Patents by Inventor Mohammad Banikazemi
Mohammad Banikazemi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9880913Abstract: An apparatus comprises a storage controller coupled to at least one multi-region storage device. The at least one multi-region storage device comprises two or more storage regions, the two or more storage regions comprising a first storage region associated with a first set of failure characteristics and at least a second storage region associated with a second set of failure characteristics different than the first set of failure characteristics. The storage controller is configured to replicate in the second storage region at least a portion of data that is stored in the first storage region.Type: GrantFiled: December 14, 2015Date of Patent: January 30, 2018Assignee: International Business Machines CorporationInventors: Bulent Abali, Mohammad Banikazemi, Timothy J. Chainer, James L. Hafner, Dan E. Poff, Krishnakumar Rao Surugucchi
-
Patent number: 9740603Abstract: Techniques for managing content stored on persistent memory modules so as to ensure that the content can be accessed from the persistent memory modules in the correct order are provided. In one aspect, a method for managing content stored on persistent memory modules is provided. The method includes the step of: on each of the persistent memory modules, storing configuration data relating to an order in which the content is stored on the persistent memory modules. A method for managing content stored on persistent memory modules in a system is also provided.Type: GrantFiled: August 6, 2015Date of Patent: August 22, 2017Assignee: International Business Machines CorporationInventor: Mohammad Banikazemi
-
Publication number: 20170168908Abstract: An apparatus comprises a storage controller coupled to at least one multi-region storage device. The at least one multi-region storage device comprises two or more storage regions, the two or more storage regions comprising a first storage region associated with a first set of failure characteristics and at least a second storage region associated with a second set of failure characteristics different than the first set of failure characteristics. The storage controller is configured to replicate in the second storage region at least a portion of data that is stored in the first storage region.Type: ApplicationFiled: December 14, 2015Publication date: June 15, 2017Inventors: Bulent Abali, Mohammad Banikazemi, Timothy J. Chainer, James L. Hafner, Dan E. Poff, Krishnakumar Rao Surugucchi
-
Publication number: 20170149637Abstract: Methods and a system are provided for detecting a Quality of Service degradation in a network flow. A method includes configuring, by a monitoring element, at least two network elements on a path of a network flow to report statistical information pertaining to the network flow as time series data. The method further includes collecting, by the monitoring element, the time series data from the network elements. The method also includes computing, by the monitoring element, a similarity of the time series data. The method additionally includes indicating, by the monitoring element, the Quality of Service degradation when the similarity is below a specified similarity threshold.Type: ApplicationFiled: November 23, 2015Publication date: May 25, 2017Inventors: Mohammad Banikazemi, Hubertus Franke, Bengi Karacali-Akyamac, John M. Tracey
-
Publication number: 20170038983Abstract: Techniques for managing content stored on persistent memory modules so as to ensure that the content can be accessed from the persistent memory modules in the correct order are provided. In one aspect, a method for managing content stored on persistent memory modules is provided. The method includes the step of: on each of the persistent memory modules, storing configuration data relating to an order in which the content is stored on the persistent memory modules. A method for managing content stored on persistent memory modules in a system is also provided.Type: ApplicationFiled: August 6, 2015Publication date: February 9, 2017Inventor: Mohammad Banikazemi
-
Publication number: 20160373310Abstract: A method and system are provided. The method includes automatically transferring configuration information from at least one network device to at least one software defined networking controller. The automatically transferring step includes retrieving configuration information associated with the at least one network device, converting the configuration information into a format usable by the at least one software defined networking controller, and configuring the at least one software defined networking controller with the converted configuration information.Type: ApplicationFiled: June 19, 2015Publication date: December 22, 2016Inventors: Mohammad Banikazemi, David P. Olshefski, John M. Tracey
-
Publication number: 20160344623Abstract: Methods and systems are provided. A method includes managing, by a software defined network (SDN) controller, OpenFlow rules stored on an OpenFlow network device having a ternary content addressable memory (TCAM). The OpenFlow rules include unreachable OpenFlow rules and reachable OpenFlow rules. The managing step includes querying at least one OpenFlow rule from among the unreachable OpenFlow rules and the reachable OpenFlow rules on the at least one OpenFlow network device. The managing step further includes determining whether any of the OpenFlow rules are reachable or unreachable from indicia used to mark the OpenFlow rules as reachable or unreachable. The managing step also includes causing a removal of the unreachable OpenFlow rules from the OpenFlow network device.Type: ApplicationFiled: May 19, 2015Publication date: November 24, 2016Inventors: Mohammad Banikazemi, David P. Olshefski, John M. Tracey
-
Publication number: 20160344624Abstract: Methods and systems are provided. A method includes managing, by a software defined network (SDN) controller, OpenFlow rules stored on an OpenFlow network device having a ternary content addressable memory (TCAM). The OpenFlow rules include unreachable OpenFlow rules and reachable OpenFlow rules. The managing step includes querying at least one OpenFlow rule from among the unreachable OpenFlow rules and the reachable OpenFlow rules on the at least one OpenFlow network device. The managing step further includes determining whether any of the OpenFlow rules are reachable or unreachable from indicia used to mark the OpenFlow rules as reachable or unreachable. The managing step also includes causing a removal of the unreachable OpenFlow rules from the OpenFlow network device.Type: ApplicationFiled: June 19, 2015Publication date: November 24, 2016Inventors: Mohammad Banikazemi, David P. Olshefski, John M. Tracey
-
Publication number: 20160012009Abstract: A method, system and computer program product are disclosed for recovery in a virtualized environment using remote direct memory access (RDMA). In one embodiment, the method comprises operating a virtual computer system on a physical computer system, and the virtual system maintains in a memory area a record of a state of the virtual system. In this method, when defined error conditions occur on the virtual system, RDMA is used to pull the record of the state of the virtual system from that memory area onto a standby computer. This record on the standby computer is used to re-initialize the virtual computer. Embodiments of the invention provide methods that provide a very fast recovery from a virtual machine fault or error, while requiring much fewer resources than standard approaches. In embodiments of the invention, one spare real computer system can be used for backing up several virtual systems.Type: ApplicationFiled: September 18, 2015Publication date: January 14, 2016Inventors: Mohammad Banikazemi, John Alan Bivens, Michael R. Hines
-
Patent number: 9195614Abstract: A computer implemented method creates a snapshot of a logical volume of a computer. The computer stores a system state of the computer in persistent memory. The computer flushes a cache of the computer. The computer identifies a preceding snapshot. In response to identifying the preceding snapshot, the computer hardens changes occurring after the preceding snapshot. The computer then switches from a first indirection table to a second indirection table.Type: GrantFiled: January 8, 2013Date of Patent: November 24, 2015Assignee: International Business Machines CorporationInventors: Bulent Abali, Mohammad Banikazemi, John A. Bivens, Michael R. Hines, Dan E. Poff
-
Patent number: 9158712Abstract: A computer implemented method creates a snapshot of a logical volume of a computer. The computer stores a system state of the computer in persistent memory. The computer flushes a cache of the computer. The computer identifies a preceding snapshot. In response to identifying the preceding snapshot, the computer hardens changes occurring after the preceding snapshot. The computer then switches from a first indirection table to a second indirection table.Type: GrantFiled: January 24, 2013Date of Patent: October 13, 2015Assignee: International Business Machines CorporationInventors: Bulent Abali, Mohammad Banikazemi, John A. Bivens, Michael R. Hines, Dan E. Poff
-
Patent number: 9146819Abstract: A method, system and computer program product are disclosed for recovery in a virtualized environment using remote direct memory access (RDMA). In one embodiment, the method comprises operating a virtual computer system on a physical computer system, and the virtual system maintains in a memory area a record of a state of the virtual system. In this method, when defined error conditions occur on the virtual system, RDMA is used to pull the record of the state of the virtual system from that memory area onto a standby computer. This record on the standby computer is used to re-initialize the virtual computer. Embodiments of the invention provide methods that provide a very fast recovery from a virtual machine fault or error, while requiring much fewer resources than standard approaches. In embodiments of the invention, one spare real computer system can be used for backing up several virtual systems.Type: GrantFiled: July 2, 2013Date of Patent: September 29, 2015Assignee: International Business Machines CorporationInventors: Mohammad Banikazemi, John Alan Bivens, Michael R. Hines
-
Patent number: 9058244Abstract: A system for conducting memory transactions includes a non-volatile main memory and a memory buffer including a plurality of cache lines. Each of the cache lines includes content and one or more bits signifying whether a memory transaction corresponding to the content of the cache line has been performed to completion and whether the content of the cache line matches content of a corresponding location of the non-volatile main memory. When the one or more bits of a cache line of the plurality of cache lines signifies that the transaction has been performed to completion and the content of the cache line does not match the content of the corresponding location of the non-volatile memory, access to modify the content of the cache line is restricted until the content of the cache line is written to the corresponding location of the non-volatile main memory.Type: GrantFiled: September 13, 2012Date of Patent: June 16, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mohammad Banikazemi, John Alan Bivens
-
Patent number: 9003228Abstract: Consistency of data stored in persistent memory is maintained using separate commit and harden operations for a transaction. A transaction is committed with a processing device, the committing including marking an end of an atomic operation on a modified object from the transaction, creating a new copy of the modified object, and storing a mapping of the modified object to the new copy of the modified object in a recorded log. A checksum identifying the modified object is created and stored in the recorded log. The transaction is hardened by storing the modified object and the recorded log from cache into persistent memory.Type: GrantFiled: December 7, 2012Date of Patent: April 7, 2015Assignee: International Business Machines CorporationInventors: Mohammad Banikazemi, Bulent Abali
-
Publication number: 20150012776Abstract: A method, system and computer program product are disclosed for recovery in a virtualized environment using remote direct memory access (RDMA). In one embodiment, the method comprises operating a virtual computer system on a physical computer system, and the virtual system maintains in a memory area a record of a state of the virtual system. In this method, when defined error conditions occur on the virtual system, RDMA is used to pull the record of the state of the virtual system from that memory area onto a standby computer. This record on the standby computer is used to re-initialize the virtual computer. Embodiments of the invention provide methods that provide a very fast recovery from a virtual machine fault or error, while requiring much fewer resources than standard approaches. In embodiments of the invention, one spare real computer system can be used for backing up several virtual systems.Type: ApplicationFiled: July 2, 2013Publication date: January 8, 2015Inventors: Mohammad Banikazemi, John Alan Bivens, Michael R. Hines
-
Publication number: 20140289477Abstract: One aspect provides an apparatus including: at least one processor; and a computer readable storage medium having computer readable program code embodied therewith and executable by the at least one processor, the computer readable program code including: computer readable program code configured to, responsive to a request for data and a miss in both a first cache and a second cache, retrieve the data from memory, the first cache storing at least a subset of data stored in the second cache; computer readable program code configured to infer from information available from the first cache a replacement entry in the second cache; and computer readable program code configured to, responsive to inferring from information available from the first cache a replacement entry in the second cache, replace an entry in the second cache with the data from memory. Other aspects are described and claimed.Type: ApplicationFiled: May 10, 2013Publication date: September 25, 2014Applicant: International Business Machines CorporationInventors: Bulent Abali, Mohammad Banikazemi, Parijat Dube
-
Publication number: 20140289468Abstract: One aspect provides a method including: responsive to a request for data and a miss in both a first cache and a second cache, retrieving the data from memory, the first cache storing at least a subset of data stored in the second cache; inferring from information pertaining to the first cache a replacement entry in the second cache; and responsive to inferring from information pertaining to the first cache a replacement entry in the second cache, replacing an entry in the second cache with the data from memory. Other aspects are described and claimed.Type: ApplicationFiled: March 25, 2013Publication date: September 25, 2014Applicant: International Business Machines CorporationInventors: Bulent Abali, Mohammad Banikazemi, Parijat Dube
-
Publication number: 20140195721Abstract: A computer implemented method creates a snapshot of a logical volume of a computer. The computer stores a system state of the computer in persistent memory. The computer flushes a cash of the computer. The computer identifies a preceding snapshot. Responsive to identifying the preceding snapshot, the computer hardens changes occurring after the preceding snapshot. The computer then switches from a first indirection table to a second indirection table.Type: ApplicationFiled: January 24, 2013Publication date: July 10, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bulent Abali, Mohammad Banikazemi, John A. Bivens, Michael R. Hines, Dan E. Poff
-
Publication number: 20140195719Abstract: A computer implemented method creates a snapshot of a logical volume of a computer. The computer stores a system state of the computer in persistent memory. The computer flushes a cash of the computer. The computer identifies a preceding snapshot. Responsive to identifying the preceding snapshot, the computer hardens changes occurring after the preceding snapshot. The computer then switches from a first indirection table to a second indirection table.Type: ApplicationFiled: January 8, 2013Publication date: July 10, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bulent Abali, Mohammad Banikazemi, John A. Bivens, Michael R. Hines, Dan E. Poff
-
Publication number: 20140164828Abstract: Consistency of data stored in persistent memory is maintained using separate commit and harden operations for a transaction. A transaction is committed with a processing device, the committing including marking an end of an atomic operation on a modified object from the transaction, creating a new copy of the modified object, and storing a mapping of the modified object to the new copy of the modified object in a recorded log. A checksum identifying the modified object is created and stored in the recorded log. The transaction is hardened by storing the modified object and the recorded log from cache into persistent memory.Type: ApplicationFiled: December 7, 2012Publication date: June 12, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mohammad Banikazemi, Bulent Abali