu, Dinesh C. Verma, Michael D. Williams
  • Publication number: 20140143444
    Abstract: A method, system and computer program product for transmitting content across a link in a communications network. In an embodiment, the method comprises examining traffic in the network at a sender end of the link to determine if the traffic is carrying compressed content; when the traffic is carrying compressed content, decompressing at least one portion of the compressed content; and checking a cache to determine if the cache has content matching the at least one decompressed portion of the content. In an embodiment, the method further comprises when the cache has content matching the at least one decompressed portion of the content, determining an identifier associated with the at least one decompressed portion of the content; and using the identifier to reconstruct, at a receiving end of the link, the at least one decompressed portion of the content.
    Type: Application
    Filed: November 16, 2012
    Publication date: May 22, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dakshi Agrawal, Vasileios Pappas, Ramya Raghavendra, Mudhakar Srivatsa, Dinesh C. Verma, Ho Y. Wong
  • Publication number: 20140126378
    Abstract: Methods and apparatus are provided for wireless network optimization. Wireless network traffic is optimized by receiving redirected traffic based on one or more configuration rules; and applying the redirected traffic to a protocol optimizer that optimizes the wireless network traffic based on one or more optimization rules. A management interface is optionally provided to manage the network optimization appliance. A process monitor is optionally provided to monitor one or more process threads to determine if the process threads have stalled. The process monitor can monitor other components and can be monitored by at least one other component.
    Type: Application
    Filed: November 2, 2012
    Publication date: May 8, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seraphin B. Calo, William Cornejo, Keith Grueneberg, Franck Le, Erich M. Nahum, Maroun Touma, Dinesh C. Verma, Ho Yin Starsky Wong
  • Publication number: 20140126379
    Abstract: Methods and apparatus are provided for wireless network optimization. Wireless network traffic is optimized by receiving redirected traffic based on one or more configuration rules; and applying the redirected traffic to a protocol optimizer that optimizes the wireless network traffic based on one or more optimization rules. A management interface is optionally provided to manage the network optimization appliance. A process monitor is optionally provided to monitor one or more process threads to determine if the process threads have stalled. The process monitor can monitor other components and can be monitored by at least one other component.
    Type: Application
    Filed: November 27, 2012
    Publication date: May 8, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seraphin B. Calo, William Cornejo, Keith Grueneberg, Franck Le, Erich M. Nahum, Maroun Touma, Dinesh C. Verma, Ho Yin Starsky Wong
  • Publication number: 20140105174
    Abstract: A system and method that externalizes mobile device state migration (i.e., checkpointing) without being dependent upon any particular Edge Application (EdgeApp) proxy server or cellular network base station. In this manner, the Edge Application (EdgeApp) proxy server does not have to be aware of a migration process, yet will enable state information to be provided to other EdgeApp proxy/server nodes at the edge of the network (cell tower).
    Type: Application
    Filed: October 17, 2012
    Publication date: April 17, 2014
    Applicant: International Business Machines Corporation
    Inventors: Dakshi Agrawal, Chatschik Bisdikian, Dinesh C. Verma, Petros Zerfos
  • Publication number: 20140108638
    Abstract: Techniques for managing network traffic in a virtual consolidated appliance so as to avoid interruptions in existing network connections during reconfiguration of the virtual consolidated appliance are provided. In one aspect, a method for operating a virtual consolidated appliance having a plurality of servers is provided. The method includes the following steps. An assignment for load balancing is computed based on a status of the virtual consolidated appliance. A reconfiguration of the virtual consolidated appliance is discovered. A new assignment is computed for load balancing based on a new status of the virtual consolidated appliance based on the reconfiguration of the virtual consolidated appliance. Existing network connections are redirected according to the assignment during the reconfiguration of the virtual consolidated appliance. New network connections are served according to the new assignment.
    Type: Application
    Filed: October 11, 2012
    Publication date: April 17, 2014
    Applicant: International Business Machines Corporation
    Inventors: Bong Jun Ko, Kang-Won Lee, Erich M. Nahum, Maroun Touma, Dinesh C. Verma, HoYin Starsky Wong
  • Publication number: 20140108626
    Abstract: Techniques for managing network traffic in a virtual consolidated appliance so as to avoid interruptions in existing network connections during reconfiguration of the virtual consolidated appliance are provided. In one aspect, a method for operating a virtual consolidated appliance having a plurality of servers is provided. The method includes the following steps. An assignment for load balancing is computed based on a status of the virtual consolidated appliance. A reconfiguration of the virtual consolidated appliance is discovered. A new assignment is computed for load balancing based on a new status of the virtual consolidated appliance based on the reconfiguration of the virtual consolidated appliance. Existing network connections are redirected according to the assignment during the reconfiguration of the virtual consolidated appliance. New network connections are served according to the new assignment.
    Type: Application
    Filed: October 15, 2013
    Publication date: April 17, 2014
    Applicant: International Business Machines Corporation
    Inventors: Bong Jun Ko, Kang-Won Lee, Erich M. Nahum, Maroun Touma, Dinesh C. Verma, Ho Yin Starsky Wong
  • Publication number: 20140080457
    Abstract: A method, system and computer program product are disclosed for providing content to a communications device. In an embodiment of the invention, a communications network receives a first content portion from a content provider and sends the first content portion to the communications device. The communications network also sends a second content portion to the communications device, and this second content portion is customized for the user of the communications device based on selected information about the user that the communications network has. In one embodiment, the communications network uses the selected information about the user to customize the second content portion for the user, and sends the customized second content portion to the communications device. In an embodiment, the communications network sends the selected information to the content provider, and the content provider uses the selected information to customize the second content portion.
    Type: Application
    Filed: September 14, 2012
    Publication date: March 20, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dakshi Agrawal, Michael G. Hill, Sihyung Lee, Mudhakar Srivatsa, Dinesh C. Verma, Petros Zerfos, Joseph W. Ziskin
  • Publication number: 20140071803
    Abstract: Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet.
    Type: Application
    Filed: September 13, 2012
    Publication date: March 13, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dakshi Agrawal, Bruce O. Anthony, JR., Franck Le, Robert B. Nicholson, Vasileios Pappas, Dinesh C. Verma
  • Publication number: 20140071833
    Abstract: Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet.
    Type: Application
    Filed: October 4, 2012
    Publication date: March 13, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dakshi Agrawal, Bruce O. Anthony, Franck Le, Robert B. Nicholson, Vasileios Pappas, Dinesh C. Verma
  • Publication number: 20140057592
    Abstract: A method, program product and system for dynamically offering upgraded services in a network. The method comprising the steps of: selecting users for a possible offer of an upgrade to services within the network, based on user activity at user devices accessing the network; obtaining network context data information regarding the user activity and the network; sequentially ordering the selected users based on a likelihood that the users will purchase the upgrade to services; determining the upgrade to services to be offered based on a service prediction availability within the network; and offering the upgrade to services to the selected users for a specific time period.
    Type: Application
    Filed: August 23, 2012
    Publication date: February 27, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Malolan Chetlur, Umamaheswari C. Devi, Partha Dutta, Shivkumar Kalyanaraman, Ravindranath Kokku, Dinesh C. Verma
  • Publication number: 20140059191
    Abstract: Dynamic middleboxes include a network monitor module configured to determine a quality-affective factor in a connection between a client and a server in a network; a processor configured to compare the quality-affective factor to a threshold to determine whether the connection would benefit from a network processing function; and a network control module configured to reconfigure the network to redirect the connection to a middlebox that performs the network processing function if the connection would benefit and further configured to reconfigure the network to exclude the middlebox from the connection if the connection would not benefit.
    Type: Application
    Filed: September 11, 2012
    Publication date: February 27, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seraphin B. Calo, William Cornejo, Thai F. Le, Erich M. Nahum, Maroun Touma, Dinesh C. Verma
  • Publication number: 20140059190
    Abstract: Traffic redirection methods include determining a quality-affective factor in a connection between a client and a server in a network; comparing the quality-affective factor to a threshold to determine whether the connection would benefit from a network processing function; reconfiguring the network to redirect the connection to or away from a middlebox that performs the network processing function in accordance with the determination of whether the connection would benefit from the network processing function.
    Type: Application
    Filed: August 21, 2012
    Publication date: February 27, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: SERAPHIN B. CALO, WILLIAM CORNEJO, THAI F. LE, ERICH M. NAHUM, MAROUN TOUMA, DINESH C. VERMA
  • Publication number: 20140045475
    Abstract: Techniques for improving cache effectiveness in areas with low user population are provided. In one aspect, a computer-based method for managing user traffic in a cellular network using proxy caches is provided. The method includes the following steps. A group of the proxy caches that has correlated user traffic is identified. Cache requests for each of the proxy caches in the group are observed. One or more patterns are found in the cache requests. A prediction is made as to which items will be requested from the proxy caches in the group in the future based on the one or more patterns found in the cache requests. The proxy caches in the group are pre-populated with the items.
    Type: Application
    Filed: August 8, 2012
    Publication date: February 13, 2014
    Applicant: International Business Machines Corporation
    Inventors: Bruce O. Anthony, JR., Dinesh C. Verma
  • Publication number: 20140045476
    Abstract: Techniques for improving cache effectiveness in areas with low user population are provided. In one aspect, a computer-based method for managing user traffic in a cellular network using proxy caches is provided. The method includes the following steps. A group of the proxy caches that has correlated user traffic is identified. Cache requests for each of the proxy caches in the group are observed. One or more patterns are found in the cache requests. A prediction is made as to which items will be requested from the proxy caches in the group in the future based on the one or more patterns found in the cache requests. The proxy caches in the group are pre-populated with the items.
    Type: Application
    Filed: August 22, 2012
    Publication date: February 13, 2014
    Applicant: International Business Machines Corporation
    Inventors: Bruce O. Anthony, JR., Dinesh C. Verma
  • Patent number: 8625457
    Abstract: A method, system and computer-usable medium for discovering the topology of a network by using multiple discovery agents operating in parallel. A NodeList containing information about known nodes in a target network is received. The number (‘K’) of discovery agents to be used is determined, where 1<=K<=TotalNumberOfNodes). The nodes are partitioned into node groups, each of which has a group identifier respectively assigning it to a discovery agent ‘M’ where 1<=M<=K. A GraphList is created to hold information about known and discovered nodes. Each entry in the NodeList list is processed by its assigned discovery agent ‘M’, which sends probe messages to the target node to determine the node identifiers of discovered neighboring nodes.
    Type: Grant
    Filed: December 3, 2007
    Date of Patent: January 7, 2014
    Assignee: International Business Machines Corporation
    Inventors: Daniel Joseph Martin, Dinesh C. Verma
  • Publication number: 20130318300
    Abstract: Methods and apparatus are provided for performing byte caching using a chunk size based on the object type of the object being cached. Byte caching is performed by receiving at least one data packet from at least one network node; extracting at least one data object from the at least one data packet; identifying an object type associated with the at least one data packet; determining a chunk size associated with the object type; and storing at least a portion of the at least one data packet in a byte cache based on the determined chunk size. The chunk size of the object type can be determined, for example, by evaluating one or more additional criteria, such as network conditions and object size. The object type may be, for example, an image object type; an audio object type; a video object type; and a text object type.
    Type: Application
    Filed: May 24, 2012
    Publication date: November 28, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dakshi Agrawal, Franck Le, Vasileios Pappas, Mudhakar Srivatsa, Dinesh C. Verma
  • Publication number: 20130298175
    Abstract: A method, system and computer program product for creating a customized message in a video-on-demand service, in which a user accesses the service using a communications device. In an embodiment, the method comprises using a video-on-demand server to intercept the access by the user of the video-on-demand service, obtain information about video content of a local cache of the video-on-demand service, obtain a profile of the user, and identify a context of the user. A customized message is constructed for the communications device based on the information about the local cache, the profile of the user, and the context of the user. The video-on-demand server sends the customized message to the communications device. In one embodiment, the user accesses the video-on-demand service through an edge base station of a core network, and the video-on-demand server is in this base station of the core network.
    Type: Application
    Filed: May 2, 2012
    Publication date: November 7, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dakshi Agrawal, Vasileios Pappas, Mudhakar Srivatsa, Dinesh C. Verma
  • Publication number: 20130254258
    Abstract: An apparatus and method for off-loading application components to edge servers are provided. An application is made edge-aware by defining which components of the application may be run from an edge server, and which components cannot be run from an edge server. When a request is received that is to be processed by an application on an origin server, a determination is made as to whether the application contains edgable components. If so, an edgified version of the application is created. When a request is received that is handled by a component that may be run on the edge server, the request is handled by that component on the edge server. When a request is received that is handled by a component that is not edgable, the request is passed to a proxy agent which then provides the request to a broker agent on the origin server.
    Type: Application
    Filed: April 2, 2013
    Publication date: September 26, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rajesh S. Agarwalla, Khalil S. Amiri, Madhu K. Chetuparambil, James R. Giles, Manu M. Gugnani, Shih-pai Lee, Subbarao K. Meduri, Mahesh Patil, Dinesh C. Verma