Patents by Inventor Lap T. Huynh
Lap T. Huynh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20110125914Abstract: Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.Type: ApplicationFiled: February 3, 2011Publication date: May 26, 2011Applicant: International Business Machines CorporationInventors: Michael E. Baskey, Mandis S. Beigi, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Einar Lueck, Debanjan Saha, Sambit Sahu, Dinesh C. Verma
-
Publication number: 20110126194Abstract: A mechanism is provided for sharing one or more security appliances. A trusted system component associated with an application of a plurality of applications in a logically partitioned data processing system sets a destination address of a received packet to an address of a security appliance shared by the plurality of applications. The trusted system component sends the received packet to the security appliance. The trusted system component receives a response from the security appliance. The trusted system component determines whether the response indicates permitting the received packet to proceed to the intended recipient. The trusted system component sends the received packet to the recipient in response to the response indicating permitting the received packet to proceed.Type: ApplicationFiled: November 24, 2009Publication date: May 26, 2011Applicant: International Business Machines CorporationInventors: Lap T. Huynh, Constantinos Kassimis, Jeffrey A. Lucovsky, Linwood H. Overby, JR., Jerry W. Stevens
-
Patent number: 7912968Abstract: Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.Type: GrantFiled: August 29, 2007Date of Patent: March 22, 2011Assignee: International Business Machines CorporationInventors: Michael E. Baskey, Mandis S. Beigi, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Einar Lueck, Debanjan Saha, Sambit Sahu, Dinesh C. Verma
-
Publication number: 20110038256Abstract: Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. The method yet further can include detecting an outage in the first of the different network resource nodes.Type: ApplicationFiled: October 25, 2010Publication date: February 17, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dinakaran Joseph, Jon K. Franks, Christopher N. Freeman, Sivaram Gottimukkala, Jason P. Hawrysz, Lap T. Huynh, Barry Mosakowski
-
Patent number: 7821921Abstract: Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. The method yet further can include detecting an outage in the first of the different network resource nodes.Type: GrantFiled: April 22, 2007Date of Patent: October 26, 2010Assignee: International Business Machines CorporationInventors: Dinakaran Joseph, Jon K. Franks, Christopher N. Freeman, Sivaram Gottimukkala, Jason P. Hawrysz, Lap T Huynh, Barry Mosakowski
-
Patent number: 7809819Abstract: A method, apparatus, and computer implemented instructions for processing a request in a data processing system. The request is received. In response to a first hash value being present within the request, the first hash value is compared to a second hash value that was computed locally, wherein the second hash value represents a current policy configuration for assigning a quality of service. In response to a match between the first hash value and the second hash value, other information in the request is used to establish a quality of service for packets associated with the request.Type: GrantFiled: August 10, 2007Date of Patent: October 5, 2010Assignee: International Business Machines CorporationInventors: Roberto DeLima, Lap T. Huynh, Dinakaran B. Joseph, John J. Majikes, Robert E. Moore, Lee M. Rafalow
-
Publication number: 20100071025Abstract: In an embodiment of the invention, a method for secure live migration of a virtual machine (VM) in a virtualized computing environment can include selecting a VM in a secure virtualized computing environment for live migration to a different virtualized computing environment and blocking data communications with the selected VM and other VMs in the secure virtualized computing environment. The selected VM can be live migrated to the different virtualized computing environment and the VM cna be restarted in the different virtualized computing environment. Notably, a secure communicative link can be established between the restarted VM and at least one other of the VMs in the secure virtualized computing environment. Finally, data communications between the restarted VM and the at least one other of the VMs can be enabled over the secure communicative link.Type: ApplicationFiled: September 15, 2008Publication date: March 18, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Wesley M. Devine, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Michael S. Law, Linwood H. Overby, JR.
-
Publication number: 20090063673Abstract: Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.Type: ApplicationFiled: August 29, 2007Publication date: March 5, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael E. Baskey, Mandis S. Beigi, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Einar Lueck, Debanjan Saha, Sambit Sahu, Dinesh C. Verma
-
Patent number: 7490265Abstract: A solution for managing a computer infrastructure is provided. In particular, the solution can generate a set of tentative recovery segments for the computer infrastructure based on a related resource graph and a set of partition rules. The related resource graph can be generated based on a managed resource graph, which includes resource type information for each node in the managed resource graph. The set of tentative recovery segments can be used to manage the computer infrastructure and/or a set of recovery segments, which includes recovery characteristic(s) for each segment can be generated based on the set of tentative recovery segments and a set of recovery segment templates. In any event, the invention provides a solution that fully and/or partially automates the identification of recovery segments within a computer infrastructure, thereby enabling a more effective management of the computer infrastructure.Type: GrantFiled: May 10, 2006Date of Patent: February 10, 2009Assignee: International Business Machines CorporationInventors: Michael E. Baskey, Chun-Shi Chang, Lap T. Huynh, Dinakaran Joseph, Sambit Sahu, Dinesh C. Verma, Michael D. Williams
-
Publication number: 20080320147Abstract: A method, apparatus, and computer implemented instructions for processing a request in a data processing system. The request is received. In response to a first hash value being present within the request, the first hash value is compared to a second hash value that was computed locally, wherein the second hash value represents a current policy configuration for assigning a quality of service. In response to a match between the first hash value and the second hash value, other information in the request is used to establish a quality of service for packets associated with the request.Type: ApplicationFiled: August 10, 2007Publication date: December 25, 2008Inventors: Roberto DeLima, Lap T. Huynh, Dinakaran B. Joseph, John J. Majikes, Robert E. Moore, Lee M. Rafalow
-
Publication number: 20080263082Abstract: A solution for managing a computer infrastructure is provided. In particular, the solution can generate a set of tentative recovery segments for the computer infrastructure based on a related resource graph and a set of partition rules. The related resource graph can be generated based on a managed resource graph, which includes resource type information for each node in the managed resource graph. The set of tentative recovery segments can be used to manage the computer infrastructure and/or a set of recovery segments, which includes recovery characteristic(s) for each segment can be generated based on the set of tentative recovery segments and a set of recovery segment templates. In any event, the invention provides a solution that fully and/or partially automates the identification of recovery segments within a computer infrastructure, thereby enabling a more effective management of the computer infrastructure.Type: ApplicationFiled: June 27, 2008Publication date: October 23, 2008Inventors: Michael E. Baskey, Chun-Shi Chang, Lap T. Huynh, Dinakaran Joseph
-
Publication number: 20080259790Abstract: Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. The method yet further can include detecting an outage in the first of the different network resource nodes.Type: ApplicationFiled: April 22, 2007Publication date: October 23, 2008Applicant: International Business Machines CorporationInventors: Dinakaran Joseph, Jon K. Franks, Christopher N. Freeman, Sivaram Gottimukkala, Jason P. Hawrysz, Lap T. Huynh, Barry Mosakowski
-
Patent number: 7308501Abstract: A method, apparatus, and computer implemented instructions for processing a request in a data processing system. The request is received. In response to a first hash value being present within the request, the first hash value is compared to a second hash value that was computed locally, wherein the second hash value represents a current policy configuration for assigning a quality of service. In response to a match between the first hash value and the second hash value, other information in the request is used to establish a quality of service for packets associated with the request.Type: GrantFiled: July 12, 2001Date of Patent: December 11, 2007Assignee: International Business Machines CorporationInventors: Roberto DeLima, Lap T. Huynh, Dinakaran B. Joseph, John J. Majikes, Robert E. Moore, Lee M. Rafalow
-
Publication number: 20040255153Abstract: A method of detecting an intrusion into a computer. At least one communication to an application program is selectively evaluated by the application program accessing an intrusion detection service to evaluate the communication.Type: ApplicationFiled: June 10, 2003Publication date: December 16, 2004Inventors: Lap T. Huynh, Linwood H. Overby
-
Publication number: 20030014525Abstract: A method, apparatus, and computer implemented instructions for processing a request in a data processing system. The request is received. In response to a first hash value being present within the request, the first hash value is compared to a second hash value that was computed locally, wherein the second hash value represents a current policy configuration for assigning a quality of service. In response to a match between the first hash value and the second hash value, other information in the request is used to establish a quality of service for packets associated with the request.Type: ApplicationFiled: July 12, 2001Publication date: January 16, 2003Applicant: International Business Machines CorporationInventors: Roberto DeLima, Lap T. Huynh, Dinakaran B. Joseph, John J. Majikes, Robert E. Moore, Lee M. Rafalow
-
Patent number: 5936940Abstract: An enhanced adaptive rate-based congestion control system for packet transmission networks uses the absolute rather than the relative network queuing delay measure of congestion in the network. Other features of the congestion control system include test transmissions only after a predetermined minimum time, after the receipt of an acknowledgment from the previous test, or transmission of a minimum data burst, whichever takes longest. The congestion control system also provides a small reduction in rate at low rates and a large reduction in rates at high rates. A logarithmic rate control function provides this capability. Rate damping is provided by changing all of the values in a rate look-up tables in response to excessive rate variations. Finally, the fair share of the available bandwidth is used as the starting point for rates at start-up or when a predefined rate damping region is exited.Type: GrantFiled: August 22, 1996Date of Patent: August 10, 1999Assignee: International Business Machines CorporationInventors: Gerald Arnold Marin, Lap T. Huynh, Ken Van Vu, Raif O. Onvural, Levent Gun, Bouchung Lin
-
Patent number: 5563875Abstract: A packet communications network includes a route testing system which launches a plurality of route testing messages from the source node to each of the nodes along the route, including the destination node, and returning to the source node. Time stamps in each of theses testing messages are compared to reception times to determine round trip delays which can be halved and compared to determine link transit times. These link transit times can, in turn, be analyzed to localize congestion or identify failed resources. The source resource is where the data is accumulated for the entire path and then analyzed to determine the location of failed links, if any, the response time from the source to the destination, the response time of each resource in the path, and the location of congested links. Packet switched resources identify the path test command themselves and carry out the testing procedure. Circuit switched resources utilize the control point controlling that resource to carry out the testing procedure.Type: GrantFiled: July 10, 1995Date of Patent: October 8, 1996Assignee: International Business Machines CorporationInventors: Timothy R. Hefel, Lap T. Huynh, Thomas P. McSweeney
-
Patent number: 5367523Abstract: An end-to-end, closed loop flow and congestion control system for packet communications networks exchanges rate request and rate response messages between data senders and receivers to allow the sender to adjust the data rate to avoid congestion and to control the data flow. Requests and responses are piggy-backed on data packets and result in changes in the input data rate in a direction to optimize data throughput. GREEN, YELLOW and RED operating modes are defined to increase data input, reduce data input and reduce data input drastically, respectively. Incremental changes in data input are altered non-linearly to change more quickly when further away from the optimum operating point than when closer to the optimum operating point.Type: GrantFiled: August 26, 1993Date of Patent: November 22, 1994Assignee: International Business Machines CorporationInventors: Rong-Feng Chang, John E. Drake, Jr., Levent Gun, Lap T. Huynh
-
Patent number: 5241682Abstract: A method and apparatus for interconnecting multiple data processing networks, each data processing network including: multiple network nodes having routing and functional capability within a data processing network; and, multiple endpoint nodes, each including only local address capability. Each network node may be connected to multiple endpoint nodes and other network nodes; however, connection is only permitted to network nodes within the same data processing network. A border node is established for interconnection between two data processing networks. The border node includes a network node interface having routing and functional capability within a first data processing network and an endpoint node interface having local address capability.Type: GrantFiled: April 18, 1991Date of Patent: August 31, 1993Assignee: International Business Machines CorporationInventors: David B. Bryant, Mark A. Cossack, Dennis J. Frett, Harold A. Himwich, Lap T. Huynh, John E. McGinn