Patents by Inventor James W. Ling
James W. Ling has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10623196Abstract: An approach is provided for protecting a network from a unicast flood. If the destination MAC address of a frame is not included in a table of unknown MAC addresses, the MAC address is added to the table and the frame is forwarded to non-blocked spanning tree links to find the MAC address in the network. If the MAC address is included in the table, and if a timer for suppressing forwarding of frames is active, the frame is discarded, or if the timer is inactive, a counter for counting received frames is incremented and compared to a threshold value. If the counter is greater than the threshold value, the timer is activated and the frame is discarded. If the counter is not greater than the threshold value, the frame is forwarded to the non-blocked spanning tree links to find the MAC address in the network.Type: GrantFiled: March 29, 2019Date of Patent: April 14, 2020Assignee: International Business Machines CorporationInventors: Robert K. Floyd, III, James W. Ling, Roger Hoffmann, Catalin Dumitru Marica
-
Patent number: 10623195Abstract: An approach is provided for protecting a network from a unicast flood. If the destination MAC address of a frame is not included in a table of unknown MAC addresses, the MAC address is added to the table and the frame is forwarded to non-blocked spanning tree links to find the MAC address in the network. If the MAC address is included in the table, and if a timer for suppressing forwarding of frames is active, the frame is discarded, or if the timer is inactive, a counter for counting received frames is incremented and compared to a threshold value. If the counter is greater than the threshold value, the timer is activated and the frame is discarded. If the counter is not greater than the threshold value, the frame is forwarded to the non-blocked spanning tree links to find the MAC address in the network.Type: GrantFiled: March 29, 2019Date of Patent: April 14, 2020Assignee: International Business Machines CorporationInventors: Robert K. Floyd, III, James W. Ling, Roger Hoffmann, Catalin Dumitru Marica
-
Publication number: 20190229941Abstract: An approach is provided for protecting a network from a unicast flood. If the destination MAC address of a frame is not included in a table of unknown MAC addresses, the MAC address is added to the table and the frame is forwarded to non-blocked spanning tree links to find the MAC address in the network. If the MAC address is included in the table, and if a timer for suppressing forwarding of frames is active, the frame is discarded, or if the timer is inactive, a counter for counting received frames is incremented and compared to a threshold value. If the counter is greater than the threshold value, the timer is activated and the frame is discarded. If the counter is not greater than the threshold value, the frame is forwarded to the non-blocked spanning tree links to find the MAC address in the network.Type: ApplicationFiled: March 29, 2019Publication date: July 25, 2019Inventors: Robert K. Floyd, III, James W. Ling, Roger Hoffmann, Catalin Dumitru Marica
-
Publication number: 20190229940Abstract: An approach is provided for protecting a network from a unicast flood. If the destination MAC address of a frame is not included in a table of unknown MAC addresses, the MAC address is added to the table and the frame is forwarded to non-blocked spanning tree links to find the MAC address in the network. If the MAC address is included in the table, and if a timer for suppressing forwarding of frames is active, the frame is discarded, or if the timer is inactive, a counter for counting received frames is incremented and compared to a threshold value. If the counter is greater than the threshold value, the timer is activated and the frame is discarded. If the counter is not greater than the threshold value, the frame is forwarded to the non-blocked spanning tree links to find the MAC address in the network.Type: ApplicationFiled: March 29, 2019Publication date: July 25, 2019Inventors: Robert K. Floyd, III, James W. Ling, Roger Hoffmann, Catalin Dumitru Marica
-
Patent number: 10333729Abstract: An approach is provided for protecting a network from a unicast flood. If the destination MAC address of a frame is not included in a table of unknown MAC addresses, the MAC address is added to the table and the frame is forwarded to non-blocked spanning tree links to find the MAC address in the network. If the MAC address is included in the table, and if a timer for suppressing forwarding of frames is active, the frame is discarded, or if the timer is inactive, a counter for counting received frames is incremented and compared to a threshold value. If the counter is greater than the threshold value, the timer is activated and the frame is discarded. If the counter is not greater than the threshold value, the frame is forwarded to the non-blocked spanning tree links to find the MAC address in the network.Type: GrantFiled: December 7, 2017Date of Patent: June 25, 2019Assignee: International Business Machines CorporationInventors: Robert K. Floyd, III, James W. Ling, Roger Hoffmann, Catalin Dumitru Marica
-
Patent number: 10333730Abstract: An approach is provided for protecting a network from a unicast flood. If the destination MAC address of a frame is not included in a table of unknown MAC addresses, the MAC address is added to the table and the frame is forwarded to non-blocked spanning tree links to find the MAC address in the network. If the MAC address is included in the table, and if a timer for suppressing forwarding of frames is active, the frame is discarded, or if the timer is inactive, a counter for counting received frames is incremented and compared to a threshold value. If the counter is greater than the threshold value, the timer is activated and the frame is discarded. If the counter is not greater than the threshold value, the frame is forwarded to the non-blocked spanning tree links to find the MAC address in the network.Type: GrantFiled: December 18, 2017Date of Patent: June 25, 2019Assignee: International Business Machines CorporationInventors: Robert K. Floyd, III, James W. Ling, Roger Hoffmann, Catalin Dumitru Marica
-
Publication number: 20190182066Abstract: An approach is provided for protecting a network from a unicast flood. If the destination MAC address of a frame is not included in a table of unknown MAC addresses, the MAC address is added to the table and the frame is forwarded to non-blocked spanning tree links to find the MAC address in the network. If the MAC address is included in the table, and if a timer for suppressing forwarding of frames is active, the frame is discarded, or if the timer is inactive, a counter for counting received frames is incremented and compared to a threshold value. If the counter is greater than the threshold value, the timer is activated and the frame is discarded. If the counter is not greater than the threshold value, the frame is forwarded to the non-blocked spanning tree links to find the MAC address in the network.Type: ApplicationFiled: December 18, 2017Publication date: June 13, 2019Inventors: Robert K. Floyd, III, James W. Ling, Roger Hoffmann, Catalin Dumitru Marica
-
Publication number: 20190182065Abstract: An approach is provided for protecting a network from a unicast flood. If the destination MAC address of a frame is not included in a table of unknown MAC addresses, the MAC address is added to the table and the frame is forwarded to non-blocked spanning tree links to find the MAC address in the network. If the MAC address is included in the table, and if a timer for suppressing forwarding of frames is active, the frame is discarded, or if the timer is inactive, a counter for counting received frames is incremented and compared to a threshold value. If the counter is greater than the threshold value, the timer is activated and the frame is discarded. If the counter is not greater than the threshold value, the frame is forwarded to the non-blocked spanning tree links to find the MAC address in the network.Type: ApplicationFiled: December 7, 2017Publication date: June 13, 2019Inventors: Robert K. Floyd, III, James W. Ling, Roger Hoffmann, Catalin Dumitru Marica
-
Patent number: 9762495Abstract: A method, computer program product, and system for adjusting network traffic balance among a plurality of communication links between a first network node and a second network node on a computing network includes a processor receiving over a computing network from a network device, performance metrics for a plurality of communications links between a first network node and a second network node on the computing network and based on receiving the performance metrics, the processor determines degradation in network performance on at least one of the plurality of communication links. The processor determines a weight for each communication link, associating a lower weight with the degraded link(s), and formulates instructions for an adjusted network traffic balance among the links, based on the weights.Type: GrantFiled: September 13, 2016Date of Patent: September 12, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hsiu Lan Chen, Robert K. Floyd, III, James W. Ling, Stephen Sauer, Liviu Tudorache
-
Patent number: 8312082Abstract: A meeting record, including identified participant information associated with each of a group of meeting participants, and a topic for a meeting is generated using a social network computing device. A meeting participant link that accesses the social networking profile of a meeting participant is stored within the meeting record for each of the group of meeting participants that has authorized access by others to a social networking profile of the meeting participant. A meeting notification, including a link to the meeting record, is sent to each of the group of meeting participants.Type: GrantFiled: January 6, 2012Date of Patent: November 13, 2012Assignee: International Business Machines CorporationInventors: Eva Balogh, David S. Braines, Enrique V. Kortright, James W. Ling, Andrew Strain, Nevenko Zunic
-
Publication number: 20120102119Abstract: A meeting record, including identified participant information associated with each of a group of meeting participants, and a topic for a meeting is generated using a social network computing device. A meeting participant link that accesses the social networking profile of a meeting participant is stored within the meeting record for each of the group of meeting participants that has authorized access by others to a social networking profile of the meeting participant. A meeting notification, including a link to the meeting record, is sent to each of the group of meeting participants.Type: ApplicationFiled: January 6, 2012Publication date: April 26, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eva Balogh, David S. Braines, Enrique V. Kortright, James W. Ling, Andrew Strain, Nevenko Zunic
-
Patent number: 8131801Abstract: A meeting record, including identified participant information associated with each of the group of meeting participants, and a topic for a meeting is generated via a social network computing device. A meeting notification, including a link to the meeting record, is sent to each of the group of meeting participants.Type: GrantFiled: December 8, 2009Date of Patent: March 6, 2012Assignee: International Business Machines CorporationInventors: Eva Balogh, David S. Braines, Enrique V. Kortright, James W. Ling, Andrew Strain, Nevenko Zunic
-
Publication number: 20110137988Abstract: A meeting record, including identified participant information associated with each of the group of meeting participants, and a topic for a meeting is generated via a social network computing device. A meeting notification, including a link to the meeting record, is sent to each of the group of meeting participants.Type: ApplicationFiled: December 8, 2009Publication date: June 9, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eva Balogh, David S. Braines, Enrique V. Kortright, James W. Ling, Andrew Strain, Nevenko Zunic