Patents by Inventor Lap T. Huynh

Lap T. Huynh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110125914
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.
    Type: Application
    Filed: February 3, 2011
    Publication date: May 26, 2011
    Applicant: International Business Machines Corporation
    Inventors: Michael E. Baskey, Mandis S. Beigi, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Einar Lueck, Debanjan Saha, Sambit Sahu, Dinesh C. Verma
  • Publication number: 20110126194
    Abstract: A mechanism is provided for sharing one or more security appliances. A trusted system component associated with an application of a plurality of applications in a logically partitioned data processing system sets a destination address of a received packet to an address of a security appliance shared by the plurality of applications. The trusted system component sends the received packet to the security appliance. The trusted system component receives a response from the security appliance. The trusted system component determines whether the response indicates permitting the received packet to proceed to the intended recipient. The trusted system component sends the received packet to the recipient in response to the response indicating permitting the received packet to proceed.
    Type: Application
    Filed: November 24, 2009
    Publication date: May 26, 2011
    Applicant: International Business Machines Corporation
    Inventors: Lap T. Huynh, Constantinos Kassimis, Jeffrey A. Lucovsky, Linwood H. Overby, JR., Jerry W. Stevens
  • Patent number: 7912968
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.
    Type: Grant
    Filed: August 29, 2007
    Date of Patent: March 22, 2011
    Assignee: International Business Machines Corporation
    Inventors: Michael E. Baskey, Mandis S. Beigi, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Einar Lueck, Debanjan Saha, Sambit Sahu, Dinesh C. Verma
  • Publication number: 20110038256
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. The method yet further can include detecting an outage in the first of the different network resource nodes.
    Type: Application
    Filed: October 25, 2010
    Publication date: February 17, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dinakaran Joseph, Jon K. Franks, Christopher N. Freeman, Sivaram Gottimukkala, Jason P. Hawrysz, Lap T. Huynh, Barry Mosakowski
  • Patent number: 7821921
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. The method yet further can include detecting an outage in the first of the different network resource nodes.
    Type: Grant
    Filed: April 22, 2007
    Date of Patent: October 26, 2010
    Assignee: International Business Machines Corporation
    Inventors: Dinakaran Joseph, Jon K. Franks, Christopher N. Freeman, Sivaram Gottimukkala, Jason P. Hawrysz, Lap T Huynh, Barry Mosakowski
  • Patent number: 7809819
    Abstract: A method, apparatus, and computer implemented instructions for processing a request in a data processing system. The request is received. In response to a first hash value being present within the request, the first hash value is compared to a second hash value that was computed locally, wherein the second hash value represents a current policy configuration for assigning a quality of service. In response to a match between the first hash value and the second hash value, other information in the request is used to establish a quality of service for packets associated with the request.
    Type: Grant
    Filed: August 10, 2007
    Date of Patent: October 5, 2010
    Assignee: International Business Machines Corporation
    Inventors: Roberto DeLima, Lap T. Huynh, Dinakaran B. Joseph, John J. Majikes, Robert E. Moore, Lee M. Rafalow
  • Publication number: 20100071025
    Abstract: In an embodiment of the invention, a method for secure live migration of a virtual machine (VM) in a virtualized computing environment can include selecting a VM in a secure virtualized computing environment for live migration to a different virtualized computing environment and blocking data communications with the selected VM and other VMs in the secure virtualized computing environment. The selected VM can be live migrated to the different virtualized computing environment and the VM cna be restarted in the different virtualized computing environment. Notably, a secure communicative link can be established between the restarted VM and at least one other of the VMs in the secure virtualized computing environment. Finally, data communications between the restarted VM and the at least one other of the VMs can be enabled over the secure communicative link.
    Type: Application
    Filed: September 15, 2008
    Publication date: March 18, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Wesley M. Devine, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Michael S. Law, Linwood H. Overby, JR.
  • Publication number: 20090063673
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.
    Type: Application
    Filed: August 29, 2007
    Publication date: March 5, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael E. Baskey, Mandis S. Beigi, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Einar Lueck, Debanjan Saha, Sambit Sahu, Dinesh C. Verma
  • Patent number: 7490265
    Abstract: A solution for managing a computer infrastructure is provided. In particular, the solution can generate a set of tentative recovery segments for the computer infrastructure based on a related resource graph and a set of partition rules. The related resource graph can be generated based on a managed resource graph, which includes resource type information for each node in the managed resource graph. The set of tentative recovery segments can be used to manage the computer infrastructure and/or a set of recovery segments, which includes recovery characteristic(s) for each segment can be generated based on the set of tentative recovery segments and a set of recovery segment templates. In any event, the invention provides a solution that fully and/or partially automates the identification of recovery segments within a computer infrastructure, thereby enabling a more effective management of the computer infrastructure.
    Type: Grant
    Filed: May 10, 2006
    Date of Patent: February 10, 2009
    Assignee: International Business Machines Corporation
    Inventors: Michael E. Baskey, Chun-Shi Chang, Lap T. Huynh, Dinakaran Joseph, Sambit Sahu, Dinesh C. Verma, Michael D. Williams
  • Publication number: 20080320147
    Abstract: A method, apparatus, and computer implemented instructions for processing a request in a data processing system. The request is received. In response to a first hash value being present within the request, the first hash value is compared to a second hash value that was computed locally, wherein the second hash value represents a current policy configuration for assigning a quality of service. In response to a match between the first hash value and the second hash value, other information in the request is used to establish a quality of service for packets associated with the request.
    Type: Application
    Filed: August 10, 2007
    Publication date: December 25, 2008
    Inventors: Roberto DeLima, Lap T. Huynh, Dinakaran B. Joseph, John J. Majikes, Robert E. Moore, Lee M. Rafalow
  • Publication number: 20080263082
    Abstract: A solution for managing a computer infrastructure is provided. In particular, the solution can generate a set of tentative recovery segments for the computer infrastructure based on a related resource graph and a set of partition rules. The related resource graph can be generated based on a managed resource graph, which includes resource type information for each node in the managed resource graph. The set of tentative recovery segments can be used to manage the computer infrastructure and/or a set of recovery segments, which includes recovery characteristic(s) for each segment can be generated based on the set of tentative recovery segments and a set of recovery segment templates. In any event, the invention provides a solution that fully and/or partially automates the identification of recovery segments within a computer infrastructure, thereby enabling a more effective management of the computer infrastructure.
    Type: Application
    Filed: June 27, 2008
    Publication date: October 23, 2008
    Inventors: Michael E. Baskey, Chun-Shi Chang, Lap T. Huynh, Dinakaran Joseph
  • Publication number: 20080259790
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. The method yet further can include detecting an outage in the first of the different network resource nodes.
    Type: Application
    Filed: April 22, 2007
    Publication date: October 23, 2008
    Applicant: International Business Machines Corporation
    Inventors: Dinakaran Joseph, Jon K. Franks, Christopher N. Freeman, Sivaram Gottimukkala, Jason P. Hawrysz, Lap T. Huynh, Barry Mosakowski
  • Patent number: 7308501
    Abstract: A method, apparatus, and computer implemented instructions for processing a request in a data processing system. The request is received. In response to a first hash value being present within the request, the first hash value is compared to a second hash value that was computed locally, wherein the second hash value represents a current policy configuration for assigning a quality of service. In response to a match between the first hash value and the second hash value, other information in the request is used to establish a quality of service for packets associated with the request.
    Type: Grant
    Filed: July 12, 2001
    Date of Patent: December 11, 2007
    Assignee: International Business Machines Corporation
    Inventors: Roberto DeLima, Lap T. Huynh, Dinakaran B. Joseph, John J. Majikes, Robert E. Moore, Lee M. Rafalow
  • Publication number: 20040255153
    Abstract: A method of detecting an intrusion into a computer. At least one communication to an application program is selectively evaluated by the application program accessing an intrusion detection service to evaluate the communication.
    Type: Application
    Filed: June 10, 2003
    Publication date: December 16, 2004
    Inventors: Lap T. Huynh, Linwood H. Overby
  • Publication number: 20030014525
    Abstract: A method, apparatus, and computer implemented instructions for processing a request in a data processing system. The request is received. In response to a first hash value being present within the request, the first hash value is compared to a second hash value that was computed locally, wherein the second hash value represents a current policy configuration for assigning a quality of service. In response to a match between the first hash value and the second hash value, other information in the request is used to establish a quality of service for packets associated with the request.
    Type: Application
    Filed: July 12, 2001
    Publication date: January 16, 2003
    Applicant: International Business Machines Corporation
    Inventors: Roberto DeLima, Lap T. Huynh, Dinakaran B. Joseph, John J. Majikes, Robert E. Moore, Lee M. Rafalow
  • Patent number: 5936940
    Abstract: An enhanced adaptive rate-based congestion control system for packet transmission networks uses the absolute rather than the relative network queuing delay measure of congestion in the network. Other features of the congestion control system include test transmissions only after a predetermined minimum time, after the receipt of an acknowledgment from the previous test, or transmission of a minimum data burst, whichever takes longest. The congestion control system also provides a small reduction in rate at low rates and a large reduction in rates at high rates. A logarithmic rate control function provides this capability. Rate damping is provided by changing all of the values in a rate look-up tables in response to excessive rate variations. Finally, the fair share of the available bandwidth is used as the starting point for rates at start-up or when a predefined rate damping region is exited.
    Type: Grant
    Filed: August 22, 1996
    Date of Patent: August 10, 1999
    Assignee: International Business Machines Corporation
    Inventors: Gerald Arnold Marin, Lap T. Huynh, Ken Van Vu, Raif O. Onvural, Levent Gun, Bouchung Lin
  • Patent number: 5563875
    Abstract: A packet communications network includes a route testing system which launches a plurality of route testing messages from the source node to each of the nodes along the route, including the destination node, and returning to the source node. Time stamps in each of theses testing messages are compared to reception times to determine round trip delays which can be halved and compared to determine link transit times. These link transit times can, in turn, be analyzed to localize congestion or identify failed resources. The source resource is where the data is accumulated for the entire path and then analyzed to determine the location of failed links, if any, the response time from the source to the destination, the response time of each resource in the path, and the location of congested links. Packet switched resources identify the path test command themselves and carry out the testing procedure. Circuit switched resources utilize the control point controlling that resource to carry out the testing procedure.
    Type: Grant
    Filed: July 10, 1995
    Date of Patent: October 8, 1996
    Assignee: International Business Machines Corporation
    Inventors: Timothy R. Hefel, Lap T. Huynh, Thomas P. McSweeney
  • Patent number: 5367523
    Abstract: An end-to-end, closed loop flow and congestion control system for packet communications networks exchanges rate request and rate response messages between data senders and receivers to allow the sender to adjust the data rate to avoid congestion and to control the data flow. Requests and responses are piggy-backed on data packets and result in changes in the input data rate in a direction to optimize data throughput. GREEN, YELLOW and RED operating modes are defined to increase data input, reduce data input and reduce data input drastically, respectively. Incremental changes in data input are altered non-linearly to change more quickly when further away from the optimum operating point than when closer to the optimum operating point.
    Type: Grant
    Filed: August 26, 1993
    Date of Patent: November 22, 1994
    Assignee: International Business Machines Corporation
    Inventors: Rong-Feng Chang, John E. Drake, Jr., Levent Gun, Lap T. Huynh
  • Patent number: 5241682
    Abstract: A method and apparatus for interconnecting multiple data processing networks, each data processing network including: multiple network nodes having routing and functional capability within a data processing network; and, multiple endpoint nodes, each including only local address capability. Each network node may be connected to multiple endpoint nodes and other network nodes; however, connection is only permitted to network nodes within the same data processing network. A border node is established for interconnection between two data processing networks. The border node includes a network node interface having routing and functional capability within a first data processing network and an endpoint node interface having local address capability.
    Type: Grant
    Filed: April 18, 1991
    Date of Patent: August 31, 1993
    Assignee: International Business Machines Corporation
    Inventors: David B. Bryant, Mark A. Cossack, Dennis J. Frett, Harold A. Himwich, Lap T. Huynh, John E. McGinn